Build Log (Full)
trunk standard buildnss02 Linux/Fedora17 32bit OPT on 2012/11/28 07:54:39
Show Brief Log
Return to the Build Page
Add a Comment to the Log

Build Error Summary

Build Error Log


tinderbox: tree: NSS
tinderbox: builddate: 1354118079
tinderbox: status: testfailed
tinderbox: build: trunk standard buildnss02 Linux/Fedora17 32bit OPT
tinderbox: errorparser: unix
tinderbox: buildfamily: unix
tinderbox: END

TB [2012-11-28 10:54:39] ######## Environment variables ########
Linux buildnss02.localdomain 3.6.6-1.fc17.x86_64 #1 SMP Mon Nov 5 21:59:35 UTC 2012 x86_64 x86_64 x86_64 GNU/Linux
Fedora release 17 (Beefy Miracle)
XDG_SESSION_ID=54
HOSTNAME=buildnss02.localdomain
SELINUX_ROLE_REQUESTED=
SHELL=/bin/bash
TERM=screen
HISTSIZE=1000
SSH_CLIENT=10.36.116.85 42490 22
PORT_JSSE_SERVER=8586
PKITS_DATA=/home/tinderbox/pkits/data/
SELINUX_USE_CURRENT_RANGE=
OLDPWD=/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_stable_32_DBG/mozilla/security/jss/org/mozilla/jss/tests
CVS_LIST=mozilla/nsprpub
mozilla/dbm
mozilla/security/dbm
mozilla/security/coreconf
mozilla/security/nss
mozilla/security/jss
-r:NSS_3_11_1_RTM:mozilla/security/nss/lib/freebl/ecl/ecl-curve.h
SSH_TTY=/dev/pts/0
BRANCH=trunk
QT_GRAPHICSSYSTEM_CHECKED=1
USER=tinderbox
LS_COLORS=rs=0:di=01;34:ln=01;36:mh=00:pi=40;33:so=01;35:do=01;35:bd=40;33;01:cd=40;33;01:or=40;31;01:mi=01;05;37;41:su=37;41:sg=30;43:ca=30;41:tw=30;42:ow=34;42:st=37;44:ex=01;32:*.tar=01;31:*.tgz=01;31:*.arj=01;31:*.taz=01;31:*.lzh=01;31:*.lzma=01;31:*.tlz=01;31:*.txz=01;31:*.zip=01;31:*.z=01;31:*.Z=01;31:*.dz=01;31:*.gz=01;31:*.lz=01;31:*.xz=01;31:*.bz2=01;31:*.tbz=01;31:*.tbz2=01;31:*.bz=01;31:*.tz=01;31:*.deb=01;31:*.rpm=01;31:*.jar=01;31:*.war=01;31:*.ear=01;31:*.sar=01;31:*.rar=01;31:*.ace=01;31:*.zoo=01;31:*.cpio=01;31:*.7z=01;31:*.rz=01;31:*.jpg=01;35:*.jpeg=01;35:*.gif=01;35:*.bmp=01;35:*.pbm=01;35:*.pgm=01;35:*.ppm=01;35:*.tga=01;35:*.xbm=01;35:*.xpm=01;35:*.tif=01;35:*.tiff=01;35:*.png=01;35:*.svg=01;35:*.svgz=01;35:*.mng=01;35:*.pcx=01;35:*.mov=01;35:*.mpg=01;35:*.mpeg=01;35:*.m2v=01;35:*.mkv=01;35:*.ogm=01;35:*.mp4=01;35:*.m4v=01;35:*.mp4v=01;35:*.vob=01;35:*.qt=01;35:*.nuv=01;35:*.wmv=01;35:*.asf=01;35:*.rm=01;35:*.rmvb=01;35:*.flc=01;35:*.avi=01;35:*.fli=01;35:*.flv=01;35:*.gl=01;35:*.dl=01;35:*.xcf=01;35:*.xwd=01;35:*.yuv=01;35:*.cgm=01;35:*.emf=01;35:*.axv=01;35:*.anx=01;35:*.ogv=01;35:*.ogx=01;35:*.aac=01;36:*.au=01;36:*.flac=01;36:*.mid=01;36:*.midi=01;36:*.mka=01;36:*.mp3=01;36:*.mpc=01;36:*.ogg=01;36:*.ra=01;36:*.wav=01;36:*.axa=01;36:*.oga=01;36:*.spx=01;36:*.xspf=01;36:*.pdf=00;33:*.ps=00;33:*.ps.gz=00;33:*.txt=00;33:*.patch=00;33:*.diff=00;33:*.log=00;33:*.tex=00;33:*.xls=00;33:*.xlsx=00;33:*.ppt=00;33:*.pptx=00;33:*.rtf=00;33:*.doc=00;33:*.docx=00;33:*.odt=00;33:*.ods=00;33:*.odp=00;33:*.xml=00;33:*.epub=00;33:*.abw=00;33:*.htm=00;33:*.html=00;33:*.shtml=00;33:*.wpd=00;33:
NSS_ECC_MORE_THAN_SUITE_B=1
TERMCAP=SC|screen|VT 100/ANSI X3.64 virtual terminal:\
:DO=\E[%dB:LE=\E[%dD:RI=\E[%dC:UP=\E[%dA:bs:bt=\E[Z:\
:cd=\E[J:ce=\E[K:cl=\E[H\E[J:cm=\E[%i%d;%dH:ct=\E[3g:\
:do=^J:nd=\E[C:pt:rc=\E8:rs=\Ec:sc=\E7:st=\EH:up=\EM:\
:le=^H:bl=^G:cr=^M:it#8:ho=\E[H:nw=\EE:ta=^I:is=\E)0:\
:li#84:co#272:am:xn:xv:LP:sr=\EM:al=\E[L:AL=\E[%dL:\
:cs=\E[%i%d;%dr:dl=\E[M:DL=\E[%dM:dc=\E[P:DC=\E[%dP:\
:im=\E[4h:ei=\E[4l:mi:IC=\E[%d@:ks=\E[?1h\E=:\
:ke=\E[?1l\E>:vi=\E[?25l:ve=\E[34h\E[?25h:vs=\E[34l:\
:ti=\E[?1049h:te=\E[?1049l:us=\E[4m:ue=\E[24m:so=\E[3m:\
:se=\E[23m:mb=\E[5m:md=\E[1m:mr=\E[7m:me=\E[m:ms:\
:Co#8:pa#64:AF=\E[3%dm:AB=\E[4%dm:op=\E[39;49m:AX:\
:vb=\Eg:G0:as=\E(0:ae=\E(B:\
:ac=\140\140aaffggjjkkllmmnnooppqqrrssttuuvvwwxxyyzz{{||}}~~..--++,,hhII00:\
:po=\E[5i:pf=\E[4i:Km=\E[M:k0=\E[10~:k1=\EOP:k2=\EOQ:\
:k3=\EOR:k4=\EOS:k5=\E[15~:k6=\E[17~:k7=\E[18~:\
:k8=\E[19~:k9=\E[20~:k;=\E[21~:F1=\E[23~:F2=\E[24~:\
:F3=\E[1;2P:F4=\E[1;2Q:F5=\E[1;2R:F6=\E[1;2S:\
:F7=\E[15;2~:F8=\E[17;2~:F9=\E[18;2~:FA=\E[19;2~:kb=:\
:K2=\EOE:kB=\E[Z:kF=\E[1;2B:kR=\E[1;2A:*4=\E[3;2~:\
:*7=\E[1;2F:#2=\E[1;2H:#3=\E[2;2~:#4=\E[1;2D:%c=\E[6;2~:\
:%e=\E[5;2~:%i=\E[1;2C:kh=\E[1~:@1=\E[1~:kH=\E[4~:\
:@7=\E[4~:kN=\E[6~:kP=\E[5~:kI=\E[2~:kD=\E[3~:ku=\EOA:\
:kd=\EOB:kr=\EOC:kl=\EOD:km:
PATH=/usr/lib64/ccache:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin:/home/tinderbox/.local/bin:/home/tinderbox/bin
DOMSUF=usersys.redhat.com
STY=11598.pts-0.buildnss02
NSS_ENABLE_ECC=1
PWD=/home/tinderbox/mozilla/security/tinderlight
JAVA_HOME=/usr/lib/jvm/java-1.6.0-openjdk
XMODIFIERS=@im=none
LANG=en_US.UTF-8
QT_GRAPHICSSYSTEM=native
SELINUX_LEVEL_REQUESTED=
HISTCONTROL=ignoredups
HOME=/home/tinderbox
SHLVL=4
NSPR_LOG_MODULES=pkix:1
TB_TREE=NSS
USE_64=
LOGNAME=tinderbox
CVS_RSH=ssh
WINDOW=0
SSH_CONNECTION=10.36.116.85 42490 10.16.79.157 22
BUILD_OPT=1
LESSOPEN=||/usr/bin/lesspipe.sh %s
PORT=8546
XDG_RUNTIME_DIR=/run/user/tinderbox
PORT_JSS_SERVER=8566
CCACHE_HASHDIR=
_=/usr/bin/env
TB [2012-11-28 10:54:39] ######## CVS checkout ########
TB [2012-11-28 10:54:39] $ cd /home/tinderbox/mozilla/security/tinderlight/data/mozilla-cvs-trunk
TB [2012-11-28 10:54:39] $ cvs -d :pserver:anonymous@cvs-mirror.mozilla.org:/cvsroot co -A mozilla/nsprpub
cvs checkout: Updating mozilla/nsprpub
cvs checkout: Updating mozilla/nsprpub/admin
cvs checkout: Updating mozilla/nsprpub/build
cvs checkout: Updating mozilla/nsprpub/build/autoconf
cvs checkout: Updating mozilla/nsprpub/build/win32
cvs checkout: Updating mozilla/nsprpub/config
cvs checkout: Updating mozilla/nsprpub/include
cvs checkout: Updating mozilla/nsprpub/lib
cvs checkout: Updating mozilla/nsprpub/lib/ds
cvs checkout: Updating mozilla/nsprpub/lib/libc
cvs checkout: Updating mozilla/nsprpub/lib/libc/include
cvs checkout: Updating mozilla/nsprpub/lib/libc/src
cvs checkout: Updating mozilla/nsprpub/lib/msgc
cvs checkout: Updating mozilla/nsprpub/lib/msgc/include
cvs checkout: Updating mozilla/nsprpub/lib/msgc/src
cvs checkout: Updating mozilla/nsprpub/lib/msgc/tests
cvs checkout: Updating mozilla/nsprpub/lib/prstreams
cvs checkout: Updating mozilla/nsprpub/lib/prstreams/tests
cvs checkout: Updating mozilla/nsprpub/lib/prstreams/tests/testprstrm
cvs checkout: Updating mozilla/nsprpub/lib/tests
cvs checkout: Updating mozilla/nsprpub/lib/tests/windows
cvs checkout: Updating mozilla/nsprpub/macbuild
cvs checkout: Updating mozilla/nsprpub/pkg
cvs checkout: Updating mozilla/nsprpub/pkg/linux
cvs checkout: Updating mozilla/nsprpub/pkg/solaris
cvs checkout: Updating mozilla/nsprpub/pkg/solaris/SUNWnspr
cvs checkout: Updating mozilla/nsprpub/pkg/solaris/SUNWnsprx
cvs checkout: Updating mozilla/nsprpub/pkg/solaris/SUNWpr
cvs checkout: Updating mozilla/nsprpub/pkg/solaris/SUNWpr-devl
cvs checkout: Updating mozilla/nsprpub/pkg/solaris/SUNWprd
cvs checkout: Updating mozilla/nsprpub/pkg/solaris/SUNWprdx
cvs checkout: Updating mozilla/nsprpub/pkg/solaris/SUNWprx
cvs checkout: Updating mozilla/nsprpub/pkg/solaris/SUNWprx-devl
cvs checkout: Updating mozilla/nsprpub/pkg/solaris/common_files
cvs checkout: Updating mozilla/nsprpub/pr
cvs checkout: Updating mozilla/nsprpub/pr/include
cvs checkout: Updating mozilla/nsprpub/pr/include/md
cvs checkout: Updating mozilla/nsprpub/pr/include/obsolete
cvs checkout: Updating mozilla/nsprpub/pr/include/private
cvs checkout: Updating mozilla/nsprpub/pr/src
cvs checkout: Updating mozilla/nsprpub/pr/src/bthreads
cvs checkout: Updating mozilla/nsprpub/pr/src/cplus
cvs checkout: Updating mozilla/nsprpub/pr/src/cplus/tests
cvs checkout: Updating mozilla/nsprpub/pr/src/cthreads
cvs checkout: Updating mozilla/nsprpub/pr/src/io
cvs checkout: Updating mozilla/nsprpub/pr/src/linking
cvs checkout: Updating mozilla/nsprpub/pr/src/malloc
cvs checkout: Updating mozilla/nsprpub/pr/src/md
cvs checkout: Updating mozilla/nsprpub/pr/src/md/beos
cvs checkout: Updating mozilla/nsprpub/pr/src/md/mac
cvs checkout: Updating mozilla/nsprpub/pr/src/md/os2
cvs checkout: Updating mozilla/nsprpub/pr/src/md/unix
cvs checkout: Updating mozilla/nsprpub/pr/src/md/windows
cvs checkout: Updating mozilla/nsprpub/pr/src/memory
cvs checkout: Updating mozilla/nsprpub/pr/src/misc
cvs checkout: Updating mozilla/nsprpub/pr/src/pthreads
cvs checkout: Updating mozilla/nsprpub/pr/src/threads
cvs checkout: Updating mozilla/nsprpub/pr/src/threads/combined
cvs checkout: Updating mozilla/nsprpub/pr/tests
cvs checkout: Updating mozilla/nsprpub/pr/tests/dll
cvs checkout: Updating mozilla/nsprpub/pr/tests/macbuild
cvs checkout: Updating mozilla/nsprpub/pr/tests/w16gui
cvs checkout: Updating mozilla/nsprpub/tools
TB [2012-11-28 10:54:40] CVS checkout mozilla/nsprpub PASSED
TB [2012-11-28 10:54:40] $ cvs -d :pserver:anonymous@cvs-mirror.mozilla.org:/cvsroot co -A mozilla/dbm
cvs checkout: Updating mozilla/dbm
cvs checkout: Updating mozilla/dbm/include
cvs checkout: Updating mozilla/dbm/macbuild
cvs checkout: Updating mozilla/dbm/src
cvs checkout: Updating mozilla/dbm/tests
TB [2012-11-28 10:54:41] CVS checkout mozilla/dbm PASSED
TB [2012-11-28 10:54:41] $ cvs -d :pserver:anonymous@cvs-mirror.mozilla.org:/cvsroot co -A mozilla/security/dbm
cvs checkout: Updating mozilla/security/dbm
cvs checkout: Updating mozilla/security/dbm/config
cvs checkout: Updating mozilla/security/dbm/include
cvs checkout: Updating mozilla/security/dbm/src
cvs checkout: Updating mozilla/security/dbm/tests
TB [2012-11-28 10:54:42] CVS checkout mozilla/security/dbm PASSED
TB [2012-11-28 10:54:42] $ cvs -d :pserver:anonymous@cvs-mirror.mozilla.org:/cvsroot co -A mozilla/security/coreconf
cvs checkout: Updating mozilla/security/coreconf
cvs checkout: Updating mozilla/security/coreconf/mkdepend
cvs checkout: Updating mozilla/security/coreconf/nsinstall
TB [2012-11-28 10:54:43] CVS checkout mozilla/security/coreconf PASSED
TB [2012-11-28 10:54:43] $ cvs -d :pserver:anonymous@cvs-mirror.mozilla.org:/cvsroot co -A mozilla/security/nss
cvs checkout: Updating mozilla/security/nss
cvs checkout: Updating mozilla/security/nss/build
cvs checkout: Updating mozilla/security/nss/build/autoconf
cvs checkout: Updating mozilla/security/nss/build/unix
cvs checkout: Updating mozilla/security/nss/cmd
cvs checkout: Updating mozilla/security/nss/cmd/SSLsample
cvs checkout: Updating mozilla/security/nss/cmd/SSLsample/client
cvs checkout: Updating mozilla/security/nss/cmd/SSLsample/server
cvs checkout: Updating mozilla/security/nss/cmd/addbuiltin
cvs checkout: Updating mozilla/security/nss/cmd/atob
cvs checkout: Updating mozilla/security/nss/cmd/bltest
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/aes_cbc
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/aes_cfb
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/aes_ctr
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/aes_cts
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/aes_ecb
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/aes_gcm
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/camellia_cbc
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/camellia_ecb
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/des3_cbc
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/des3_ecb
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/des_cbc
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/des_ecb
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/dsa
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/ecdsa
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/md2
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/md5
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/rc2_cbc
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/rc2_ecb
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/rc4
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/rc5_cbc
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/rc5_ecb
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/rsa
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/seed_cbc
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/seed_ecb
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/sha1
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/sha224
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/sha256
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/sha384
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/sha512
cvs checkout: Updating mozilla/security/nss/cmd/btoa
cvs checkout: Updating mozilla/security/nss/cmd/certcgi
cvs checkout: Updating mozilla/security/nss/cmd/certutil
cvs checkout: Updating mozilla/security/nss/cmd/cgi
cvs checkout: Updating mozilla/security/nss/cmd/checkcert
cvs checkout: Updating mozilla/security/nss/cmd/chktest
cvs checkout: Updating mozilla/security/nss/cmd/cipher
cvs checkout: Updating mozilla/security/nss/cmd/cmdlib
cvs checkout: Updating mozilla/security/nss/cmd/crlutil
cvs checkout: Updating mozilla/security/nss/cmd/crmf-cgi
cvs checkout: Updating mozilla/security/nss/cmd/crmftest
cvs checkout: Updating mozilla/security/nss/cmd/dbck
cvs checkout: Updating mozilla/security/nss/cmd/dbdump
cvs checkout: Updating mozilla/security/nss/cmd/dbtest
cvs checkout: Updating mozilla/security/nss/cmd/derdump
cvs checkout: Updating mozilla/security/nss/cmd/digest
cvs checkout: Updating mozilla/security/nss/cmd/doc
cvs checkout: Updating mozilla/security/nss/cmd/ecperf
cvs checkout: Updating mozilla/security/nss/cmd/fipstest
cvs checkout: Updating mozilla/security/nss/cmd/httpserv
cvs checkout: Updating mozilla/security/nss/cmd/ilock
cvs checkout: Updating mozilla/security/nss/cmd/include
cvs checkout: Updating mozilla/security/nss/cmd/keyutil
cvs checkout: Updating mozilla/security/nss/cmd/lib
cvs checkout: Updating mozilla/security/nss/cmd/libpkix
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/perf
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/perf/libpkix_buildthreads
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/perf/nss_threads
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/certsel
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/certsel/certselector
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/certsel/comcertselparams
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/checker
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/crlsel
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/crlsel/comcrlselparams
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/crlsel/crlselector
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/params
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/params/buildparams
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/params/procparams
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/params/resourcelimits
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/params/trustanchor
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/params/valparams
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/results
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/results/buildresult
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/results/policynode
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/results/valresult
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/results/verifynode
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/store
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/top
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/top/basicchecker
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/top/bc_checker
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/top/buildchain
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/top/buildchain_partialchain
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/top/buildchain_resourcelimits
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/top/buildchain_uchecker
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/top/customcrlchecker
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/top/defaultcrlchecker2
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/top/ocspchecker
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/top/policychecker
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/top/subjaltnamechecker
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/top/validatechain
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/top/validatechain_NB
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/top/validatechain_bc
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/util
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/util/certchain
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/util/error
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/util/list
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/util/list2
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/util/logger
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/module
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/module/colcertstore
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/module/ekuchecker
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/module/httpcertstore
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/module/pk11certstore
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/module/socket
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/pki
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/pki/authorityinfoaccess
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/pki/cert
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/pki/certdp
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/pki/crl
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/pki/crlentry
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/pki/date
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/pki/generalname
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/pki/issuingdp
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/pki/nameconstraints
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/pki/subjectinfoaccess
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/pki/x500name
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/system
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/system/bigint
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/system/bytearray
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/system/hashtable
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/system/mem
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/system/monitorlock
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/system/mutex
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/system/mutex2
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/system/mutex3
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/system/object
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/system/oid
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/system/rwlock
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/system/stress
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/system/string
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/system/string2
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkixutil
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/sample_apps
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/sample_apps/build_chain
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/sample_apps/dumpcert
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/sample_apps/dumpcrl
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/sample_apps/validate_chain
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/testutil
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/testwrapper
cvs checkout: Updating mozilla/security/nss/cmd/listsuites
cvs checkout: Updating mozilla/security/nss/cmd/lowhashtest
cvs checkout: Updating mozilla/security/nss/cmd/makepqg
cvs checkout: Updating mozilla/security/nss/cmd/modutil
cvs checkout: Updating mozilla/security/nss/cmd/multinit
cvs checkout: Updating mozilla/security/nss/cmd/nssutil
cvs checkout: Updating mozilla/security/nss/cmd/ocspclnt
cvs checkout: Updating mozilla/security/nss/cmd/ocspresp
cvs checkout: Updating mozilla/security/nss/cmd/oidcalc
cvs checkout: Updating mozilla/security/nss/cmd/p7content
cvs checkout: Updating mozilla/security/nss/cmd/p7env
cvs checkout: Updating mozilla/security/nss/cmd/p7sign
cvs checkout: Updating mozilla/security/nss/cmd/p7verify
cvs checkout: Updating mozilla/security/nss/cmd/pemtest
cvs checkout: Updating mozilla/security/nss/cmd/pemtests
cvs checkout: Updating mozilla/security/nss/cmd/pemutil
cvs checkout: Updating mozilla/security/nss/cmd/pk11info
cvs checkout: Updating mozilla/security/nss/cmd/pk11mode
cvs checkout: Updating mozilla/security/nss/cmd/pk11util
cvs checkout: Updating mozilla/security/nss/cmd/pk11util/scripts
cvs checkout: Updating mozilla/security/nss/cmd/pk12util
cvs checkout: Updating mozilla/security/nss/cmd/pk1sign
cvs checkout: Updating mozilla/security/nss/cmd/pkiutil
cvs checkout: Updating mozilla/security/nss/cmd/pkix-errcodes
cvs checkout: Updating mozilla/security/nss/cmd/pp
cvs checkout: Updating mozilla/security/nss/cmd/ppcertdata
cvs checkout: Updating mozilla/security/nss/cmd/preenc
cvs checkout: Updating mozilla/security/nss/cmd/psmmsgs
cvs checkout: Updating mozilla/security/nss/cmd/pwdecrypt
cvs checkout: Updating mozilla/security/nss/cmd/regress
cvs checkout: Updating mozilla/security/nss/cmd/replacer
cvs checkout: Updating mozilla/security/nss/cmd/reporter
cvs checkout: Updating mozilla/security/nss/cmd/reporter/tests
cvs checkout: Updating mozilla/security/nss/cmd/revoker
cvs checkout: Updating mozilla/security/nss/cmd/rsaperf
cvs checkout: Updating mozilla/security/nss/cmd/rsaperflo
cvs checkout: Updating mozilla/security/nss/cmd/rsapoptst
cvs checkout: Updating mozilla/security/nss/cmd/samples
cvs checkout: Updating mozilla/security/nss/cmd/sdrtest
cvs checkout: Updating mozilla/security/nss/cmd/selfserv
cvs checkout: Updating mozilla/security/nss/cmd/shexp
cvs checkout: Updating mozilla/security/nss/cmd/shlibsign
cvs checkout: Updating mozilla/security/nss/cmd/shlibsign/mangle
cvs checkout: Updating mozilla/security/nss/cmd/signtool
cvs checkout: Updating mozilla/security/nss/cmd/signver
cvs checkout: Updating mozilla/security/nss/cmd/signver/examples
cvs checkout: Updating mozilla/security/nss/cmd/signver/examples/1
cvs checkout: Updating mozilla/security/nss/cmd/smimetools
cvs checkout: Updating mozilla/security/nss/cmd/sslstrength
cvs checkout: Updating mozilla/security/nss/cmd/ssltap
cvs checkout: Updating mozilla/security/nss/cmd/stopselfserv
cvs checkout: Updating mozilla/security/nss/cmd/strsclnt
cvs checkout: Updating mozilla/security/nss/cmd/swfort
cvs checkout: Updating mozilla/security/nss/cmd/swfort/instinit
cvs checkout: Updating mozilla/security/nss/cmd/swfort/newuser
cvs checkout: Updating mozilla/security/nss/cmd/symkeyutil
cvs checkout: Updating mozilla/security/nss/cmd/sysinit
cvs checkout: Updating mozilla/security/nss/cmd/tests
cvs checkout: Updating mozilla/security/nss/cmd/tstclnt
cvs checkout: Updating mozilla/security/nss/cmd/ttformat
cvs checkout: Updating mozilla/security/nss/cmd/vfychain
cvs checkout: Updating mozilla/security/nss/cmd/vfyserv
cvs checkout: Updating mozilla/security/nss/cmd/zlib
cvs checkout: Updating mozilla/security/nss/coverage
cvs checkout: Updating mozilla/security/nss/lib
cvs checkout: Updating mozilla/security/nss/lib/asn1
cvs checkout: Updating mozilla/security/nss/lib/base
cvs checkout: Updating mozilla/security/nss/lib/certdb
cvs checkout: Updating mozilla/security/nss/lib/certhigh
cvs checkout: Updating mozilla/security/nss/lib/ckfw
cvs checkout: Updating mozilla/security/nss/lib/ckfw/builtins
cvs checkout: Updating mozilla/security/nss/lib/ckfw/capi
cvs checkout: Updating mozilla/security/nss/lib/ckfw/dbm
cvs checkout: Updating mozilla/security/nss/lib/ckfw/nssmkey
cvs checkout: Updating mozilla/security/nss/lib/ckfw/pem
cvs checkout: Updating mozilla/security/nss/lib/crmf
cvs checkout: Updating mozilla/security/nss/lib/cryptohi
cvs checkout: Updating mozilla/security/nss/lib/dev
cvs checkout: Updating mozilla/security/nss/lib/fortcrypt
cvs checkout: Updating mozilla/security/nss/lib/fortcrypt/libci
cvs checkout: Updating mozilla/security/nss/lib/fortcrypt/swfort
cvs checkout: Updating mozilla/security/nss/lib/fortcrypt/swfort/pkcs11
cvs checkout: Updating mozilla/security/nss/lib/freebl
cvs checkout: Updating mozilla/security/nss/lib/freebl/ecl
U mozilla/security/nss/lib/freebl/ecl/ecl-curve.h
cvs checkout: Updating mozilla/security/nss/lib/freebl/ecl/tests
cvs checkout: Updating mozilla/security/nss/lib/freebl/mpi
cvs checkout: Updating mozilla/security/nss/lib/freebl/mpi/doc
cvs checkout: Updating mozilla/security/nss/lib/freebl/mpi/tests
cvs checkout: Updating mozilla/security/nss/lib/freebl/mpi/utils
cvs checkout: Updating mozilla/security/nss/lib/freebl/tfm
cvs checkout: Updating mozilla/security/nss/lib/freebl/tfm/demo
cvs checkout: Updating mozilla/security/nss/lib/freebl/tfm/mtest
cvs checkout: Updating mozilla/security/nss/lib/hash
cvs checkout: Updating mozilla/security/nss/lib/jar
cvs checkout: Updating mozilla/security/nss/lib/libpkix
cvs checkout: Updating mozilla/security/nss/lib/libpkix/include
cvs checkout: Updating mozilla/security/nss/lib/libpkix/pkix
cvs checkout: Updating mozilla/security/nss/lib/libpkix/pkix/certsel
cvs checkout: Updating mozilla/security/nss/lib/libpkix/pkix/checker
cvs checkout: Updating mozilla/security/nss/lib/libpkix/pkix/crlsel
cvs checkout: Updating mozilla/security/nss/lib/libpkix/pkix/params
cvs checkout: Updating mozilla/security/nss/lib/libpkix/pkix/results
cvs checkout: Updating mozilla/security/nss/lib/libpkix/pkix/store
cvs checkout: Updating mozilla/security/nss/lib/libpkix/pkix/top
cvs checkout: Updating mozilla/security/nss/lib/libpkix/pkix/util
cvs checkout: Updating mozilla/security/nss/lib/libpkix/pkix_pl_nss
cvs checkout: Updating mozilla/security/nss/lib/libpkix/pkix_pl_nss/module
cvs checkout: Updating mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki
cvs checkout: Updating mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki/SunOS5.10_DBG.OBJ
cvs checkout: Updating mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki/SunOS5.10_i86pc_gcc_DBG.OBJ
cvs checkout: Updating mozilla/security/nss/lib/libpkix/pkix_pl_nss/system
cvs checkout: Updating mozilla/security/nss/lib/macbuild
cvs checkout: Updating mozilla/security/nss/lib/macbuild/NSS
cvs checkout: Updating mozilla/security/nss/lib/macbuild/NSS/NSS
cvs checkout: Updating mozilla/security/nss/lib/nss
cvs checkout: Updating mozilla/security/nss/lib/pk11wrap
cvs checkout: Updating mozilla/security/nss/lib/pkcs12
cvs checkout: Updating mozilla/security/nss/lib/pkcs7
cvs checkout: Updating mozilla/security/nss/lib/pki
cvs checkout: Updating mozilla/security/nss/lib/pki/doc
cvs checkout: Updating mozilla/security/nss/lib/pki1
cvs checkout: Updating mozilla/security/nss/lib/pkix
cvs checkout: Updating mozilla/security/nss/lib/pkix/doc
cvs checkout: Updating mozilla/security/nss/lib/pkix/include
cvs checkout: Updating mozilla/security/nss/lib/pkix/src
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/AccessDescription
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/AdministrationDomainName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/AlgorithmIdentifier
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/AnotherName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/Attribute
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/AttributeTypeAndValue
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/AuthorityInfoAccessSyntax
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/AuthorityKeyIdentifier
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/BasicConstraints
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/BuiltInDomainDefinedAttribute
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/BuiltInDomainDefinedAttributes
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/BuiltInStandardAttributes
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/CPSuri
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/CRLDistPointsSyntax
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/Certificate
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/CertificateList
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/CertificatePolicies
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/CommonName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/CountryName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/DirectoryString
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/DisplayText
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/DistributionPoint
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/DistributionPointName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/EDIPartyName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/ExtKeyUsageSyntax
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/ExtendedNetworkAddress
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/ExtensionAttribute
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/ExtensionAttributes
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/GeneralName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/GeneralNames
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/GeneralSubtree
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/GeneralSubtrees
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/IssuingDistributionPoint
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/KeyUsage
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/Name
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/NameConstraints
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/NetworkAddress
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/NoticeReference
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/NumericUserIdentifier
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/ORAddress
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/OrganizationName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/OrganizationalUnitName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/OrganizationalUnitNames
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/PDSName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/PDSParameter
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/PersonalName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/PhysicalDeliveryCountryName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/Pkcs9email
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/PolicyConstraints
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/PolicyInformation
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/PolicyMappings
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/PolicyQualifierInfo
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/PostalCode
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/PrivateDomainName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/PrivateKeyUsagePeriod
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/RDNSequence
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/ReasonFlags
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/RelativeDistinguishedName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/SubjectDirectoryAttributes
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/SubjectPublicKeyInfo
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/TBSCertList
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/TBSCertificate
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/TeletexCommonName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/TeletexDomainDefinedAttribute
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/TeletexDomainDefinedAttributes
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/TeletexOrganizationName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/TeletexOrganizationalUnitName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/TeletexOrganizationalUnitNames
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/TeletexPersonalName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/TerminalIdentifier
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/Time
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/UserNotice
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/Validity
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/X121Address
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/X520CommonName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/X520LocalityName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/X520Name
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/X520OrganizationName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/X520OrganizationalUnitName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/X520StateOrProvinceName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/X520Title
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/X520countryName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/X520dnQualifier
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/e1634Address
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/policyMapping
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/revokedCertificate
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/revokedCertificates
cvs checkout: Updating mozilla/security/nss/lib/pkix/test
cvs checkout: Updating mozilla/security/nss/lib/rdb
cvs checkout: Updating mozilla/security/nss/lib/smime
cvs checkout: Updating mozilla/security/nss/lib/softoken
cvs checkout: Updating mozilla/security/nss/lib/softoken/legacydb
cvs checkout: Updating mozilla/security/nss/lib/sqlite
cvs checkout: Updating mozilla/security/nss/lib/ssl
cvs checkout: Updating mozilla/security/nss/lib/sysinit
cvs checkout: Updating mozilla/security/nss/lib/util
cvs checkout: Updating mozilla/security/nss/lib/zlib
cvs checkout: Updating mozilla/security/nss/lib/zlib/patches
cvs checkout: Updating mozilla/security/nss/macbuild
cvs checkout: Updating mozilla/security/nss/pkg
cvs checkout: Updating mozilla/security/nss/pkg/linux
cvs checkout: Updating mozilla/security/nss/pkg/solaris
cvs checkout: Updating mozilla/security/nss/pkg/solaris/SUNWnss3
cvs checkout: Updating mozilla/security/nss/pkg/solaris/SUNWtls
cvs checkout: Updating mozilla/security/nss/pkg/solaris/SUNWtls-devl
cvs checkout: Updating mozilla/security/nss/pkg/solaris/SUNWtlsd
cvs checkout: Updating mozilla/security/nss/pkg/solaris/SUNWtlsdx
cvs checkout: Updating mozilla/security/nss/pkg/solaris/SUNWtlsu
cvs checkout: Updating mozilla/security/nss/pkg/solaris/SUNWtlsux
cvs checkout: Updating mozilla/security/nss/pkg/solaris/SUNWtlsx
cvs checkout: Updating mozilla/security/nss/pkg/solaris/SUNWtlsx-devl
cvs checkout: Updating mozilla/security/nss/pkg/solaris/common_files
cvs checkout: Updating mozilla/security/nss/ppcertdata
cvs checkout: Updating mozilla/security/nss/tests
cvs checkout: Updating mozilla/security/nss/tests/bltest
cvs checkout: Updating mozilla/security/nss/tests/cert
cvs checkout: Updating mozilla/security/nss/tests/chains
cvs checkout: Updating mozilla/security/nss/tests/chains/ocspd-config
cvs checkout: Updating mozilla/security/nss/tests/chains/scenarios
cvs checkout: Updating mozilla/security/nss/tests/cipher
cvs checkout: Updating mozilla/security/nss/tests/cmdtests
cvs checkout: Updating mozilla/security/nss/tests/common
cvs checkout: Updating mozilla/security/nss/tests/crmf
cvs checkout: Updating mozilla/security/nss/tests/dbtests
cvs checkout: Updating mozilla/security/nss/tests/dbupgrade
cvs checkout: Updating mozilla/security/nss/tests/doc
cvs checkout: Updating mozilla/security/nss/tests/fips
cvs checkout: Updating mozilla/security/nss/tests/iopr
cvs checkout: Updating mozilla/security/nss/tests/iopr/cgi-bin
cvs checkout: Updating mozilla/security/nss/tests/iopr/server_scr
cvs checkout: Updating mozilla/security/nss/tests/libpkix
cvs checkout: Updating mozilla/security/nss/tests/libpkix/certs
cvs checkout: Updating mozilla/security/nss/tests/libpkix/certs/extKeyUsage
cvs checkout: Updating mozilla/security/nss/tests/libpkix/certs/generalName
cvs checkout: Updating mozilla/security/nss/tests/libpkix/certs/keyIdentifier
cvs checkout: Updating mozilla/security/nss/tests/libpkix/certs/keyUsage
cvs checkout: Updating mozilla/security/nss/tests/libpkix/certs/publicKey
cvs checkout: Updating mozilla/security/nss/tests/libpkix/common
cvs checkout: Updating mozilla/security/nss/tests/libpkix/libpkix
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_pl_tests
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_pl_tests/module
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_pl_tests/module/rev_data
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_pl_tests/module/rev_data/local
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_pl_tests/pki
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_pl_tests/pki/rev_data
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_pl_tests/pki/rev_data/local
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_pl_tests/system
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/certsel
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/checker
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/crlsel
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/params
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/results
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/store
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/build_data
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/build_data/backtracking
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/build_data/backtracking/signature
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/build_data/multi_path
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/build_data/multi_path/signature
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/build_data/multi_path/signature/fail
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/build_data/multi_path/signature/pass
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/build_data/single_path
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/build_data/single_path/signature
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/build_data/single_path/signature/fail
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/build_data/single_path/signature/pass
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/build_data/test1
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/build_data/test2
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/build_data/test3
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/rev_data
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/rev_data/crlchecker
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/rev_data/multiple_certstores
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/rev_data/multiple_certstores/store1
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/rev_data/multiple_certstores/store2
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/util
cvs checkout: Updating mozilla/security/nss/tests/libpkix/sample_apps
cvs checkout: Updating mozilla/security/nss/tests/lowhash
cvs checkout: Updating mozilla/security/nss/tests/memleak
cvs checkout: Updating mozilla/security/nss/tests/merge
cvs checkout: Updating mozilla/security/nss/tests/multinit
cvs checkout: Updating mozilla/security/nss/tests/ocsp
cvs checkout: Updating mozilla/security/nss/tests/pem
cvs checkout: Updating mozilla/security/nss/tests/perf
cvs checkout: Updating mozilla/security/nss/tests/pkcs11
cvs checkout: Updating mozilla/security/nss/tests/pkcs11/netscape
cvs checkout: Updating mozilla/security/nss/tests/pkcs11/netscape/suites
cvs checkout: Updating mozilla/security/nss/tests/pkcs11/netscape/suites/security
cvs checkout: Updating mozilla/security/nss/tests/pkcs11/netscape/suites/security/pkcs11
cvs checkout: Updating mozilla/security/nss/tests/pkcs11/netscape/suites/security/ssl
cvs checkout: Updating mozilla/security/nss/tests/pkcs11/netscape/suites/security/ssl/AIX4.3_DBG.OBJ
cvs checkout: Updating mozilla/security/nss/tests/pkcs11/netscape/trivial
cvs checkout: Updating mozilla/security/nss/tests/pkits
cvs checkout: Updating mozilla/security/nss/tests/sdr
cvs checkout: Updating mozilla/security/nss/tests/smime
cvs checkout: Updating mozilla/security/nss/tests/ssl
cvs checkout: Updating mozilla/security/nss/tests/stan
cvs checkout: Updating mozilla/security/nss/tests/stan/client
cvs checkout: Updating mozilla/security/nss/tests/stan/server
cvs checkout: Updating mozilla/security/nss/tests/tools
TB [2012-11-28 10:54:46] CVS checkout mozilla/security/nss PASSED
TB [2012-11-28 10:54:46] $ cvs -d :pserver:anonymous@cvs-mirror.mozilla.org:/cvsroot co -A mozilla/security/jss
cvs checkout: Updating mozilla/security/jss
cvs checkout: Updating mozilla/security/jss/cmd
cvs checkout: Updating mozilla/security/jss/cmd/jssjava
cvs checkout: Updating mozilla/security/jss/com
cvs checkout: Updating mozilla/security/jss/config
cvs checkout: Updating mozilla/security/jss/lib
cvs checkout: Updating mozilla/security/jss/org
cvs checkout: Updating mozilla/security/jss/org/mozilla
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/SecretDecoderRing
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/asn1
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/crypto
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/crypto_native
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/fips181
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/hclhacks
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/manage
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/pkcs10
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/pkcs11
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/pkcs12
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/pkcs7
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/pkix
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/pkix/cert
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/pkix/cmc
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/pkix/cmmf
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/pkix/cms
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/pkix/crmf
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/pkix/primitive
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/provider
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/provider/java
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/provider/java/security
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/provider/javax
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/provider/javax/crypto
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/ssl
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/tests
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/util
cvs checkout: Updating mozilla/security/jss/pkg
cvs checkout: Updating mozilla/security/jss/pkg/linux
cvs checkout: Updating mozilla/security/jss/pkg/solaris
cvs checkout: Updating mozilla/security/jss/pkg/solaris/ROOT-SunOS5.8_DBG.OBJ
cvs checkout: Updating mozilla/security/jss/pkg/solaris/SUNWjss
cvs checkout: Updating mozilla/security/jss/pkg/solaris/SUNWjss3
cvs checkout: Updating mozilla/security/jss/pkg/solaris/SUNWjssx
cvs checkout: Updating mozilla/security/jss/pkg/solaris/common_files
cvs checkout: Updating mozilla/security/jss/samples
TB [2012-11-28 10:54:47] CVS checkout mozilla/security/jss PASSED
TB [2012-11-28 10:54:47] $ cvs -d :pserver:anonymous@cvs-mirror.mozilla.org:/cvsroot co -A -r NSS_3_11_1_RTM mozilla/security/nss/lib/freebl/ecl/ecl-curve.h
U mozilla/security/nss/lib/freebl/ecl/ecl-curve.h
TB [2012-11-28 10:54:49] CVS checkout -r NSS_3_11_1_RTM mozilla/security/nss/lib/freebl/ecl/ecl-curve.h PASSED
TB [2012-11-28 10:54:49] $ cvs -d :pserver:anonymous@cvs-mirror.mozilla.org:/cvsroot stat mozilla
TB [2012-11-28 10:54:52] CVS stat mozilla PASSED
TB [2012-11-28 10:54:57] $ cd /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT
TB [2012-11-28 10:54:57] ######## NSS - build - 32 bits - OPT ########
TB [2012-11-28 10:54:57] $ cd /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss
TB [2012-11-28 10:54:57] $ gmake clean nss_build_all
rm -rf     Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
cd lib; gmake clean
gmake[1]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib'
rm -rf     Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
cd util; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/util'
rm -rf Linux3.6_x86_glibc_PTH_OPT.OBJ/libnssutil.a Linux3.6_x86_glibc_PTH_OPT.OBJ/libnssutil3.so  Linux3.6_x86_glibc_PTH_OPT.OBJ/quickder.o Linux3.6_x86_glibc_PTH_OPT.OBJ/secdig.o Linux3.6_x86_glibc_PTH_OPT.OBJ/derdec.o Linux3.6_x86_glibc_PTH_OPT.OBJ/derenc.o Linux3.6_x86_glibc_PTH_OPT.OBJ/dersubr.o Linux3.6_x86_glibc_PTH_OPT.OBJ/dertime.o Linux3.6_x86_glibc_PTH_OPT.OBJ/errstrs.o Linux3.6_x86_glibc_PTH_OPT.OBJ/nssb64d.o Linux3.6_x86_glibc_PTH_OPT.OBJ/nssb64e.o Linux3.6_x86_glibc_PTH_OPT.OBJ/nssrwlk.o Linux3.6_x86_glibc_PTH_OPT.OBJ/nssilock.o Linux3.6_x86_glibc_PTH_OPT.OBJ/oidstring.o Linux3.6_x86_glibc_PTH_OPT.OBJ/portreg.o Linux3.6_x86_glibc_PTH_OPT.OBJ/secalgid.o Linux3.6_x86_glibc_PTH_OPT.OBJ/secasn1d.o Linux3.6_x86_glibc_PTH_OPT.OBJ/secasn1e.o Linux3.6_x86_glibc_PTH_OPT.OBJ/secasn1u.o Linux3.6_x86_glibc_PTH_OPT.OBJ/secitem.o Linux3.6_x86_glibc_PTH_OPT.OBJ/secload.o Linux3.6_x86_glibc_PTH_OPT.OBJ/secoid.o Linux3.6_x86_glibc_PTH_OPT.OBJ/sectime.o Linux3.6_x86_glibc_PTH_OPT.OBJ/secport.o Linux3.6_x86_glibc_PTH_OPT.OBJ/templates.o Linux3.6_x86_glibc_PTH_OPT.OBJ/utf8.o Linux3.6_x86_glibc_PTH_OPT.OBJ/utilmod.o Linux3.6_x86_glibc_PTH_OPT.OBJ/utilpars.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/util'
cd freebl; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/freebl'
rm -rf Linux3.6_x86_glibc_PTH_OPT.OBJ/libfreebl.a Linux3.6_x86_glibc_PTH_OPT.OBJ/libfreebl3.so  Linux3.6_x86_glibc_PTH_OPT.OBJ/loader.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core   so_locations  Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB 
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/freebl'
cd sqlite; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/sqlite'
rm -rf Linux3.6_x86_glibc_PTH_OPT.OBJ/libsqlite.a Linux3.6_x86_glibc_PTH_OPT.OBJ/libsqlite3.so  Linux3.6_x86_glibc_PTH_OPT.OBJ/sqlite3.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/sqlite'
cd softoken; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/softoken'
rm -rf Linux3.6_x86_glibc_PTH_OPT.OBJ/libsoftokn.a Linux3.6_x86_glibc_PTH_OPT.OBJ/libsoftokn3.so  Linux3.6_x86_glibc_PTH_OPT.OBJ/ecdecode.o Linux3.6_x86_glibc_PTH_OPT.OBJ/fipsaudt.o Linux3.6_x86_glibc_PTH_OPT.OBJ/fipstest.o Linux3.6_x86_glibc_PTH_OPT.OBJ/fipstokn.o Linux3.6_x86_glibc_PTH_OPT.OBJ/lgglue.o Linux3.6_x86_glibc_PTH_OPT.OBJ/lowkey.o Linux3.6_x86_glibc_PTH_OPT.OBJ/lowpbe.o Linux3.6_x86_glibc_PTH_OPT.OBJ/padbuf.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkcs11.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkcs11c.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkcs11u.o Linux3.6_x86_glibc_PTH_OPT.OBJ/rsawrapr.o Linux3.6_x86_glibc_PTH_OPT.OBJ/sdb.o Linux3.6_x86_glibc_PTH_OPT.OBJ/sftkdb.o Linux3.6_x86_glibc_PTH_OPT.OBJ/sftkpars.o Linux3.6_x86_glibc_PTH_OPT.OBJ/sftkpwd.o Linux3.6_x86_glibc_PTH_OPT.OBJ/softkver.o Linux3.6_x86_glibc_PTH_OPT.OBJ/tlsprf.o Linux3.6_x86_glibc_PTH_OPT.OBJ/jpakesftk.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
cd legacydb; gmake clean
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/softoken/legacydb'
rm -rf Linux3.6_x86_glibc_PTH_OPT.OBJ/libnssdbm.a Linux3.6_x86_glibc_PTH_OPT.OBJ/libnssdbm3.so  Linux3.6_x86_glibc_PTH_OPT.OBJ/dbmshim.o Linux3.6_x86_glibc_PTH_OPT.OBJ/keydb.o Linux3.6_x86_glibc_PTH_OPT.OBJ/lgattr.o Linux3.6_x86_glibc_PTH_OPT.OBJ/lgcreate.o Linux3.6_x86_glibc_PTH_OPT.OBJ/lgdestroy.o Linux3.6_x86_glibc_PTH_OPT.OBJ/lgfind.o Linux3.6_x86_glibc_PTH_OPT.OBJ/lginit.o Linux3.6_x86_glibc_PTH_OPT.OBJ/lgutil.o Linux3.6_x86_glibc_PTH_OPT.OBJ/lowcert.o Linux3.6_x86_glibc_PTH_OPT.OBJ/lowkey.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pcertdb.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11db.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/softoken/legacydb'
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/softoken'
cd base; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/base'
rm -rf Linux3.6_x86_glibc_PTH_OPT.OBJ/libnssb.a Linux3.6_x86_glibc_PTH_OPT.OBJ/arena.o Linux3.6_x86_glibc_PTH_OPT.OBJ/error.o Linux3.6_x86_glibc_PTH_OPT.OBJ/errorval.o Linux3.6_x86_glibc_PTH_OPT.OBJ/hashops.o Linux3.6_x86_glibc_PTH_OPT.OBJ/libc.o Linux3.6_x86_glibc_PTH_OPT.OBJ/tracker.o Linux3.6_x86_glibc_PTH_OPT.OBJ/item.o Linux3.6_x86_glibc_PTH_OPT.OBJ/utf8.o Linux3.6_x86_glibc_PTH_OPT.OBJ/list.o Linux3.6_x86_glibc_PTH_OPT.OBJ/hash.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/base'
cd dev; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/dev'
rm -rf Linux3.6_x86_glibc_PTH_OPT.OBJ/libnssdev.a Linux3.6_x86_glibc_PTH_OPT.OBJ/devslot.o Linux3.6_x86_glibc_PTH_OPT.OBJ/devtoken.o Linux3.6_x86_glibc_PTH_OPT.OBJ/devutil.o Linux3.6_x86_glibc_PTH_OPT.OBJ/ckhelper.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/dev'
cd pki; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/pki'
rm -rf Linux3.6_x86_glibc_PTH_OPT.OBJ/libnsspki.a Linux3.6_x86_glibc_PTH_OPT.OBJ/asymmkey.o Linux3.6_x86_glibc_PTH_OPT.OBJ/certificate.o Linux3.6_x86_glibc_PTH_OPT.OBJ/cryptocontext.o Linux3.6_x86_glibc_PTH_OPT.OBJ/symmkey.o Linux3.6_x86_glibc_PTH_OPT.OBJ/trustdomain.o Linux3.6_x86_glibc_PTH_OPT.OBJ/tdcache.o Linux3.6_x86_glibc_PTH_OPT.OBJ/certdecode.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkistore.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkibase.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pki3hack.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/pki'
cd libpkix; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix'
rm -rf   Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
cd include; gmake clean
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/include'
rm -rf   Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/include'
cd pkix; gmake clean
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix'
rm -rf   Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
cd certsel; gmake clean
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/certsel'
rm -rf Linux3.6_x86_glibc_PTH_OPT.OBJ/libpkixcertsel.a Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_certselector.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_comcertselparams.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/certsel'
cd crlsel; gmake clean
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/crlsel'
rm -rf Linux3.6_x86_glibc_PTH_OPT.OBJ/libpkixcrlsel.a Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_crlselector.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_comcrlselparams.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/crlsel'
cd checker; gmake clean
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/checker'
rm -rf Linux3.6_x86_glibc_PTH_OPT.OBJ/libpkixchecker.a Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_basicconstraintschecker.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_certchainchecker.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_crlchecker.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_ekuchecker.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_expirationchecker.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_namechainingchecker.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_nameconstraintschecker.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_ocspchecker.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_revocationmethod.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_revocationchecker.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_policychecker.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_signaturechecker.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_targetcertchecker.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/checker'
cd params; gmake clean
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/params'
rm -rf Linux3.6_x86_glibc_PTH_OPT.OBJ/libpkixparams.a Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_trustanchor.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_procparams.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_valparams.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_resourcelimits.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/params'
cd results; gmake clean
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/results'
rm -rf Linux3.6_x86_glibc_PTH_OPT.OBJ/libpkixresults.a Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_buildresult.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_policynode.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_valresult.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_verifynode.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/results'
cd store; gmake clean
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/store'
rm -rf Linux3.6_x86_glibc_PTH_OPT.OBJ/libpkixstore.a Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_store.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/store'
cd top; gmake clean
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/top'
rm -rf Linux3.6_x86_glibc_PTH_OPT.OBJ/libpkixtop.a Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_validate.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_lifecycle.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_build.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/top'
cd util; gmake clean
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/util'
rm -rf Linux3.6_x86_glibc_PTH_OPT.OBJ/libpkixutil.a Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_tools.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_error.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_logger.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_list.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_errpaths.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/util'
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix'
cd pkix_pl_nss; gmake clean
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix_pl_nss'
rm -rf   Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
cd pki; gmake clean
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki'
rm -rf Linux3.6_x86_glibc_PTH_OPT.OBJ/libpkixpki.a Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_basicconstraints.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_cert.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyinfo.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_certpolicymap.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyqualifier.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_crl.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_crldp.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_crlentry.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_date.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_generalname.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_infoaccess.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_nameconstraints.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ocsprequest.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ocspresponse.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_publickey.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_x500name.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ocspcertid.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki'
cd system; gmake clean
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system'
rm -rf Linux3.6_x86_glibc_PTH_OPT.OBJ/libpkixsystem.a Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_bigint.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_bytearray.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_common.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_error.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_hashtable.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_lifecycle.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_mem.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_monitorlock.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_mutex.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_object.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_oid.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_primhash.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_rwlock.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_string.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system'
cd module; gmake clean
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module'
rm -rf Linux3.6_x86_glibc_PTH_OPT.OBJ/libpkixmodule.a Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_aiamgr.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_colcertstore.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_httpcertstore.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_httpdefaultclient.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ldaptemplates.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ldapcertstore.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ldapresponse.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ldaprequest.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ldapdefaultclient.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_nsscontext.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_pk11certstore.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_socket.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module'
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix_pl_nss'
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix'
cd certdb; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/certdb'
rm -rf Linux3.6_x86_glibc_PTH_OPT.OBJ/libcertdb.a Linux3.6_x86_glibc_PTH_OPT.OBJ/alg1485.o Linux3.6_x86_glibc_PTH_OPT.OBJ/certdb.o Linux3.6_x86_glibc_PTH_OPT.OBJ/certv3.o Linux3.6_x86_glibc_PTH_OPT.OBJ/certxutl.o Linux3.6_x86_glibc_PTH_OPT.OBJ/crl.o Linux3.6_x86_glibc_PTH_OPT.OBJ/genname.o Linux3.6_x86_glibc_PTH_OPT.OBJ/stanpcertdb.o Linux3.6_x86_glibc_PTH_OPT.OBJ/polcyxtn.o Linux3.6_x86_glibc_PTH_OPT.OBJ/secname.o Linux3.6_x86_glibc_PTH_OPT.OBJ/xauthkid.o Linux3.6_x86_glibc_PTH_OPT.OBJ/xbsconst.o Linux3.6_x86_glibc_PTH_OPT.OBJ/xconst.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/certdb'
cd certhigh; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/certhigh'
rm -rf Linux3.6_x86_glibc_PTH_OPT.OBJ/libcerthi.a Linux3.6_x86_glibc_PTH_OPT.OBJ/certhtml.o Linux3.6_x86_glibc_PTH_OPT.OBJ/certreq.o Linux3.6_x86_glibc_PTH_OPT.OBJ/crlv2.o Linux3.6_x86_glibc_PTH_OPT.OBJ/ocsp.o Linux3.6_x86_glibc_PTH_OPT.OBJ/ocspsig.o Linux3.6_x86_glibc_PTH_OPT.OBJ/certhigh.o Linux3.6_x86_glibc_PTH_OPT.OBJ/certvfy.o Linux3.6_x86_glibc_PTH_OPT.OBJ/certvfypkix.o Linux3.6_x86_glibc_PTH_OPT.OBJ/certvfypkixprint.o Linux3.6_x86_glibc_PTH_OPT.OBJ/xcrldist.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/certhigh'
cd pk11wrap; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/pk11wrap'
rm -rf Linux3.6_x86_glibc_PTH_OPT.OBJ/libpk11wrap.a Linux3.6_x86_glibc_PTH_OPT.OBJ/dev3hack.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11akey.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11auth.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11cert.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11cxt.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11err.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11kea.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11list.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11load.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11mech.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11merge.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11nobj.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11obj.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11pars.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11pbe.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11pk12.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11pqg.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11sdr.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11skey.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11slot.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11util.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/pk11wrap'
cd cryptohi; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/cryptohi'
rm -rf Linux3.6_x86_glibc_PTH_OPT.OBJ/libcryptohi.a Linux3.6_x86_glibc_PTH_OPT.OBJ/sechash.o Linux3.6_x86_glibc_PTH_OPT.OBJ/seckey.o Linux3.6_x86_glibc_PTH_OPT.OBJ/secsign.o Linux3.6_x86_glibc_PTH_OPT.OBJ/secvfy.o Linux3.6_x86_glibc_PTH_OPT.OBJ/dsautil.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/cryptohi'
cd nss; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/nss'
rm -rf Linux3.6_x86_glibc_PTH_OPT.OBJ/libnss.a Linux3.6_x86_glibc_PTH_OPT.OBJ/libnss3.so  Linux3.6_x86_glibc_PTH_OPT.OBJ/nssinit.o Linux3.6_x86_glibc_PTH_OPT.OBJ/nssver.o Linux3.6_x86_glibc_PTH_OPT.OBJ/utilwrap.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/nss'
cd ssl; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/ssl'
rm -rf Linux3.6_x86_glibc_PTH_OPT.OBJ/libssl.a Linux3.6_x86_glibc_PTH_OPT.OBJ/libssl3.so  Linux3.6_x86_glibc_PTH_OPT.OBJ/derive.o Linux3.6_x86_glibc_PTH_OPT.OBJ/dtlscon.o Linux3.6_x86_glibc_PTH_OPT.OBJ/prelib.o Linux3.6_x86_glibc_PTH_OPT.OBJ/ssl3con.o Linux3.6_x86_glibc_PTH_OPT.OBJ/ssl3gthr.o Linux3.6_x86_glibc_PTH_OPT.OBJ/sslauth.o Linux3.6_x86_glibc_PTH_OPT.OBJ/sslcon.o Linux3.6_x86_glibc_PTH_OPT.OBJ/ssldef.o Linux3.6_x86_glibc_PTH_OPT.OBJ/sslenum.o Linux3.6_x86_glibc_PTH_OPT.OBJ/sslerr.o Linux3.6_x86_glibc_PTH_OPT.OBJ/sslerrstrs.o Linux3.6_x86_glibc_PTH_OPT.OBJ/sslinit.o Linux3.6_x86_glibc_PTH_OPT.OBJ/ssl3ext.o Linux3.6_x86_glibc_PTH_OPT.OBJ/sslgathr.o Linux3.6_x86_glibc_PTH_OPT.OBJ/sslmutex.o Linux3.6_x86_glibc_PTH_OPT.OBJ/sslnonce.o Linux3.6_x86_glibc_PTH_OPT.OBJ/sslreveal.o Linux3.6_x86_glibc_PTH_OPT.OBJ/sslsecur.o Linux3.6_x86_glibc_PTH_OPT.OBJ/sslsnce.o Linux3.6_x86_glibc_PTH_OPT.OBJ/sslsock.o Linux3.6_x86_glibc_PTH_OPT.OBJ/ssltrace.o Linux3.6_x86_glibc_PTH_OPT.OBJ/sslver.o Linux3.6_x86_glibc_PTH_OPT.OBJ/authcert.o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmpcert.o Linux3.6_x86_glibc_PTH_OPT.OBJ/sslinfo.o Linux3.6_x86_glibc_PTH_OPT.OBJ/ssl3ecc.o Linux3.6_x86_glibc_PTH_OPT.OBJ/unix_err.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/ssl'
cd pkcs12; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/pkcs12'
rm -rf Linux3.6_x86_glibc_PTH_OPT.OBJ/libpkcs12.a Linux3.6_x86_glibc_PTH_OPT.OBJ/p12local.o Linux3.6_x86_glibc_PTH_OPT.OBJ/p12creat.o Linux3.6_x86_glibc_PTH_OPT.OBJ/p12dec.o Linux3.6_x86_glibc_PTH_OPT.OBJ/p12plcy.o Linux3.6_x86_glibc_PTH_OPT.OBJ/p12tmpl.o Linux3.6_x86_glibc_PTH_OPT.OBJ/p12e.o Linux3.6_x86_glibc_PTH_OPT.OBJ/p12d.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/pkcs12'
cd pkcs7; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/pkcs7'
rm -rf Linux3.6_x86_glibc_PTH_OPT.OBJ/libpkcs7.a Linux3.6_x86_glibc_PTH_OPT.OBJ/certread.o Linux3.6_x86_glibc_PTH_OPT.OBJ/p7common.o Linux3.6_x86_glibc_PTH_OPT.OBJ/p7create.o Linux3.6_x86_glibc_PTH_OPT.OBJ/p7decode.o Linux3.6_x86_glibc_PTH_OPT.OBJ/p7encode.o Linux3.6_x86_glibc_PTH_OPT.OBJ/p7local.o Linux3.6_x86_glibc_PTH_OPT.OBJ/secmime.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/pkcs7'
cd smime; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/smime'
rm -rf Linux3.6_x86_glibc_PTH_OPT.OBJ/libsmime.a Linux3.6_x86_glibc_PTH_OPT.OBJ/libsmime3.so  Linux3.6_x86_glibc_PTH_OPT.OBJ/cmsarray.o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmsasn1.o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmsattr.o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmscinfo.o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmscipher.o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmsdecode.o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmsdigdata.o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmsdigest.o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmsencdata.o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmsencode.o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmsenvdata.o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmsmessage.o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmspubkey.o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmsrecinfo.o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmsreclist.o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmssigdata.o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmssiginfo.o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmsudf.o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmsutil.o Linux3.6_x86_glibc_PTH_OPT.OBJ/smimemessage.o Linux3.6_x86_glibc_PTH_OPT.OBJ/smimeutil.o Linux3.6_x86_glibc_PTH_OPT.OBJ/smimever.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/smime'
cd crmf; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/crmf'
rm -rf Linux3.6_x86_glibc_PTH_OPT.OBJ/libcrmf.a Linux3.6_x86_glibc_PTH_OPT.OBJ/crmfenc.o Linux3.6_x86_glibc_PTH_OPT.OBJ/crmftmpl.o Linux3.6_x86_glibc_PTH_OPT.OBJ/crmfreq.o Linux3.6_x86_glibc_PTH_OPT.OBJ/crmfpop.o Linux3.6_x86_glibc_PTH_OPT.OBJ/crmfdec.o Linux3.6_x86_glibc_PTH_OPT.OBJ/crmfget.o Linux3.6_x86_glibc_PTH_OPT.OBJ/crmfcont.o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmmfasn1.o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmmfresp.o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmmfrec.o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmmfchal.o Linux3.6_x86_glibc_PTH_OPT.OBJ/servget.o Linux3.6_x86_glibc_PTH_OPT.OBJ/encutil.o Linux3.6_x86_glibc_PTH_OPT.OBJ/respcli.o Linux3.6_x86_glibc_PTH_OPT.OBJ/respcmn.o Linux3.6_x86_glibc_PTH_OPT.OBJ/challcli.o Linux3.6_x86_glibc_PTH_OPT.OBJ/asn1cmn.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/crmf'
cd jar; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/jar'
rm -rf Linux3.6_x86_glibc_PTH_OPT.OBJ/libjar.a Linux3.6_x86_glibc_PTH_OPT.OBJ/jarver.o Linux3.6_x86_glibc_PTH_OPT.OBJ/jarsign.o Linux3.6_x86_glibc_PTH_OPT.OBJ/jar.o Linux3.6_x86_glibc_PTH_OPT.OBJ/jar-ds.o Linux3.6_x86_glibc_PTH_OPT.OBJ/jarfile.o Linux3.6_x86_glibc_PTH_OPT.OBJ/jarint.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/jar'
cd ckfw; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/ckfw'
rm -rf Linux3.6_x86_glibc_PTH_OPT.OBJ/libnssckfw.a Linux3.6_x86_glibc_PTH_OPT.OBJ/crypto.o Linux3.6_x86_glibc_PTH_OPT.OBJ/find.o Linux3.6_x86_glibc_PTH_OPT.OBJ/hash.o Linux3.6_x86_glibc_PTH_OPT.OBJ/instance.o Linux3.6_x86_glibc_PTH_OPT.OBJ/mutex.o Linux3.6_x86_glibc_PTH_OPT.OBJ/object.o Linux3.6_x86_glibc_PTH_OPT.OBJ/session.o Linux3.6_x86_glibc_PTH_OPT.OBJ/sessobj.o Linux3.6_x86_glibc_PTH_OPT.OBJ/slot.o Linux3.6_x86_glibc_PTH_OPT.OBJ/token.o Linux3.6_x86_glibc_PTH_OPT.OBJ/wrap.o Linux3.6_x86_glibc_PTH_OPT.OBJ/mechanism.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
cd builtins; gmake clean
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/ckfw/builtins'
rm -rf Linux3.6_x86_glibc_PTH_OPT.OBJ/libnssckbi.so Linux3.6_x86_glibc_PTH_OPT.OBJ/anchor.o Linux3.6_x86_glibc_PTH_OPT.OBJ/constants.o Linux3.6_x86_glibc_PTH_OPT.OBJ/bfind.o Linux3.6_x86_glibc_PTH_OPT.OBJ/binst.o Linux3.6_x86_glibc_PTH_OPT.OBJ/bobject.o Linux3.6_x86_glibc_PTH_OPT.OBJ/bsession.o Linux3.6_x86_glibc_PTH_OPT.OBJ/bslot.o Linux3.6_x86_glibc_PTH_OPT.OBJ/btoken.o Linux3.6_x86_glibc_PTH_OPT.OBJ/certdata.o Linux3.6_x86_glibc_PTH_OPT.OBJ/ckbiver.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/ckfw/builtins'
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/ckfw'
cd sysinit; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/sysinit'
rm -rf Linux3.6_x86_glibc_PTH_OPT.OBJ/libnsssysinit.a Linux3.6_x86_glibc_PTH_OPT.OBJ/libnsssysinit.so  Linux3.6_x86_glibc_PTH_OPT.OBJ/nsssysinit.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/sysinit'
gmake[1]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib'
cd cmd; gmake clean
gmake[1]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd'
rm -rf     Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
cd lib; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/lib'
rm -rf Linux3.6_x86_glibc_PTH_OPT.OBJ/libsectool.a Linux3.6_x86_glibc_PTH_OPT.OBJ/basicutil.o Linux3.6_x86_glibc_PTH_OPT.OBJ/secutil.o Linux3.6_x86_glibc_PTH_OPT.OBJ/secpwd.o Linux3.6_x86_glibc_PTH_OPT.OBJ/derprint.o Linux3.6_x86_glibc_PTH_OPT.OBJ/moreoids.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pppolicy.o Linux3.6_x86_glibc_PTH_OPT.OBJ/ffs.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11table.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/lib'
cd addbuiltin; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/addbuiltin'
rm -rf   Linux3.6_x86_glibc_PTH_OPT.OBJ/addbuiltin Linux3.6_x86_glibc_PTH_OPT.OBJ/addbuiltin.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/addbuiltin'
cd atob; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/atob'
rm -rf   Linux3.6_x86_glibc_PTH_OPT.OBJ/atob Linux3.6_x86_glibc_PTH_OPT.OBJ/atob.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/atob'
cd bltest; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/bltest'
rm -rf   Linux3.6_x86_glibc_PTH_OPT.OBJ/bltest Linux3.6_x86_glibc_PTH_OPT.OBJ/blapitest.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/bltest'
cd btoa; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/btoa'
rm -rf   Linux3.6_x86_glibc_PTH_OPT.OBJ/btoa Linux3.6_x86_glibc_PTH_OPT.OBJ/btoa.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/btoa'
cd certcgi; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/certcgi'
rm -rf   Linux3.6_x86_glibc_PTH_OPT.OBJ/certcgi Linux3.6_x86_glibc_PTH_OPT.OBJ/certcgi.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/certcgi'
cd certutil; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/certutil'
rm -rf   Linux3.6_x86_glibc_PTH_OPT.OBJ/certutil Linux3.6_x86_glibc_PTH_OPT.OBJ/certext.o Linux3.6_x86_glibc_PTH_OPT.OBJ/certutil.o Linux3.6_x86_glibc_PTH_OPT.OBJ/keystuff.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/certutil'
cd checkcert; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/checkcert'
rm -rf   Linux3.6_x86_glibc_PTH_OPT.OBJ/checkcert Linux3.6_x86_glibc_PTH_OPT.OBJ/checkcert.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/checkcert'
cd chktest; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/chktest'
rm -rf   Linux3.6_x86_glibc_PTH_OPT.OBJ/chktest Linux3.6_x86_glibc_PTH_OPT.OBJ/chktest.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/chktest'
cd crlutil; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/crlutil'
rm -rf   Linux3.6_x86_glibc_PTH_OPT.OBJ/crlutil Linux3.6_x86_glibc_PTH_OPT.OBJ/crlgen_lex.o Linux3.6_x86_glibc_PTH_OPT.OBJ/crlgen.o Linux3.6_x86_glibc_PTH_OPT.OBJ/crlutil.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/crlutil'
cd crmftest; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/crmftest'
rm -rf Linux3.6_x86_glibc_PTH_OPT.OBJ/crmftest Linux3.6_x86_glibc_PTH_OPT.OBJ/testcrmf.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/crmftest'
cd dbtest; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/dbtest'
rm -rf   Linux3.6_x86_glibc_PTH_OPT.OBJ/dbtest Linux3.6_x86_glibc_PTH_OPT.OBJ/dbtest.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/dbtest'
cd derdump; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/derdump'
rm -rf   Linux3.6_x86_glibc_PTH_OPT.OBJ/derdump Linux3.6_x86_glibc_PTH_OPT.OBJ/derdump.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/derdump'
cd digest; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/digest'
rm -rf   Linux3.6_x86_glibc_PTH_OPT.OBJ/digest Linux3.6_x86_glibc_PTH_OPT.OBJ/digest.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/digest'
cd httpserv; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/httpserv'
rm -rf   Linux3.6_x86_glibc_PTH_OPT.OBJ/httpserv Linux3.6_x86_glibc_PTH_OPT.OBJ/httpserv.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/httpserv'
cd fipstest; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/fipstest'
rm -rf   Linux3.6_x86_glibc_PTH_OPT.OBJ/fipstest Linux3.6_x86_glibc_PTH_OPT.OBJ/fipstest.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/fipstest'
cd lowhashtest; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/lowhashtest'
rm -rf   Linux3.6_x86_glibc_PTH_OPT.OBJ/lowhashtest Linux3.6_x86_glibc_PTH_OPT.OBJ/lowhashtest.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/lowhashtest'
cd listsuites; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/listsuites'
rm -rf   Linux3.6_x86_glibc_PTH_OPT.OBJ/listsuites Linux3.6_x86_glibc_PTH_OPT.OBJ/listsuites.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/listsuites'
cd makepqg; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/makepqg'
rm -rf   Linux3.6_x86_glibc_PTH_OPT.OBJ/makepqg Linux3.6_x86_glibc_PTH_OPT.OBJ/makepqg.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/makepqg'
cd multinit; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/multinit'
rm -rf   Linux3.6_x86_glibc_PTH_OPT.OBJ/multinit Linux3.6_x86_glibc_PTH_OPT.OBJ/multinit.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/multinit'
cd ocspclnt; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/ocspclnt'
rm -rf   Linux3.6_x86_glibc_PTH_OPT.OBJ/ocspclnt Linux3.6_x86_glibc_PTH_OPT.OBJ/ocspclnt.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/ocspclnt'
cd ocspresp; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/ocspresp'
rm -rf   Linux3.6_x86_glibc_PTH_OPT.OBJ/ocspresp Linux3.6_x86_glibc_PTH_OPT.OBJ/ocspresp.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/ocspresp'
cd oidcalc; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/oidcalc'
rm -rf   Linux3.6_x86_glibc_PTH_OPT.OBJ/oidcalc Linux3.6_x86_glibc_PTH_OPT.OBJ/oidcalc.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/oidcalc'
cd p7content; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/p7content'
rm -rf   Linux3.6_x86_glibc_PTH_OPT.OBJ/p7content Linux3.6_x86_glibc_PTH_OPT.OBJ/p7content.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/p7content'
cd p7env; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/p7env'
rm -rf   Linux3.6_x86_glibc_PTH_OPT.OBJ/p7env Linux3.6_x86_glibc_PTH_OPT.OBJ/p7env.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/p7env'
cd p7sign; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/p7sign'
rm -rf   Linux3.6_x86_glibc_PTH_OPT.OBJ/p7sign Linux3.6_x86_glibc_PTH_OPT.OBJ/p7sign.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/p7sign'
cd p7verify; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/p7verify'
rm -rf   Linux3.6_x86_glibc_PTH_OPT.OBJ/p7verify Linux3.6_x86_glibc_PTH_OPT.OBJ/p7verify.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/p7verify'
cd pk12util; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/pk12util'
rm -rf   Linux3.6_x86_glibc_PTH_OPT.OBJ/pk12util Linux3.6_x86_glibc_PTH_OPT.OBJ/pk12util.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/pk12util'
cd pk11mode; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/pk11mode'
rm -rf   Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11mode Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11mode.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/pk11mode'
cd pk1sign; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/pk1sign'
rm -rf   Linux3.6_x86_glibc_PTH_OPT.OBJ/pk1sign Linux3.6_x86_glibc_PTH_OPT.OBJ/pk1sign.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/pk1sign'
cd pkix-errcodes; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/pkix-errcodes'
rm -rf   Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix-errcodes Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix-errcodes.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/pkix-errcodes'
cd pp; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/pp'
rm -rf   Linux3.6_x86_glibc_PTH_OPT.OBJ/pp Linux3.6_x86_glibc_PTH_OPT.OBJ/pp.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/pp'
cd pwdecrypt; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/pwdecrypt'
rm -rf   Linux3.6_x86_glibc_PTH_OPT.OBJ/pwdecrypt Linux3.6_x86_glibc_PTH_OPT.OBJ/pwdecrypt.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/pwdecrypt'
cd rsaperf; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/rsaperf'
rm -rf   Linux3.6_x86_glibc_PTH_OPT.OBJ/rsaperf Linux3.6_x86_glibc_PTH_OPT.OBJ/rsaperf.o Linux3.6_x86_glibc_PTH_OPT.OBJ/defkey.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/rsaperf'
cd sdrtest; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/sdrtest'
rm -rf   Linux3.6_x86_glibc_PTH_OPT.OBJ/sdrtest Linux3.6_x86_glibc_PTH_OPT.OBJ/sdrtest.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/sdrtest'
cd selfserv; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/selfserv'
rm -rf   Linux3.6_x86_glibc_PTH_OPT.OBJ/selfserv Linux3.6_x86_glibc_PTH_OPT.OBJ/selfserv.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/selfserv'
cd signtool; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/signtool'
rm -rf   Linux3.6_x86_glibc_PTH_OPT.OBJ/signtool Linux3.6_x86_glibc_PTH_OPT.OBJ/signtool.o Linux3.6_x86_glibc_PTH_OPT.OBJ/certgen.o Linux3.6_x86_glibc_PTH_OPT.OBJ/javascript.o Linux3.6_x86_glibc_PTH_OPT.OBJ/list.o Linux3.6_x86_glibc_PTH_OPT.OBJ/sign.o Linux3.6_x86_glibc_PTH_OPT.OBJ/util.o Linux3.6_x86_glibc_PTH_OPT.OBJ/verify.o Linux3.6_x86_glibc_PTH_OPT.OBJ/zip.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/signtool'
cd signver; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/signver'
rm -rf   Linux3.6_x86_glibc_PTH_OPT.OBJ/signver Linux3.6_x86_glibc_PTH_OPT.OBJ/signver.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk7print.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/signver'
cd shlibsign; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/shlibsign'
rm -rf   Linux3.6_x86_glibc_PTH_OPT.OBJ/shlibsign Linux3.6_x86_glibc_PTH_OPT.OBJ/shlibsign.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations   ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsoftokn3.chk ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssdbm3.chk
cd mangle; gmake clean
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/shlibsign/mangle'
rm -rf   Linux3.6_x86_glibc_PTH_OPT.OBJ/mangle Linux3.6_x86_glibc_PTH_OPT.OBJ/mangle.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/shlibsign/mangle'
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/shlibsign'
cd smimetools; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/smimetools'
rm -rf   Linux3.6_x86_glibc_PTH_OPT.OBJ/cmsutil Linux3.6_x86_glibc_PTH_OPT.OBJ/cmsutil.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/smimetools'
cd ssltap; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/ssltap'
rm -rf   Linux3.6_x86_glibc_PTH_OPT.OBJ/ssltap Linux3.6_x86_glibc_PTH_OPT.OBJ/ssltap.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/ssltap'
cd strsclnt; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/strsclnt'
rm -rf   Linux3.6_x86_glibc_PTH_OPT.OBJ/strsclnt Linux3.6_x86_glibc_PTH_OPT.OBJ/strsclnt.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/strsclnt'
cd symkeyutil; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/symkeyutil'
rm -rf   Linux3.6_x86_glibc_PTH_OPT.OBJ/symkeyutil Linux3.6_x86_glibc_PTH_OPT.OBJ/symkeyutil.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/symkeyutil'
cd tests; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/tests'
rm -rf Linux3.6_x86_glibc_PTH_OPT.OBJ/baddbdir Linux3.6_x86_glibc_PTH_OPT.OBJ/conflict Linux3.6_x86_glibc_PTH_OPT.OBJ/dertimetest Linux3.6_x86_glibc_PTH_OPT.OBJ/encodeinttest Linux3.6_x86_glibc_PTH_OPT.OBJ/nonspr10 Linux3.6_x86_glibc_PTH_OPT.OBJ/remtest Linux3.6_x86_glibc_PTH_OPT.OBJ/secmodtest Linux3.6_x86_glibc_PTH_OPT.OBJ/baddbdir.o Linux3.6_x86_glibc_PTH_OPT.OBJ/conflict.o Linux3.6_x86_glibc_PTH_OPT.OBJ/dertimetest.o Linux3.6_x86_glibc_PTH_OPT.OBJ/encodeinttest.o Linux3.6_x86_glibc_PTH_OPT.OBJ/nonspr10.o Linux3.6_x86_glibc_PTH_OPT.OBJ/remtest.o Linux3.6_x86_glibc_PTH_OPT.OBJ/secmodtest.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/tests'
cd tstclnt; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/tstclnt'
rm -rf   Linux3.6_x86_glibc_PTH_OPT.OBJ/tstclnt Linux3.6_x86_glibc_PTH_OPT.OBJ/tstclnt.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/tstclnt'
cd vfychain; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/vfychain'
rm -rf   Linux3.6_x86_glibc_PTH_OPT.OBJ/vfychain Linux3.6_x86_glibc_PTH_OPT.OBJ/vfychain.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/vfychain'
cd vfyserv; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/vfyserv'
rm -rf   Linux3.6_x86_glibc_PTH_OPT.OBJ/vfyserv Linux3.6_x86_glibc_PTH_OPT.OBJ/vfyserv.o Linux3.6_x86_glibc_PTH_OPT.OBJ/vfyutil.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/vfyserv'
cd modutil; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/modutil'
rm -rf   Linux3.6_x86_glibc_PTH_OPT.OBJ/modutil Linux3.6_x86_glibc_PTH_OPT.OBJ/modutil.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11.o Linux3.6_x86_glibc_PTH_OPT.OBJ/instsec.o Linux3.6_x86_glibc_PTH_OPT.OBJ/install.o Linux3.6_x86_glibc_PTH_OPT.OBJ/installparse.o Linux3.6_x86_glibc_PTH_OPT.OBJ/install-ds.o Linux3.6_x86_glibc_PTH_OPT.OBJ/lex.Pk11Install_yy.o Linux3.6_x86_glibc_PTH_OPT.OBJ LOGS TAGS Linux3.6_x86_glibc_PTH_OPT.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/modutil'
gmake[1]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd'
gmake -C ../coreconf
gmake[1]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/coreconf'
cd nsinstall; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/coreconf/nsinstall'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/coreconf/nsinstall'
cd nsinstall; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/coreconf/nsinstall'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../dist/public/coreconf -I../../../dist/private/coreconf  nsinstall.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pathsub.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../dist/public/coreconf -I../../../dist/private/coreconf  pathsub.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../dist/public/coreconf -I../../../dist/private/coreconf  Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pathsub.o -m32   -lpthread  -ldl -lc
true -m 775 Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall ../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/coreconf/nsinstall'
gmake[1]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/coreconf'
../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -D ../../nsprpub/Linux3.6_x86_glibc_PTH_OPT.OBJ
cd ../../nsprpub/Linux3.6_x86_glibc_PTH_OPT.OBJ ; \
 sh ../configure \
--disable-debug --enable-optimize \
--with-dist-prefix='/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ' \
--with-dist-includedir='/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include'
creating cache ./config.cache
checking host system type... x86_64-unknown-linux-gnu
checking target system type... x86_64-unknown-linux-gnu
checking build system type... x86_64-unknown-linux-gnu
checking for whoami... /usr/bin/whoami
checking for gcc... gcc
checking whether the C compiler (gcc  ) works... yes
checking whether the C compiler (gcc  ) is a cross-compiler... no
checking whether we are using GNU C... yes
checking whether gcc accepts -g... yes
checking how to run the C preprocessor... gcc -E
checking for ranlib... ranlib
checking for as... /usr/bin/as
checking for ar... /usr/bin/ar
checking for ld... /usr/bin/ld
checking for strip... /usr/bin/strip
checking for windres... no
checking for gcc -pipe support... no
checking whether C compiler supports -fprofile-generate... yes
checking for visibility(hidden) attribute... yes
checking for visibility pragma support... yes
checking for perl5... no
checking for perl... /usr/bin/perl
checking for dlopen in -ldl... yes
checking for dlfcn.h... yes
checking whether gcc -m32 needs -traditional... no
checking for lchown... yes
checking for strerror... yes
checking for dladdr... yes
checking for pthread_create in -lpthreads... no
checking for pthread_create in -lpthread... yes
checking whether gcc -m32 accepts -pthread... yes
updating cache ./config.cache
creating ./config.status
creating Makefile
creating config/Makefile
creating config/autoconf.mk
creating config/nsprincl.mk
creating config/nsprincl.sh
creating config/nspr-config
creating config/nspr.pc
creating lib/Makefile
creating lib/ds/Makefile
creating lib/libc/Makefile
creating lib/libc/include/Makefile
creating lib/libc/src/Makefile
creating lib/tests/Makefile
creating pkg/Makefile
creating pr/Makefile
creating pr/include/Makefile
creating pr/include/md/Makefile
creating pr/include/obsolete/Makefile
creating pr/include/private/Makefile
creating pr/src/Makefile
creating pr/src/io/Makefile
creating pr/src/linking/Makefile
creating pr/src/malloc/Makefile
creating pr/src/md/Makefile
creating pr/src/md/unix/Makefile
creating pr/src/memory/Makefile
creating pr/src/misc/Makefile
creating pr/src/threads/Makefile
creating pr/tests/Makefile
creating pr/tests/dll/Makefile
creating pkg/linux/Makefile
creating pr/src/pthreads/Makefile
gmake -C ../../nsprpub/Linux3.6_x86_glibc_PTH_OPT.OBJ
gmake[1]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/nsprpub/Linux3.6_x86_glibc_PTH_OPT.OBJ'
gmake -C config export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/nsprpub/Linux3.6_x86_glibc_PTH_OPT.OBJ/config'
gcc -m32 -o now.o -c      -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM   ../../config/now.c
gcc -m32  now.o   -o now
gcc -m32 -o nsinstall.o -c      -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM   ../../config/nsinstall.c
gcc -m32  nsinstall.o   -o nsinstall
rm -f nfspwd; cp ../../config/nfspwd.pl nfspwd; chmod +x nfspwd
rm -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/bin/nspr-config
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/nsprpub/Linux3.6_x86_glibc_PTH_OPT.OBJ/config'
gmake -C pr export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/nsprpub/Linux3.6_x86_glibc_PTH_OPT.OBJ/pr'
gmake -C include export
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/nsprpub/Linux3.6_x86_glibc_PTH_OPT.OBJ/pr/include'
gmake -C md export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/nsprpub/Linux3.6_x86_glibc_PTH_OPT.OBJ/pr/include/md'
../../../config/./nsinstall -R -m 444 ../../../../pr/include/md/_openbsd.cfg ../../../../pr/include/md/_winnt.cfg ../../../../pr/include/md/_nto.cfg ../../../../pr/include/md/_riscos.cfg ../../../../pr/include/md/_dgux.cfg ../../../../pr/include/md/_aix32.cfg ../../../../pr/include/md/_hpux64.cfg ../../../../pr/include/md/_os2.cfg ../../../../pr/include/md/_linux.cfg ../../../../pr/include/md/_qnx.cfg ../../../../pr/include/md/_darwin.cfg ../../../../pr/include/md/_beos.cfg ../../../../pr/include/md/_irix32.cfg ../../../../pr/include/md/_irix64.cfg ../../../../pr/include/md/_win95.cfg ../../../../pr/include/md/_netbsd.cfg ../../../../pr/include/md/_solaris.cfg ../../../../pr/include/md/_unixware7.cfg ../../../../pr/include/md/_freebsd.cfg ../../../../pr/include/md/_scoos.cfg ../../../../pr/include/md/_osf1.cfg ../../../../pr/include/md/_unixware.cfg ../../../../pr/include/md/_aix64.cfg ../../../../pr/include/md/_symbian.cfg ../../../../pr/include/md/_hpux32.cfg ../../../../pr/include/md/_bsdi.cfg /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include/md
../../../config/./nsinstall -R -m 444 ../../../../pr/include/md/_linux.cfg /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include
mv -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include/_linux.cfg /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include/prcpucfg.h
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/nsprpub/Linux3.6_x86_glibc_PTH_OPT.OBJ/pr/include/md'
gmake -C private export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/nsprpub/Linux3.6_x86_glibc_PTH_OPT.OBJ/pr/include/private'
../../../config/./nsinstall -R -m 444 ../../../../pr/include/private/pprio.h ../../../../pr/include/private/pprthred.h ../../../../pr/include/private/prpriv.h /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include/private
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/nsprpub/Linux3.6_x86_glibc_PTH_OPT.OBJ/pr/include/private'
gmake -C obsolete export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/nsprpub/Linux3.6_x86_glibc_PTH_OPT.OBJ/pr/include/obsolete'
../../../config/./nsinstall -R -m 444 ../../../../pr/include/obsolete/pralarm.h ../../../../pr/include/obsolete/probslet.h ../../../../pr/include/obsolete/protypes.h ../../../../pr/include/obsolete/prsem.h /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include/obsolete
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/nsprpub/Linux3.6_x86_glibc_PTH_OPT.OBJ/pr/include/obsolete'
../../config/./nsinstall -R -m 444 ../../../pr/include/prmon.h ../../../pr/include/prmwait.h ../../../pr/include/prrng.h ../../../pr/include/prprf.h ../../../pr/include/prtypes.h ../../../pr/include/prenv.h ../../../pr/include/prlink.h ../../../pr/include/prdtoa.h ../../../pr/include/prolock.h ../../../pr/include/prtrace.h ../../../pr/include/prlog.h ../../../pr/include/prproces.h ../../../pr/include/prsystem.h ../../../pr/include/prinet.h ../../../pr/include/prinrval.h ../../../pr/include/prmem.h ../../../pr/include/prtime.h ../../../pr/include/prwin16.h ../../../pr/include/prcmon.h ../../../pr/include/prtpool.h ../../../pr/include/prshm.h ../../../pr/include/prerr.h ../../../pr/include/prcountr.h ../../../pr/include/prclist.h ../../../pr/include/prerror.h ../../../pr/include/prcvar.h ../../../pr/include/prio.h ../../../pr/include/prrwlock.h ../../../pr/include/prlock.h ../../../pr/include/prinit.h ../../../pr/include/pratom.h ../../../pr/include/prpdce.h ../../../pr/include/prlong.h ../../../pr/include/prshma.h ../../../pr/include/prvrsion.h ../../../pr/include/nspr.h ../../../pr/include/pripcsem.h ../../../pr/include/prnetdb.h ../../../pr/include/prthread.h ../../../pr/include/prbit.h /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/nsprpub/Linux3.6_x86_glibc_PTH_OPT.OBJ/pr/include'
gmake -C src export
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/nsprpub/Linux3.6_x86_glibc_PTH_OPT.OBJ/pr/src'
gmake -C io export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/nsprpub/Linux3.6_x86_glibc_PTH_OPT.OBJ/pr/src/io'
gcc -m32 -o prfdcach.o -c -fvisibility=hidden     -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/io/prfdcach.c
gcc -m32 -o prmwait.o -c -fvisibility=hidden     -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/io/prmwait.c
gcc -m32 -o priometh.o -c -fvisibility=hidden     -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/io/priometh.c
gcc -m32 -o pripv6.o -c -fvisibility=hidden     -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/io/pripv6.c
../../../../pr/src/io/pripv6.c: In function Ipv6ToIpv4SocketAccept:
../../../../pr/src/io/pripv6.c:135:14: warning: variable rv set but not used [-Wunused-but-set-variable]
../../../../pr/src/io/pripv6.c: In function Ipv6ToIpv4SocketAcceptRead:
../../../../pr/src/io/pripv6.c:173:14: warning: variable rv set but not used [-Wunused-but-set-variable]
gcc -m32 -o prmapopt.o -c -fvisibility=hidden     -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/io/prmapopt.c
gcc -m32 -o prlayer.o -c -fvisibility=hidden     -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/io/prlayer.c
../../../../pr/src/io/prlayer.c: In function pl_TopAccept:
../../../../pr/src/io/prlayer.c:177:14: warning: variable rv set but not used [-Wunused-but-set-variable]
../../../../pr/src/io/prlayer.c: In function pl_DefAcceptread:
../../../../pr/src/io/prlayer.c:297:14: warning: variable rv set but not used [-Wunused-but-set-variable]
gcc -m32 -o prlog.o -c -fvisibility=hidden     -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/io/prlog.c
gcc -m32 -o prmmap.o -c -fvisibility=hidden     -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/io/prmmap.c
gcc -m32 -o prpolevt.o -c -fvisibility=hidden     -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/io/prpolevt.c
gcc -m32 -o prprf.o -c -fvisibility=hidden     -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/io/prprf.c
../../../../pr/src/io/prprf.c: In function dosprintf:
../../../../pr/src/io/prprf.c:1005:29: warning: nap may be used uninitialized in this function [-Wmaybe-uninitialized]
../../../../pr/src/io/prprf.c:687:20: note: nap was declared here
gcc -m32 -o prscanf.o -c -fvisibility=hidden     -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/io/prscanf.c
../../../../pr/src/io/prscanf.c: In function PR_sscanf:
../../../../pr/src/io/prscanf.c:250:43: warning: ch may be used uninitialized in this function [-Wmaybe-uninitialized]
../../../../pr/src/io/prscanf.c:197:9: note: ch was declared here
../../../../pr/src/io/prscanf.c:319:57: warning: ch may be used uninitialized in this function [-Wmaybe-uninitialized]
../../../../pr/src/io/prscanf.c:307:9: note: ch was declared here
gcc -m32 -o prstdio.o -c -fvisibility=hidden     -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/io/prstdio.c
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/nsprpub/Linux3.6_x86_glibc_PTH_OPT.OBJ/pr/src/io'
gmake -C linking export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/nsprpub/Linux3.6_x86_glibc_PTH_OPT.OBJ/pr/src/linking'
gcc -m32 -o prlink.o -c -fvisibility=hidden     -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/linking/prlink.c
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/nsprpub/Linux3.6_x86_glibc_PTH_OPT.OBJ/pr/src/linking'
gmake -C malloc export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/nsprpub/Linux3.6_x86_glibc_PTH_OPT.OBJ/pr/src/malloc'
gcc -m32 -o prmalloc.o -c -fvisibility=hidden     -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/malloc/prmalloc.c
gcc -m32 -o prmem.o -c -fvisibility=hidden     -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/malloc/prmem.c
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/nsprpub/Linux3.6_x86_glibc_PTH_OPT.OBJ/pr/src/malloc'
gmake -C md export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/nsprpub/Linux3.6_x86_glibc_PTH_OPT.OBJ/pr/src/md'
gmake -C unix export
gmake[5]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/nsprpub/Linux3.6_x86_glibc_PTH_OPT.OBJ/pr/src/md/unix'
gcc -m32 -o unix.o -c -fvisibility=hidden     -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../pr/include -I../../../../../pr/include/private  ../../../../../pr/src/md/unix/unix.c
../../../../../pr/src/md/unix/unix.c: In function _PR_UnixInit:
../../../../../pr/src/md/unix/unix.c:2816:9: warning: variable rv set but not used [-Wunused-but-set-variable]
gcc -m32 -o unix_errors.o -c -fvisibility=hidden     -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../pr/include -I../../../../../pr/include/private  ../../../../../pr/src/md/unix/unix_errors.c
gcc -m32 -o uxproces.o -c -fvisibility=hidden     -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../pr/include -I../../../../../pr/include/private  ../../../../../pr/src/md/unix/uxproces.c
../../../../../pr/src/md/unix/uxproces.c: In function pr_InstallSigchldHandler:
../../../../../pr/src/md/unix/uxproces.c:693:9: warning: variable rv set but not used [-Wunused-but-set-variable]
../../../../../pr/src/md/unix/uxproces.c: In function _MD_InitProcesses:
../../../../../pr/src/md/unix/uxproces.c:711:9: warning: variable rv set but not used [-Wunused-but-set-variable]
gcc -m32 -o uxrng.o -c -fvisibility=hidden     -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../pr/include -I../../../../../pr/include/private  ../../../../../pr/src/md/unix/uxrng.c
gcc -m32 -o uxshm.o -c -fvisibility=hidden     -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../pr/include -I../../../../../pr/include/private  ../../../../../pr/src/md/unix/uxshm.c
gcc -m32 -o uxwrap.o -c -fvisibility=hidden     -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../pr/include -I../../../../../pr/include/private  ../../../../../pr/src/md/unix/uxwrap.c
gcc -m32 -o linux.o -c -fvisibility=hidden     -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../pr/include -I../../../../../pr/include/private  ../../../../../pr/src/md/unix/linux.c
gcc -m32 -o os_Linux_x86.o -fvisibility=hidden     -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../pr/include -I../../../../../pr/include/private  -c ../../../../../pr/src/md/unix/os_Linux_x86.s
gmake[5]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/nsprpub/Linux3.6_x86_glibc_PTH_OPT.OBJ/pr/src/md/unix'
gcc -m32 -o prosdep.o -c -fvisibility=hidden     -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../pr/include  ../../../../pr/src/md/prosdep.c
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/nsprpub/Linux3.6_x86_glibc_PTH_OPT.OBJ/pr/src/md'
gmake -C memory export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/nsprpub/Linux3.6_x86_glibc_PTH_OPT.OBJ/pr/src/memory'
gcc -m32 -o prseg.o -c -fvisibility=hidden     -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/memory/prseg.c
gcc -m32 -o prshm.o -c -fvisibility=hidden     -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/memory/prshm.c
gcc -m32 -o prshma.o -c -fvisibility=hidden     -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/memory/prshma.c
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/nsprpub/Linux3.6_x86_glibc_PTH_OPT.OBJ/pr/src/memory'
gmake -C misc export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/nsprpub/Linux3.6_x86_glibc_PTH_OPT.OBJ/pr/src/misc'
gcc -m32 -o pralarm.o -c -fvisibility=hidden     -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/misc/pralarm.c
gcc -m32 -o pratom.o -c -fvisibility=hidden     -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/misc/pratom.c
gcc -m32 -o prcountr.o -c -fvisibility=hidden     -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/misc/prcountr.c
gcc -m32 -o prdtoa.o -c -fvisibility=hidden     -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/misc/prdtoa.c
gcc -m32 -o prenv.o -c -fvisibility=hidden     -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/misc/prenv.c
../../../../pr/src/misc/prenv.c: In function PR_SetEnv:
../../../../pr/src/misc/prenv.c:64:5: warning: passing argument 1 of putenv discards const qualifier from pointer target type [enabled by default]
In file included from /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include/prmem.h:15:0,
                 from /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include/nspr.h:26,
                 from ../../../../pr/include/private/primpl.h:39,
                 from ../../../../pr/src/misc/prenv.c:7:
/usr/include/stdlib.h:579:12: note: expected char * but argument is of type const char *
gcc -m32 -o prerr.o -c -fvisibility=hidden     -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/misc/prerr.c
gcc -m32 -o prerror.o -c -fvisibility=hidden     -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/misc/prerror.c
gcc -m32 -o prerrortable.o -c -fvisibility=hidden     -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/misc/prerrortable.c
gcc -m32 -o prinit.o -c -fvisibility=hidden     -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/misc/prinit.c
gcc -m32 -o prinrval.o -c -fvisibility=hidden     -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/misc/prinrval.c
gcc -m32 -o pripc.o -c -fvisibility=hidden     -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/misc/pripc.c
gcc -m32 -o prlog2.o -c -fvisibility=hidden     -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/misc/prlog2.c
gcc -m32 -o prlong.o -c -fvisibility=hidden     -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/misc/prlong.c
gcc -m32 -o prnetdb.o -c -fvisibility=hidden     -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/misc/prnetdb.c
../../../../pr/src/misc/prnetdb.c: In function pr_NetAddrToStringGNI:
../../../../pr/src/misc/prnetdb.c:2255:14: warning: variable md_af set but not used [-Wunused-but-set-variable]
gcc -m32 -o praton.o -c -fvisibility=hidden     -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/misc/praton.c
gcc -m32 -o prolock.o -c -fvisibility=hidden     -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/misc/prolock.c
gcc -m32 -o prrng.o -c -fvisibility=hidden     -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/misc/prrng.c
gcc -m32 -o prsystem.o -c -fvisibility=hidden     -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/misc/prsystem.c
gcc -m32 -o prtime.o -c -fvisibility=hidden     -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/misc/prtime.c
gcc -m32 -o prthinfo.o -c -fvisibility=hidden     -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/misc/prthinfo.c
gcc -m32 -o prtpool.o -c -fvisibility=hidden     -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/misc/prtpool.c
../../../../pr/src/misc/prtpool.c: In function io_wstart:
../../../../pr/src/misc/prtpool.c:385:13: warning: variable rval_status set but not used [-Wunused-but-set-variable]
../../../../pr/src/misc/prtpool.c: In function notify_ioq:
../../../../pr/src/misc/prtpool.c:954:10: warning: variable rval_status set but not used [-Wunused-but-set-variable]
../../../../pr/src/misc/prtpool.c: In function PR_JoinThreadPool:
../../../../pr/src/misc/prtpool.c:1075:10: warning: variable rval_status set but not used [-Wunused-but-set-variable]
../../../../pr/src/misc/prtpool.c: In function io_wstart:
../../../../pr/src/misc/prtpool.c:400:10: warning: polljobs may be used uninitialized in this function [-Wmaybe-uninitialized]
../../../../pr/src/misc/prtpool.c:285:9: note: polljobs was declared here
../../../../pr/src/misc/prtpool.c:328:34: warning: pollfds may be used uninitialized in this function [-Wmaybe-uninitialized]
../../../../pr/src/misc/prtpool.c:284:13: note: pollfds was declared here
gcc -m32 -o prtrace.o -c -fvisibility=hidden     -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/misc/prtrace.c
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/nsprpub/Linux3.6_x86_glibc_PTH_OPT.OBJ/pr/src/misc'
gmake -C threads export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/nsprpub/Linux3.6_x86_glibc_PTH_OPT.OBJ/pr/src/threads'
gcc -m32 -o prcmon.o -c -fvisibility=hidden     -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/threads/prcmon.c
gcc -m32 -o prrwlock.o -c -fvisibility=hidden     -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/threads/prrwlock.c
gcc -m32 -o prtpd.o -c -fvisibility=hidden     -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/threads/prtpd.c
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/nsprpub/Linux3.6_x86_glibc_PTH_OPT.OBJ/pr/src/threads'
gmake -C pthreads export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/nsprpub/Linux3.6_x86_glibc_PTH_OPT.OBJ/pr/src/pthreads'
gcc -m32 -o ptio.o -c -fvisibility=hidden     -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/pthreads/ptio.c
../../../../pr/src/pthreads/ptio.c: In function pt_linux_sendfile_cont:
../../../../pr/src/pthreads/ptio.c:1098:11: warning: variable oldoffset set but not used [-Wunused-but-set-variable]
../../../../pr/src/pthreads/ptio.c: In function pt_Connect:
../../../../pr/src/pthreads/ptio.c:1545:11: warning: variable md_af set but not used [-Wunused-but-set-variable]
../../../../pr/src/pthreads/ptio.c: In function pt_Bind:
../../../../pr/src/pthreads/ptio.c:1735:11: warning: variable md_af set but not used [-Wunused-but-set-variable]
../../../../pr/src/pthreads/ptio.c: In function pt_SendTo:
../../../../pr/src/pthreads/ptio.c:1992:11: warning: variable md_af set but not used [-Wunused-but-set-variable]
../../../../pr/src/pthreads/ptio.c: In function _pr_poll_with_poll:
../../../../pr/src/pthreads/ptio.c:3933:33: warning: start may be used uninitialized in this function [-Wmaybe-uninitialized]
gcc -m32 -o ptsynch.o -c -fvisibility=hidden     -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/pthreads/ptsynch.c
../../../../pr/src/pthreads/ptsynch.c: In function _PR_InitLocks:
../../../../pr/src/pthreads/ptsynch.c:54:9: warning: variable rv set but not used [-Wunused-but-set-variable]
../../../../pr/src/pthreads/ptsynch.c: In function pt_PostNotifies:
../../../../pr/src/pthreads/ptsynch.c:71:19: warning: variable rv set but not used [-Wunused-but-set-variable]
../../../../pr/src/pthreads/ptsynch.c: In function PR_NewLock:
../../../../pr/src/pthreads/ptsynch.c:137:12: warning: variable rv set but not used [-Wunused-but-set-variable]
../../../../pr/src/pthreads/ptsynch.c: In function PR_DestroyLock:
../../../../pr/src/pthreads/ptsynch.c:156:12: warning: variable rv set but not used [-Wunused-but-set-variable]
../../../../pr/src/pthreads/ptsynch.c: In function PR_Lock:
../../../../pr/src/pthreads/ptsynch.c:172:12: warning: variable rv set but not used [-Wunused-but-set-variable]
../../../../pr/src/pthreads/ptsynch.c: In function PR_Unlock:
../../../../pr/src/pthreads/ptsynch.c:192:12: warning: variable rv set but not used [-Wunused-but-set-variable]
../../../../pr/src/pthreads/ptsynch.c: In function PR_NewCondVar:
../../../../pr/src/pthreads/ptsynch.c:325:13: warning: unused variable rv [-Wunused-variable]
../../../../pr/src/pthreads/ptsynch.c: In function PR_DestroyCondVar:
../../../../pr/src/pthreads/ptsynch.c:340:16: warning: unused variable rv [-Wunused-variable]
../../../../pr/src/pthreads/ptsynch.c: In function PR_DestroyMonitor:
../../../../pr/src/pthreads/ptsynch.c:490:9: warning: variable rv set but not used [-Wunused-but-set-variable]
../../../../pr/src/pthreads/ptsynch.c: In function PRP_NewNakedCondVar:
../../../../pr/src/pthreads/ptsynch.c:1081:13: warning: variable rv set but not used [-Wunused-but-set-variable]
../../../../pr/src/pthreads/ptsynch.c: In function PRP_DestroyNakedCondVar:
../../../../pr/src/pthreads/ptsynch.c:1091:9: warning: variable rv set but not used [-Wunused-but-set-variable]
../../../../pr/src/pthreads/ptsynch.c: In function PRP_NakedNotify:
../../../../pr/src/pthreads/ptsynch.c:1120:9: warning: variable rv set but not used [-Wunused-but-set-variable]
../../../../pr/src/pthreads/ptsynch.c: In function PRP_NakedBroadcast:
../../../../pr/src/pthreads/ptsynch.c:1129:9: warning: variable rv set but not used [-Wunused-but-set-variable]
gcc -m32 -o ptthread.o -c -fvisibility=hidden     -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/pthreads/ptthread.c
../../../../pr/src/pthreads/ptthread.c: In function _pt_root:
../../../../pr/src/pthreads/ptthread.c:98:12: warning: variable rv set but not used [-Wunused-but-set-variable]
../../../../pr/src/pthreads/ptthread.c: In function pt_AttachThread:
../../../../pr/src/pthreads/ptthread.c:223:13: warning: variable rv set but not used [-Wunused-but-set-variable]
../../../../pr/src/pthreads/ptthread.c: In function PR_DetachThread:
../../../../pr/src/pthreads/ptthread.c:568:9: warning: variable rv set but not used [-Wunused-but-set-variable]
../../../../pr/src/pthreads/ptthread.c: In function PR_Interrupt:
../../../../pr/src/pthreads/ptthread.c:682:16: warning: variable rv set but not used [-Wunused-but-set-variable]
../../../../pr/src/pthreads/ptthread.c: In function _pt_thread_death:
../../../../pr/src/pthreads/ptthread.c:753:9: warning: variable rv set but not used [-Wunused-but-set-variable]
../../../../pr/src/pthreads/ptthread.c: In function _PR_InitThreads:
../../../../pr/src/pthreads/ptthread.c:816:9: warning: variable rv set but not used [-Wunused-but-set-variable]
../../../../pr/src/pthreads/ptthread.c: In function _PR_Fini:
../../../../pr/src/pthreads/ptthread.c:963:9: warning: variable rv set but not used [-Wunused-but-set-variable]
../../../../pr/src/pthreads/ptthread.c: In function PR_Cleanup:
../../../../pr/src/pthreads/ptthread.c:987:9: warning: variable rv set but not used [-Wunused-but-set-variable]
../../../../pr/src/pthreads/ptthread.c: In function init_pthread_gc_support:
../../../../pr/src/pthreads/ptthread.c:1121:12: warning: variable rv set but not used [-Wunused-but-set-variable]
../../../../pr/src/pthreads/ptthread.c: In function pt_SuspendSet:
../../../../pr/src/pthreads/ptthread.c:1339:12: warning: variable rv set but not used [-Wunused-but-set-variable]
../../../../pr/src/pthreads/ptthread.c: In function PR_SuspendAll:
../../../../pr/src/pthreads/ptthread.c:1459:9: warning: variable rv set but not used [-Wunused-but-set-variable]
gcc -m32 -o ptmisc.o -c -fvisibility=hidden     -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/pthreads/ptmisc.c
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/nsprpub/Linux3.6_x86_glibc_PTH_OPT.OBJ/pr/src/pthreads'
gmake build
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/nsprpub/Linux3.6_x86_glibc_PTH_OPT.OBJ/pr/src'
gcc -m32 -o prvrsion.o -c -fvisibility=hidden     -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../pr/include -I../../../pr/include/private  -I. ../../../pr/src/prvrsion.c
../../../pr/src/prvrsion.c: In function libVersionPoint:
../../../pr/src/prvrsion.c:84:17: warning: variable dummy set but not used [-Wunused-but-set-variable]
rm -f libnspr4.a
/usr/bin/ar cr libnspr4.a ./prvrsion.o io/./prfdcach.o io/./prmwait.o io/./prmapopt.o io/./priometh.o io/./pripv6.o io/./prlayer.o io/./prlog.o io/./prmmap.o io/./prpolevt.o io/./prprf.o io/./prscanf.o io/./prstdio.o threads/./prcmon.o threads/./prrwlock.o threads/./prtpd.o linking/./prlink.o malloc/./prmalloc.o malloc/./prmem.o md/./prosdep.o memory/./prshm.o memory/./prshma.o memory/./prseg.o misc/./pralarm.o misc/./pratom.o misc/./prcountr.o misc/./prdtoa.o misc/./prenv.o misc/./prerr.o misc/./prerror.o misc/./prerrortable.o misc/./prinit.o misc/./prinrval.o misc/./pripc.o misc/./prlog2.o misc/./prlong.o misc/./prnetdb.o misc/./praton.o misc/./prolock.o misc/./prrng.o misc/./prsystem.o misc/./prthinfo.o misc/./prtpool.o misc/./prtrace.o misc/./prtime.o pthreads/./ptsynch.o pthreads/./ptio.o pthreads/./ptthread.o pthreads/./ptmisc.o md/unix/./unix.o md/unix/./unix_errors.o md/unix/./uxproces.o md/unix/./uxrng.o md/unix/./uxshm.o md/unix/./uxwrap.o md/unix/./linux.o md/unix/./os_Linux_x86.o 
ranlib libnspr4.a
rm -f libnspr4.so
gcc -m32 -shared -Wl,-soname -Wl,libnspr4.so -o libnspr4.so ./prvrsion.o io/./prfdcach.o io/./prmwait.o io/./prmapopt.o io/./priometh.o io/./pripv6.o io/./prlayer.o io/./prlog.o io/./prmmap.o io/./prpolevt.o io/./prprf.o io/./prscanf.o io/./prstdio.o threads/./prcmon.o threads/./prrwlock.o threads/./prtpd.o linking/./prlink.o malloc/./prmalloc.o malloc/./prmem.o md/./prosdep.o memory/./prshm.o memory/./prshma.o memory/./prseg.o misc/./pralarm.o misc/./pratom.o misc/./prcountr.o misc/./prdtoa.o misc/./prenv.o misc/./prerr.o misc/./prerror.o misc/./prerrortable.o misc/./prinit.o misc/./prinrval.o misc/./pripc.o misc/./prlog2.o misc/./prlong.o misc/./prnetdb.o misc/./praton.o misc/./prolock.o misc/./prrng.o misc/./prsystem.o misc/./prthinfo.o misc/./prtpool.o misc/./prtrace.o misc/./prtime.o pthreads/./ptsynch.o pthreads/./ptio.o pthreads/./ptthread.o pthreads/./ptmisc.o md/unix/./unix.o md/unix/./unix_errors.o md/unix/./uxproces.o md/unix/./uxrng.o md/unix/./uxshm.o md/unix/./uxwrap.o md/unix/./linux.o md/unix/./os_Linux_x86.o    -lpthread -ldl -lrt
../../config/./nsinstall -R -m 444 ./libnspr4.a ./libnspr4.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib
../../config/./nsinstall -R -m 444 ./libnspr4.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/bin
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/nsprpub/Linux3.6_x86_glibc_PTH_OPT.OBJ/pr/src'
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/nsprpub/Linux3.6_x86_glibc_PTH_OPT.OBJ/pr/src'
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/nsprpub/Linux3.6_x86_glibc_PTH_OPT.OBJ/pr'
gmake -C lib export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/nsprpub/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib'
gmake -C ds export
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/nsprpub/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/ds'
gcc -m32 -o plarena.o -c -fvisibility=hidden     -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../pr/include  ../../../lib/ds/plarena.c
gcc -m32 -o plhash.o -c -fvisibility=hidden     -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../pr/include  ../../../lib/ds/plhash.c
gcc -m32 -o plvrsion.o -c -fvisibility=hidden     -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../pr/include  -I. ../../../lib/ds/plvrsion.c
../../../lib/ds/plvrsion.c: In function libVersionPoint:
../../../lib/ds/plvrsion.c:84:17: warning: variable dummy set but not used [-Wunused-but-set-variable]
rm -f libplds4.a
/usr/bin/ar cr libplds4.a ./plarena.o ./plhash.o ./plvrsion.o  
ranlib libplds4.a
rm -f libplds4.so
gcc -m32 -shared -Wl,-soname -Wl,libplds4.so -o libplds4.so ./plarena.o ./plhash.o ./plvrsion.o     -L/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lnspr4
../../config/./nsinstall -R -m 444 ../../../lib/ds/plarenas.h ../../../lib/ds/plarena.h ../../../lib/ds/plhash.h /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include
../../config/./nsinstall -R -m 444 ./libplds4.a ./libplds4.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib
../../config/./nsinstall -R -m 444 ./libplds4.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/bin
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/nsprpub/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/ds'
gmake -C libc export
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/nsprpub/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libc'
gmake -C include export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/nsprpub/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libc/include'
../../../config/./nsinstall -R -m 444 ../../../../lib/libc/include/plbase64.h ../../../../lib/libc/include/plstr.h ../../../../lib/libc/include/plgetopt.h ../../../../lib/libc/include/plerror.h /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/nsprpub/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libc/include'
gmake -C src export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/nsprpub/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libc/src'
gcc -m32 -o plvrsion.o -c -fvisibility=hidden     -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include  -I. ../../../../lib/libc/src/plvrsion.c
../../../../lib/libc/src/plvrsion.c: In function libVersionPoint:
../../../../lib/libc/src/plvrsion.c:84:17: warning: variable dummy set but not used [-Wunused-but-set-variable]
gcc -m32 -o strlen.o -c -fvisibility=hidden     -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include  ../../../../lib/libc/src/strlen.c
gcc -m32 -o strcpy.o -c -fvisibility=hidden     -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include  ../../../../lib/libc/src/strcpy.c
gcc -m32 -o strdup.o -c -fvisibility=hidden     -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include  ../../../../lib/libc/src/strdup.c
gcc -m32 -o strcase.o -c -fvisibility=hidden     -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include  ../../../../lib/libc/src/strcase.c
gcc -m32 -o strcat.o -c -fvisibility=hidden     -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include  ../../../../lib/libc/src/strcat.c
gcc -m32 -o strcmp.o -c -fvisibility=hidden     -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include  ../../../../lib/libc/src/strcmp.c
gcc -m32 -o strchr.o -c -fvisibility=hidden     -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include  ../../../../lib/libc/src/strchr.c
gcc -m32 -o strpbrk.o -c -fvisibility=hidden     -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include  ../../../../lib/libc/src/strpbrk.c
gcc -m32 -o strstr.o -c -fvisibility=hidden     -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include  ../../../../lib/libc/src/strstr.c
gcc -m32 -o strtok.o -c -fvisibility=hidden     -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include  ../../../../lib/libc/src/strtok.c
gcc -m32 -o base64.o -c -fvisibility=hidden     -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include  ../../../../lib/libc/src/base64.c
gcc -m32 -o plerror.o -c -fvisibility=hidden     -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include  ../../../../lib/libc/src/plerror.c
gcc -m32 -o plgetopt.o -c -fvisibility=hidden     -Wall -pthread -O2 -fPIC  -UDEBUG  -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -Di386=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include  ../../../../lib/libc/src/plgetopt.c
rm -f libplc4.a
/usr/bin/ar cr libplc4.a ./plvrsion.o ./strlen.o ./strcpy.o ./strdup.o ./strcase.o ./strcat.o ./strcmp.o ./strchr.o ./strpbrk.o ./strstr.o ./strtok.o ./base64.o ./plerror.o ./plgetopt.o  
ranlib libplc4.a
rm -f libplc4.so
gcc -m32 -shared -Wl,-soname -Wl,libplc4.so -o libplc4.so ./plvrsion.o ./strlen.o ./strcpy.o ./strdup.o ./strcase.o ./strcat.o ./strcmp.o ./strchr.o ./strpbrk.o ./strstr.o ./strtok.o ./base64.o ./plerror.o ./plgetopt.o     -L/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lnspr4
../../../config/./nsinstall -R -m 444 ./libplc4.a ./libplc4.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib
../../../config/./nsinstall -R -m 444 ./libplc4.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/bin
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/nsprpub/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libc/src'
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/nsprpub/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libc'
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/nsprpub/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib'
gmake[1]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/nsprpub/Linux3.6_x86_glibc_PTH_OPT.OBJ'
gmake -C ../dbm export libs
gmake[1]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/dbm'
cd include; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/dbm/include'
Creating ../../../dist/public/dbm
../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ../../../dbm/include/cdefs.h ../../../dbm/include/mcom_db.h ../../../dbm/include/ncompat.h ../../../dbm/include/winfile.h ../../../dist/public/dbm
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/dbm/include'
cd src; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/dbm/src'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/dbm/src'
cd include; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/dbm/include'
gmake[2]: Nothing to be done for `libs'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/dbm/include'
cd src; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/dbm/src'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/db.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE  -I../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include  ../../../dbm/src/db.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/h_bigkey.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE  -I../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include  ../../../dbm/src/h_bigkey.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/h_func.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE  -I../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include  ../../../dbm/src/h_func.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/h_log2.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE  -I../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include  ../../../dbm/src/h_log2.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/h_page.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE  -I../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include  ../../../dbm/src/h_page.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/hash.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE  -I../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include  ../../../dbm/src/hash.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/hash_buf.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE  -I../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include  ../../../dbm/src/hash_buf.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/mktemp.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE  -I../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include  ../../../dbm/src/mktemp.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/dirent.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE  -I../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include  dirent.c
rm -f Linux3.6_x86_glibc_PTH_OPT.OBJ/libdbm.a
ar cr Linux3.6_x86_glibc_PTH_OPT.OBJ/libdbm.a Linux3.6_x86_glibc_PTH_OPT.OBJ/db.o Linux3.6_x86_glibc_PTH_OPT.OBJ/h_bigkey.o Linux3.6_x86_glibc_PTH_OPT.OBJ/h_func.o Linux3.6_x86_glibc_PTH_OPT.OBJ/h_log2.o Linux3.6_x86_glibc_PTH_OPT.OBJ/h_page.o Linux3.6_x86_glibc_PTH_OPT.OBJ/hash.o Linux3.6_x86_glibc_PTH_OPT.OBJ/hash_buf.o Linux3.6_x86_glibc_PTH_OPT.OBJ/mktemp.o Linux3.6_x86_glibc_PTH_OPT.OBJ/dirent.o
ranlib Linux3.6_x86_glibc_PTH_OPT.OBJ/libdbm.a
../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.6_x86_glibc_PTH_OPT.OBJ/libdbm.a ../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/dbm/src'
gmake[1]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/dbm'
cd lib; gmake export
gmake[1]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib'
cd util; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/util'
Creating ../../../../dist/public/nss
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 base64.h ciferfam.h hasht.h nssb64.h nssb64t.h nsslocks.h nssilock.h nssilckt.h nssrwlk.h nssrwlkt.h nssutil.h pkcs11.h pkcs11f.h pkcs11p.h pkcs11t.h pkcs11n.h pkcs11u.h portreg.h secasn1.h secasn1t.h seccomon.h secder.h secdert.h secdig.h secdigt.h secitem.h secoid.h secoidt.h secport.h secerr.h utilmodt.h utilrename.h utilpars.h utilparst.h ../../../../dist/public/nss
Creating ../../../../dist/private/nss
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 templates.c ../../../../dist/private/nss
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/util'
cd freebl; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/freebl'
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 blapit.h shsign.h ecl/ecl-exp.h nsslowhash.h ../../../../dist/public/nss
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 alghmac.h blapi.h secmpi.h secrng.h ec.h ecl/ecl.h ecl/ecl-curve.h ../../../../dist/private/nss
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/freebl'
cd sqlite; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/sqlite'
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 sqlite3.h ../../../../dist/private/nss
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/sqlite'
cd softoken; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/softoken'
cd legacydb; gmake export
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/softoken/legacydb'
There are no private exports.
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/softoken/legacydb'
cd legacydb; gmake private_export
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/softoken/legacydb'
There are no private exports.
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/softoken/legacydb'
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 lgglue.h lowkeyi.h lowkeyti.h pkcs11ni.h softoken.h softoknt.h softkver.h sdb.h sftkdbt.h ../../../../dist/private/nss
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/softoken'
cd base; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/base'
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssbaset.h nssbase.h ../../../../dist/public/nss
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 baset.h base.h ../../../../dist/private/nss
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/base'
cd dev; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/dev'
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ckhelper.h devm.h devtm.h devt.h dev.h nssdevt.h nssdev.h ../../../../dist/private/nss
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/dev'
cd pki; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/pki'
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pki.h pkit.h nsspkit.h nsspki.h pkistore.h pki3hack.h pkitm.h pkim.h ../../../../dist/private/nss
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/pki'
cd libpkix; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix'
cd include; gmake export
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/include'
../../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix.h pkix_crlsel.h pkix_errorstrings.h pkix_results.h pkixt.h pkix_certsel.h pkix_params.h pkix_revchecker.h pkix_certstore.h pkix_pl_pki.h pkix_sample_modules.h pkix_checker.h pkix_pl_system.h pkix_util.h ../../../../../dist/private/nss
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/include'
cd pkix; gmake export
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix'
cd certsel; gmake export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/certsel'
../../../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_certselector.h pkix_comcertselparams.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/certsel'
cd crlsel; gmake export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/crlsel'
../../../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_comcrlselparams.h pkix_crlselector.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/crlsel'
cd checker; gmake export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/checker'
../../../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_basicconstraintschecker.h pkix_certchainchecker.h pkix_crlchecker.h pkix_ekuchecker.h pkix_expirationchecker.h pkix_namechainingchecker.h pkix_nameconstraintschecker.h pkix_ocspchecker.h pkix_policychecker.h pkix_revocationmethod.h pkix_revocationchecker.h pkix_signaturechecker.h pkix_targetcertchecker.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/checker'
cd params; gmake export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/params'
../../../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_procparams.h pkix_trustanchor.h pkix_valparams.h pkix_resourcelimits.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/params'
cd results; gmake export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/results'
../../../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_buildresult.h pkix_policynode.h pkix_valresult.h pkix_verifynode.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/results'
cd store; gmake export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/store'
../../../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_store.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/store'
cd top; gmake export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/top'
../../../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_build.h pkix_lifecycle.h pkix_validate.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/top'
cd util; gmake export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/util'
../../../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_tools.h pkix_error.h pkix_logger.h pkix_list.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/util'
cd certsel; gmake private_export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/certsel'
../../../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_certselector.h pkix_comcertselparams.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/certsel'
cd crlsel; gmake private_export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/crlsel'
../../../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_comcrlselparams.h pkix_crlselector.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/crlsel'
cd checker; gmake private_export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/checker'
../../../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_basicconstraintschecker.h pkix_certchainchecker.h pkix_crlchecker.h pkix_ekuchecker.h pkix_expirationchecker.h pkix_namechainingchecker.h pkix_nameconstraintschecker.h pkix_ocspchecker.h pkix_policychecker.h pkix_revocationmethod.h pkix_revocationchecker.h pkix_signaturechecker.h pkix_targetcertchecker.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/checker'
cd params; gmake private_export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/params'
../../../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_procparams.h pkix_trustanchor.h pkix_valparams.h pkix_resourcelimits.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/params'
cd results; gmake private_export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/results'
../../../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_buildresult.h pkix_policynode.h pkix_valresult.h pkix_verifynode.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/results'
cd store; gmake private_export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/store'
../../../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_store.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/store'
cd top; gmake private_export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/top'
../../../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_build.h pkix_lifecycle.h pkix_validate.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/top'
cd util; gmake private_export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/util'
../../../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_tools.h pkix_error.h pkix_logger.h pkix_list.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/util'
There are no private exports.
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix'
cd pkix_pl_nss; gmake export
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix_pl_nss'
cd pki; gmake export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki'
../../../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_basicconstraints.h pkix_pl_cert.h pkix_pl_certpolicyinfo.h pkix_pl_certpolicymap.h pkix_pl_certpolicyqualifier.h pkix_pl_crl.h pkix_pl_crldp.h pkix_pl_crlentry.h pkix_pl_date.h pkix_pl_generalname.h pkix_pl_infoaccess.h pkix_pl_nameconstraints.h pkix_pl_ocsprequest.h pkix_pl_ocspresponse.h pkix_pl_publickey.h pkix_pl_x500name.h pkix_pl_ocspcertid.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki'
cd system; gmake export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system'
../../../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_common.h pkix_pl_mem.h pkix_pl_object.h pkix_pl_string.h pkix_pl_primhash.h pkix_pl_bigint.h pkix_pl_mutex.h pkix_pl_bytearray.h pkix_pl_lifecycle.h pkix_pl_oid.h pkix_pl_hashtable.h pkix_pl_rwlock.h pkix_pl_monitorlock.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system'
cd module; gmake export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module'
../../../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_aiamgr.h pkix_pl_colcertstore.h pkix_pl_httpcertstore.h pkix_pl_httpdefaultclient.h pkix_pl_ldapt.h pkix_pl_ldapcertstore.h pkix_pl_ldapresponse.h pkix_pl_ldaprequest.h pkix_pl_ldapdefaultclient.h pkix_pl_nsscontext.h pkix_pl_pk11certstore.h pkix_pl_socket.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module'
cd pki; gmake private_export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki'
../../../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_basicconstraints.h pkix_pl_cert.h pkix_pl_certpolicyinfo.h pkix_pl_certpolicymap.h pkix_pl_certpolicyqualifier.h pkix_pl_crl.h pkix_pl_crldp.h pkix_pl_crlentry.h pkix_pl_date.h pkix_pl_generalname.h pkix_pl_infoaccess.h pkix_pl_nameconstraints.h pkix_pl_ocsprequest.h pkix_pl_ocspresponse.h pkix_pl_publickey.h pkix_pl_x500name.h pkix_pl_ocspcertid.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki'
cd system; gmake private_export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system'
../../../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_common.h pkix_pl_mem.h pkix_pl_object.h pkix_pl_string.h pkix_pl_primhash.h pkix_pl_bigint.h pkix_pl_mutex.h pkix_pl_bytearray.h pkix_pl_lifecycle.h pkix_pl_oid.h pkix_pl_hashtable.h pkix_pl_rwlock.h pkix_pl_monitorlock.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system'
cd module; gmake private_export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module'
../../../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_aiamgr.h pkix_pl_colcertstore.h pkix_pl_httpcertstore.h pkix_pl_httpdefaultclient.h pkix_pl_ldapt.h pkix_pl_ldapcertstore.h pkix_pl_ldapresponse.h pkix_pl_ldaprequest.h pkix_pl_ldapdefaultclient.h pkix_pl_nsscontext.h pkix_pl_pk11certstore.h pkix_pl_socket.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module'
There are no private exports.
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix_pl_nss'
cd include; gmake private_export
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/include'
../../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix.h pkix_crlsel.h pkix_errorstrings.h pkix_results.h pkixt.h pkix_certsel.h pkix_params.h pkix_revchecker.h pkix_certstore.h pkix_pl_pki.h pkix_sample_modules.h pkix_checker.h pkix_pl_system.h pkix_util.h ../../../../../dist/private/nss
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/include'
cd pkix; gmake private_export
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix'
cd certsel; gmake private_export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/certsel'
../../../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_certselector.h pkix_comcertselparams.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/certsel'
cd crlsel; gmake private_export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/crlsel'
../../../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_comcrlselparams.h pkix_crlselector.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/crlsel'
cd checker; gmake private_export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/checker'
../../../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_basicconstraintschecker.h pkix_certchainchecker.h pkix_crlchecker.h pkix_ekuchecker.h pkix_expirationchecker.h pkix_namechainingchecker.h pkix_nameconstraintschecker.h pkix_ocspchecker.h pkix_policychecker.h pkix_revocationmethod.h pkix_revocationchecker.h pkix_signaturechecker.h pkix_targetcertchecker.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/checker'
cd params; gmake private_export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/params'
../../../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_procparams.h pkix_trustanchor.h pkix_valparams.h pkix_resourcelimits.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/params'
cd results; gmake private_export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/results'
../../../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_buildresult.h pkix_policynode.h pkix_valresult.h pkix_verifynode.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/results'
cd store; gmake private_export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/store'
../../../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_store.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/store'
cd top; gmake private_export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/top'
../../../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_build.h pkix_lifecycle.h pkix_validate.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/top'
cd util; gmake private_export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/util'
../../../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_tools.h pkix_error.h pkix_logger.h pkix_list.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/util'
There are no private exports.
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix'
cd pkix_pl_nss; gmake private_export
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix_pl_nss'
cd pki; gmake private_export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki'
../../../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_basicconstraints.h pkix_pl_cert.h pkix_pl_certpolicyinfo.h pkix_pl_certpolicymap.h pkix_pl_certpolicyqualifier.h pkix_pl_crl.h pkix_pl_crldp.h pkix_pl_crlentry.h pkix_pl_date.h pkix_pl_generalname.h pkix_pl_infoaccess.h pkix_pl_nameconstraints.h pkix_pl_ocsprequest.h pkix_pl_ocspresponse.h pkix_pl_publickey.h pkix_pl_x500name.h pkix_pl_ocspcertid.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki'
cd system; gmake private_export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system'
../../../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_common.h pkix_pl_mem.h pkix_pl_object.h pkix_pl_string.h pkix_pl_primhash.h pkix_pl_bigint.h pkix_pl_mutex.h pkix_pl_bytearray.h pkix_pl_lifecycle.h pkix_pl_oid.h pkix_pl_hashtable.h pkix_pl_rwlock.h pkix_pl_monitorlock.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system'
cd module; gmake private_export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module'
../../../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_aiamgr.h pkix_pl_colcertstore.h pkix_pl_httpcertstore.h pkix_pl_httpdefaultclient.h pkix_pl_ldapt.h pkix_pl_ldapcertstore.h pkix_pl_ldapresponse.h pkix_pl_ldaprequest.h pkix_pl_ldapdefaultclient.h pkix_pl_nsscontext.h pkix_pl_pk11certstore.h pkix_pl_socket.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module'
There are no private exports.
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix_pl_nss'
There are no private exports.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix'
cd certdb; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/certdb'
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cert.h certt.h certdb.h ../../../../dist/public/nss
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 genname.h xconst.h certxutl.h certi.h ../../../../dist/private/nss
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/certdb'
cd certhigh; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/certhigh'
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ocsp.h ocspt.h ../../../../dist/public/nss
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ocspti.h ocspi.h ../../../../dist/private/nss
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/certhigh'
cd pk11wrap; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/pk11wrap'
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secmod.h secmodt.h secpkcs5.h pk11func.h pk11pub.h pk11priv.h pk11sdr.h pk11pqg.h ../../../../dist/public/nss
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secmodi.h dev3hack.h ../../../../dist/private/nss
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/pk11wrap'
cd cryptohi; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/cryptohi'
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cryptohi.h cryptoht.h key.h keyhi.h keyt.h keythi.h sechash.h ../../../../dist/public/nss
There are no private exports.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/cryptohi'
cd nss; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/nss'
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nss.h ../../../../dist/public/nss
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssrenam.h ../../../../dist/private/nss
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/nss'
cd ssl; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/ssl'
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ssl.h sslt.h sslerr.h sslproto.h preenc.h ../../../../dist/public/nss
There are no private exports.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/ssl'
cd pkcs12; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/pkcs12'
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkcs12t.h pkcs12.h p12plcy.h p12.h p12t.h ../../../../dist/public/nss
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/pkcs12'
cd pkcs7; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/pkcs7'
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secmime.h secpkcs7.h pkcs7t.h ../../../../dist/public/nss
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/pkcs7'
cd smime; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/smime'
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cms.h cmst.h smime.h cmsreclist.h ../../../../dist/public/nss
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/smime'
cd crmf; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/crmf'
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 crmf.h crmft.h cmmf.h cmmft.h ../../../../dist/public/nss
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 crmfi.h crmfit.h cmmfi.h cmmfit.h ../../../../dist/private/nss
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/crmf'
cd jar; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/jar'
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 jar.h jar-ds.h jarfile.h ../../../../dist/public/nss
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/jar'
cd ckfw; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/ckfw'
cd builtins; gmake export
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/ckfw/builtins'
../../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssckbi.h ../../../../../dist/public/nss
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/ckfw/builtins'
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssck.api nssckepv.h nssckft.h nssckfw.h nssckfwc.h nssckfwt.h nssckg.h nssckmdt.h nssckt.h ../../../../dist/public/nss
cd builtins; gmake private_export
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/ckfw/builtins'
There are no private exports.
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/ckfw/builtins'
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ck.h ckfw.h ckfwm.h ckfwtm.h ckmd.h ckt.h ../../../../dist/private/nss
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/ckfw'
cd sysinit; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/sysinit'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/sysinit'
gmake[1]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib'
cd cmd; gmake export
gmake[1]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd'
cd lib; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/lib'
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 basicutil.h secutil.h pk11table.h ../../../../dist/private/nss
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/lib'
cd addbuiltin; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/addbuiltin'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/addbuiltin'
cd atob; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/atob'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/atob'
cd bltest; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/bltest'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/bltest'
cd btoa; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/btoa'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/btoa'
cd certcgi; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/certcgi'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/certcgi'
cd certutil; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/certutil'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/certutil'
cd checkcert; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/checkcert'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/checkcert'
cd chktest; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/chktest'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/chktest'
cd crlutil; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/crlutil'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/crlutil'
cd crmftest; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/crmftest'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/crmftest'
cd dbtest; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/dbtest'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/dbtest'
cd derdump; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/derdump'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/derdump'
cd digest; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/digest'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/digest'
cd httpserv; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/httpserv'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/httpserv'
cd fipstest; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/fipstest'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/fipstest'
cd lowhashtest; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/lowhashtest'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/lowhashtest'
cd listsuites; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/listsuites'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/listsuites'
cd makepqg; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/makepqg'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/makepqg'
cd multinit; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/multinit'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/multinit'
cd ocspclnt; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/ocspclnt'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/ocspclnt'
cd ocspresp; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/ocspresp'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/ocspresp'
cd oidcalc; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/oidcalc'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/oidcalc'
cd p7content; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/p7content'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/p7content'
cd p7env; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/p7env'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/p7env'
cd p7sign; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/p7sign'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/p7sign'
cd p7verify; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/p7verify'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/p7verify'
cd pk12util; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/pk12util'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/pk12util'
cd pk11mode; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/pk11mode'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/pk11mode'
cd pk1sign; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/pk1sign'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/pk1sign'
cd pkix-errcodes; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/pkix-errcodes'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/pkix-errcodes'
cd pp; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/pp'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/pp'
cd pwdecrypt; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/pwdecrypt'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/pwdecrypt'
cd rsaperf; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/rsaperf'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/rsaperf'
cd sdrtest; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/sdrtest'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/sdrtest'
cd selfserv; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/selfserv'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/selfserv'
cd signtool; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/signtool'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/signtool'
cd signver; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/signver'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/signver'
cd shlibsign; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/shlibsign'
cd mangle; gmake export
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/shlibsign/mangle'
gmake[3]: Nothing to be done for `export'.
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/shlibsign/mangle'
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/shlibsign'
cd smimetools; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/smimetools'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/smimetools'
cd ssltap; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/ssltap'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/ssltap'
cd strsclnt; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/strsclnt'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/strsclnt'
cd symkeyutil; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/symkeyutil'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/symkeyutil'
cd tests; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/tests'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/tests'
cd tstclnt; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/tstclnt'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/tstclnt'
cd vfychain; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/vfychain'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/vfychain'
cd vfyserv; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/vfyserv'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/vfyserv'
cd modutil; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/modutil'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/modutil'
gmake[1]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd'
cd lib; gmake libs
gmake[1]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib'
cd util; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/util'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/quickder.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  quickder.c
quickder.c: In function DecodeItem:
quickder.c:611:12: warning: variable optional set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/secdig.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  secdig.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/derdec.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  derdec.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/derenc.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  derenc.c
derenc.c: In function der_encode:
derenc.c:282:22: warning: variable optional set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/dersubr.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  dersubr.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/dertime.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  dertime.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/errstrs.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  errstrs.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/nssb64d.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  nssb64d.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/nssb64e.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  nssb64e.c
nssb64e.c: In function NSSBase64_EncodeItem_Util:
nssb64e.c:686:15: warning: out_len may be used uninitialized in this function [-Wmaybe-uninitialized]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/nssrwlk.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  nssrwlk.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/nssilock.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  nssilock.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/oidstring.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  oidstring.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/portreg.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  portreg.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/secalgid.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  secalgid.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/secasn1d.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  secasn1d.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/secasn1e.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  secasn1e.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/secasn1u.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  secasn1u.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/secitem.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  secitem.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/secload.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  secload.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/secoid.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  secoid.c
secoid.c: In function SECOID_Init:
secoid.c:1907:19: warning: variable c set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/sectime.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sectime.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/secport.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  secport.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/templates.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  templates.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/utf8.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  utf8.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/utilmod.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  utilmod.c
utilmod.c: In function nssutil_DeleteSecmodDB.isra.1:
utilmod.c:504:2339: warning: lib_len may be used uninitialized in this function [-Wmaybe-uninitialized]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/utilpars.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  utilpars.c
rm -f Linux3.6_x86_glibc_PTH_OPT.OBJ/libnssutil.a
ar cr Linux3.6_x86_glibc_PTH_OPT.OBJ/libnssutil.a Linux3.6_x86_glibc_PTH_OPT.OBJ/quickder.o Linux3.6_x86_glibc_PTH_OPT.OBJ/secdig.o Linux3.6_x86_glibc_PTH_OPT.OBJ/derdec.o Linux3.6_x86_glibc_PTH_OPT.OBJ/derenc.o Linux3.6_x86_glibc_PTH_OPT.OBJ/dersubr.o Linux3.6_x86_glibc_PTH_OPT.OBJ/dertime.o Linux3.6_x86_glibc_PTH_OPT.OBJ/errstrs.o Linux3.6_x86_glibc_PTH_OPT.OBJ/nssb64d.o Linux3.6_x86_glibc_PTH_OPT.OBJ/nssb64e.o Linux3.6_x86_glibc_PTH_OPT.OBJ/nssrwlk.o Linux3.6_x86_glibc_PTH_OPT.OBJ/nssilock.o Linux3.6_x86_glibc_PTH_OPT.OBJ/oidstring.o Linux3.6_x86_glibc_PTH_OPT.OBJ/portreg.o Linux3.6_x86_glibc_PTH_OPT.OBJ/secalgid.o Linux3.6_x86_glibc_PTH_OPT.OBJ/secasn1d.o Linux3.6_x86_glibc_PTH_OPT.OBJ/secasn1e.o Linux3.6_x86_glibc_PTH_OPT.OBJ/secasn1u.o Linux3.6_x86_glibc_PTH_OPT.OBJ/secitem.o Linux3.6_x86_glibc_PTH_OPT.OBJ/secload.o Linux3.6_x86_glibc_PTH_OPT.OBJ/secoid.o Linux3.6_x86_glibc_PTH_OPT.OBJ/sectime.o Linux3.6_x86_glibc_PTH_OPT.OBJ/secport.o Linux3.6_x86_glibc_PTH_OPT.OBJ/templates.o Linux3.6_x86_glibc_PTH_OPT.OBJ/utf8.o Linux3.6_x86_glibc_PTH_OPT.OBJ/utilmod.o Linux3.6_x86_glibc_PTH_OPT.OBJ/utilpars.o
ranlib Linux3.6_x86_glibc_PTH_OPT.OBJ/libnssutil.a
grep -v ';-' nssutil.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux3.6_x86_glibc_PTH_OPT.OBJ/nssutil.def
rm -f Linux3.6_x86_glibc_PTH_OPT.OBJ/libnssutil3.so
gcc -shared -m32 -Wl,-z,defs -Wl,-soname -Wl,libnssutil3.so  -Wl,--version-script,Linux3.6_x86_glibc_PTH_OPT.OBJ/nssutil.def -o Linux3.6_x86_glibc_PTH_OPT.OBJ/libnssutil3.so Linux3.6_x86_glibc_PTH_OPT.OBJ/quickder.o Linux3.6_x86_glibc_PTH_OPT.OBJ/secdig.o Linux3.6_x86_glibc_PTH_OPT.OBJ/derdec.o Linux3.6_x86_glibc_PTH_OPT.OBJ/derenc.o Linux3.6_x86_glibc_PTH_OPT.OBJ/dersubr.o Linux3.6_x86_glibc_PTH_OPT.OBJ/dertime.o Linux3.6_x86_glibc_PTH_OPT.OBJ/errstrs.o Linux3.6_x86_glibc_PTH_OPT.OBJ/nssb64d.o Linux3.6_x86_glibc_PTH_OPT.OBJ/nssb64e.o Linux3.6_x86_glibc_PTH_OPT.OBJ/nssrwlk.o Linux3.6_x86_glibc_PTH_OPT.OBJ/nssilock.o Linux3.6_x86_glibc_PTH_OPT.OBJ/oidstring.o Linux3.6_x86_glibc_PTH_OPT.OBJ/portreg.o Linux3.6_x86_glibc_PTH_OPT.OBJ/secalgid.o Linux3.6_x86_glibc_PTH_OPT.OBJ/secasn1d.o Linux3.6_x86_glibc_PTH_OPT.OBJ/secasn1e.o Linux3.6_x86_glibc_PTH_OPT.OBJ/secasn1u.o Linux3.6_x86_glibc_PTH_OPT.OBJ/secitem.o Linux3.6_x86_glibc_PTH_OPT.OBJ/secload.o Linux3.6_x86_glibc_PTH_OPT.OBJ/secoid.o Linux3.6_x86_glibc_PTH_OPT.OBJ/sectime.o Linux3.6_x86_glibc_PTH_OPT.OBJ/secport.o Linux3.6_x86_glibc_PTH_OPT.OBJ/templates.o Linux3.6_x86_glibc_PTH_OPT.OBJ/utf8.o Linux3.6_x86_glibc_PTH_OPT.OBJ/utilmod.o Linux3.6_x86_glibc_PTH_OPT.OBJ/utilpars.o    -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
chmod +x Linux3.6_x86_glibc_PTH_OPT.OBJ/libnssutil3.so
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.6_x86_glibc_PTH_OPT.OBJ/libnssutil.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.6_x86_glibc_PTH_OPT.OBJ/libnssutil3.so ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/util'
cd freebl; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/freebl'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/loader.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  loader.c
loader.c: In function freebl_LoadDSO:
loader.c:133:14: warning: variable status set but not used [-Wunused-but-set-variable]
loader.c: In function BL_Unload:
loader.c:902:20: warning: unused variable status [-Wunused-variable]
rm -f Linux3.6_x86_glibc_PTH_OPT.OBJ/libfreebl.a
ar cr Linux3.6_x86_glibc_PTH_OPT.OBJ/libfreebl.a Linux3.6_x86_glibc_PTH_OPT.OBJ/loader.o
ranlib Linux3.6_x86_glibc_PTH_OPT.OBJ/libfreebl.a
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.6_x86_glibc_PTH_OPT.OBJ/libfreebl.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib
mkdir Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB
gmake FREEBL_CHILD_BUILD=1 \
 OBJDIR=Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB libs
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/freebl'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/freeblver.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  freeblver.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ldvector.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ldvector.c
ldvector.c: In function FREEBL_GetVector:
ldvector.c:273:19: warning: variable c set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/sysrand.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  sysrand.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/sha_fast.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  sha_fast.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/md2.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  md2.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/md5.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  md5.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/sha512.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  sha512.c
sha512.c: In function SHA512_Compress:
sha512.c:897:14: warning: unused variable t1 [-Wunused-variable]
sha512.c:919:18: warning: unused variable t2 [-Wunused-variable]
sha512.c:919:14: warning: unused variable t1 [-Wunused-variable]
sha512.c: In function SHA512_End:
sha512.c:1193:14: warning: unused variable t1 [-Wunused-variable]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/alghmac.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  alghmac.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/rawhash.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  rawhash.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/alg2268.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  alg2268.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/arcfour.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  arcfour.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/arcfive.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  arcfive.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/desblapi.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  desblapi.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/des.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  des.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/drbg.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  drbg.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/cts.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  cts.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ctr.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ctr.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/gcm.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  gcm.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/rijndael.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  rijndael.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/aeskeywrap.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  aeskeywrap.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/camellia.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  camellia.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/dh.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  dh.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ec.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ec.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/pqg.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  pqg.c
pqg.c: In function pqg_ParamGen:
pqg.c:1234:18: warning: variable b set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/dsa.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  dsa.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/rsa.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  rsa.c
rsa.c: In function get_blinding_params:
rsa.c:1098:26: warning: variable prevbp set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/shvfy.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  shvfy.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/tlsprfalg.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  tlsprfalg.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/seed.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  seed.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/jpake.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  jpake.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpprime.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  mpi/mpprime.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpmontg.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  mpi/mpmontg.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mplogic.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  mpi/mplogic.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpi.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  mpi/mpi.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mp_gf2m.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  mpi/mp_gf2m.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpcpucache.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  mpi/mpcpucache.c
mpi/mpcpucache.c: In function s_mpi_is_sse2:
mpi/mpcpucache.c:634:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing]
mpi/mpcpucache.c:635:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing]
mpi/mpcpucache.c:636:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing]
mpi/mpcpucache.c:622:9: warning: variable manufacturer set but not used [-Wunused-but-set-variable]
mpi/mpcpucache.c: In function s_mpi_getProcessorLineSize:
mpi/mpcpucache.c:681:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing]
mpi/mpcpucache.c:682:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing]
mpi/mpcpucache.c:683:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecl.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ecl/ecl.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecl_curve.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ecl/ecl_curve.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecl_mult.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ecl/ecl_mult.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecl_gf.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ecl/ecl_gf.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_aff.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ecl/ecp_aff.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_jac.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ecl/ecp_jac.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_mont.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ecl/ecp_mont.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ec_naf.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ecl/ec_naf.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_jm.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ecl/ecp_jm.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ec2_aff.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ecl/ec2_aff.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ec2_mont.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ecl/ec2_mont.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ec2_proj.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ecl/ec2_proj.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ec2_163.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ecl/ec2_163.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ec2_193.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ecl/ec2_193.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ec2_233.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ecl/ec2_233.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_192.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ecl/ecp_192.c
ecl/ecp_192.c: In function ec_GFp_nistp192_mod:
ecl/ecp_192.c:123:6: warning: suggest parentheses around && within || [-Wparentheses]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_224.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ecl/ecp_224.c
ecl/ecp_224.c: In function ec_GFp_nistp224_mod:
ecl/ecp_224.c:26:53: warning: unused variable a3a [-Wunused-variable]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_256.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ecl/ecp_256.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_384.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ecl/ecp_384.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_521.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ecl/ecp_521.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/stubs.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  stubs.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/nsslowhash.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  nsslowhash.c
nsslowhash.c: In function NSSLOW_Init:
nsslowhash.c:292:12: warning: variable nsprAvailable set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpi_x86.o -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  -c mpi/mpi_x86.s
grep -v ';-' freebl_hash.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/freebl.def
rm -f Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so
gcc -shared -m32 -Wl,-z,defs -Wl,-soname -Wl,libfreebl3.so  -Wl,--version-script,Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/freebl.def -Wl,-Bsymbolic -o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/freeblver.o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ldvector.o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/sysrand.o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/sha_fast.o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/md2.o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/md5.o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/sha512.o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/alghmac.o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/rawhash.o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/alg2268.o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/arcfour.o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/arcfive.o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/desblapi.o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/des.o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/drbg.o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/cts.o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ctr.o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/gcm.o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/rijndael.o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/aeskeywrap.o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/camellia.o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/dh.o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ec.o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/pqg.o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/dsa.o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/rsa.o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/shvfy.o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/tlsprfalg.o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/seed.o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/jpake.o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpprime.o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpmontg.o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mplogic.o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpi.o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mp_gf2m.o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpcpucache.o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecl.o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecl_curve.o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecl_mult.o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecl_gf.o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_aff.o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_jac.o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_mont.o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ec_naf.o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_jm.o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ec2_aff.o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ec2_mont.o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ec2_proj.o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ec2_163.o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ec2_193.o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ec2_233.o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_192.o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_224.o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_256.o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_384.o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_521.o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/stubs.o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/nsslowhash.o Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpi_x86.o      -ldl -lc
chmod +x Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/freebl'
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/freebl'
cd sqlite; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/sqlite'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/sqlite3.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSQLITE_THREADSAFE=1 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sqlite3.c
sqlite3.c: In function pagerPagecount:
sqlite3.c:39133:7: warning: variable rc set but not used [-Wunused-but-set-variable]
sqlite3.c: In function balance_nonroot:
sqlite3.c:43586:11: warning: variable t set but not used [-Wunused-but-set-variable]
sqlite3.c: In function columnMem:
sqlite3.c:50866:7: warning: variable vals set but not used [-Wunused-but-set-variable]
sqlite3.c: In function sqlite3DeleteIndex:
sqlite3.c:66581:10: warning: variable pOld set but not used [-Wunused-but-set-variable]
sqlite3.c: In function sqlite3CommitTransaction:
sqlite3.c:69556:12: warning: variable db set but not used [-Wunused-but-set-variable]
sqlite3.c: In function sqlite3RollbackTransaction:
sqlite3.c:69576:12: warning: variable db set but not used [-Wunused-but-set-variable]
sqlite3.c: In function sqlite3FkCheck:
sqlite3.c:73225:9: warning: variable v set but not used [-Wunused-but-set-variable]
sqlite3.c: In function sqlite3Insert:
sqlite3.c:74197:7: warning: variable regRecord set but not used [-Wunused-but-set-variable]
sqlite3.c: In function sqlite3Update:
sqlite3.c:84700:7: warning: variable regRec set but not used [-Wunused-but-set-variable]
sqlite3.c: In function codeOneLoopStart:
sqlite3.c:89777:16: warning: variable pFinal set but not used [-Wunused-but-set-variable]
sqlite3.c: In function sqlite3Parser:
sqlite3.c:93894:7: warning: variable yyendofinput set but not used [-Wunused-but-set-variable]
sqlite3.c: In function fkLookupParent:
sqlite3.c:47670:5: warning: assuming signed overflow does not occur when assuming that (X - c) <= X is always true [-Wstrict-overflow]
rm -f Linux3.6_x86_glibc_PTH_OPT.OBJ/libsqlite.a
ar cr Linux3.6_x86_glibc_PTH_OPT.OBJ/libsqlite.a Linux3.6_x86_glibc_PTH_OPT.OBJ/sqlite3.o
ranlib Linux3.6_x86_glibc_PTH_OPT.OBJ/libsqlite.a
grep -v ';-' sqlite.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux3.6_x86_glibc_PTH_OPT.OBJ/sqlite.def
rm -f Linux3.6_x86_glibc_PTH_OPT.OBJ/libsqlite3.so
gcc -shared -m32 -Wl,-z,defs -Wl,-soname -Wl,libsqlite3.so  -Wl,--version-script,Linux3.6_x86_glibc_PTH_OPT.OBJ/sqlite.def -o Linux3.6_x86_glibc_PTH_OPT.OBJ/libsqlite3.so Linux3.6_x86_glibc_PTH_OPT.OBJ/sqlite3.o     -lpthread  -ldl -lc
chmod +x Linux3.6_x86_glibc_PTH_OPT.OBJ/libsqlite3.so
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.6_x86_glibc_PTH_OPT.OBJ/libsqlite.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.6_x86_glibc_PTH_OPT.OBJ/libsqlite3.so ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/sqlite'
cd softoken; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/softoken'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/ecdecode.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  ecdecode.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/fipsaudt.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  fipsaudt.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/fipstest.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  fipstest.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/fipstokn.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  fipstokn.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/lgglue.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  lgglue.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/lowkey.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  lowkey.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/lowpbe.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  lowpbe.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/padbuf.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  padbuf.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkcs11.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pkcs11.c
pkcs11.c: In function NSC_GetInfo:
pkcs11.c:3059:19: warning: variable c set but not used [-Wunused-but-set-variable]
pkcs11.c: In function NSC_CreateObject:
pkcs11.c:4001:21: warning: moduleIndex may be used uninitialized in this function [-Wmaybe-uninitialized]
pkcs11.c:3921:19: note: moduleIndex was declared here
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkcs11c.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pkcs11c.c
pkcs11c.c: In function NSC_GenerateKeyPair:
pkcs11c.c:3836:9: warning: variable private_value_bits set but not used [-Wunused-but-set-variable]
pkcs11c.c: In function sftk_PackagePrivateKey:
pkcs11c.c:4358:14: warning: variable fordebug set but not used [-Wunused-but-set-variable]
pkcs11c.c: In function NSC_GenerateKeyPair:
pkcs11c.c:3756:6: warning: subPrimeLen may be used uninitialized in this function [-Wmaybe-uninitialized]
pkcs11c.c:3538:14: note: subPrimeLen was declared here
pkcs11c.c:3708:23: warning: modulusLen may be used uninitialized in this function [-Wmaybe-uninitialized]
pkcs11c.c:3537:14: note: modulusLen was declared here
pkcs11c.c: In function NSC_GenerateKey:
pkcs11c.c:3464:13: warning: hashType may be used uninitialized in this function [-Wmaybe-uninitialized]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkcs11u.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pkcs11u.c
pkcs11u.c: In function sftk_DeleteObject:
pkcs11u.c:1177:22: warning: unused variable to [-Wunused-variable]
pkcs11u.c: In function sftk_NewTokenObject:
pkcs11u.c:1902:22: warning: variable tokObject set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/rsawrapr.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  rsawrapr.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/sdb.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sdb.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/sftkdb.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sftkdb.c
sftkdb.c: In function sftkdb_fixupTemplateOut:
sftkdb.c:328:22: warning: variable data set but not used [-Wunused-but-set-variable]
sftkdb.c: In function sftkdb_CreateObject:
sftkdb.c:576:12: warning: variable inTransaction set but not used [-Wunused-but-set-variable]
sftkdb.c: In function sftkdb_handleIDAndName:
sftkdb.c:2014:11: warning: variable crv set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/sftkpars.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sftkpars.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/sftkpwd.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sftkpwd.c
sftkpwd.c: In function sftk_updateMacs:
sftkpwd.c:868:11: warning: variable crv2 set but not used [-Wunused-but-set-variable]
sftkpwd.c:867:11: warning: variable crv set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/softkver.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  softkver.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/tlsprf.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  tlsprf.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/jpakesftk.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  jpakesftk.c
rm -f Linux3.6_x86_glibc_PTH_OPT.OBJ/libsoftokn.a
ar cr Linux3.6_x86_glibc_PTH_OPT.OBJ/libsoftokn.a Linux3.6_x86_glibc_PTH_OPT.OBJ/ecdecode.o Linux3.6_x86_glibc_PTH_OPT.OBJ/fipsaudt.o Linux3.6_x86_glibc_PTH_OPT.OBJ/fipstest.o Linux3.6_x86_glibc_PTH_OPT.OBJ/fipstokn.o Linux3.6_x86_glibc_PTH_OPT.OBJ/lgglue.o Linux3.6_x86_glibc_PTH_OPT.OBJ/lowkey.o Linux3.6_x86_glibc_PTH_OPT.OBJ/lowpbe.o Linux3.6_x86_glibc_PTH_OPT.OBJ/padbuf.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkcs11.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkcs11c.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkcs11u.o Linux3.6_x86_glibc_PTH_OPT.OBJ/rsawrapr.o Linux3.6_x86_glibc_PTH_OPT.OBJ/sdb.o Linux3.6_x86_glibc_PTH_OPT.OBJ/sftkdb.o Linux3.6_x86_glibc_PTH_OPT.OBJ/sftkpars.o Linux3.6_x86_glibc_PTH_OPT.OBJ/sftkpwd.o Linux3.6_x86_glibc_PTH_OPT.OBJ/softkver.o Linux3.6_x86_glibc_PTH_OPT.OBJ/tlsprf.o Linux3.6_x86_glibc_PTH_OPT.OBJ/jpakesftk.o
ranlib Linux3.6_x86_glibc_PTH_OPT.OBJ/libsoftokn.a
grep -v ';-' softokn.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux3.6_x86_glibc_PTH_OPT.OBJ/softokn.def
rm -f Linux3.6_x86_glibc_PTH_OPT.OBJ/libsoftokn3.so
gcc -shared -m32 -Wl,-z,defs -Wl,-soname -Wl,libsoftokn3.so  -Wl,--version-script,Linux3.6_x86_glibc_PTH_OPT.OBJ/softokn.def -o Linux3.6_x86_glibc_PTH_OPT.OBJ/libsoftokn3.so Linux3.6_x86_glibc_PTH_OPT.OBJ/ecdecode.o Linux3.6_x86_glibc_PTH_OPT.OBJ/fipsaudt.o Linux3.6_x86_glibc_PTH_OPT.OBJ/fipstest.o Linux3.6_x86_glibc_PTH_OPT.OBJ/fipstokn.o Linux3.6_x86_glibc_PTH_OPT.OBJ/lgglue.o Linux3.6_x86_glibc_PTH_OPT.OBJ/lowkey.o Linux3.6_x86_glibc_PTH_OPT.OBJ/lowpbe.o Linux3.6_x86_glibc_PTH_OPT.OBJ/padbuf.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkcs11.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkcs11c.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkcs11u.o Linux3.6_x86_glibc_PTH_OPT.OBJ/rsawrapr.o Linux3.6_x86_glibc_PTH_OPT.OBJ/sdb.o Linux3.6_x86_glibc_PTH_OPT.OBJ/sftkdb.o Linux3.6_x86_glibc_PTH_OPT.OBJ/sftkpars.o Linux3.6_x86_glibc_PTH_OPT.OBJ/sftkpwd.o Linux3.6_x86_glibc_PTH_OPT.OBJ/softkver.o Linux3.6_x86_glibc_PTH_OPT.OBJ/tlsprf.o Linux3.6_x86_glibc_PTH_OPT.OBJ/jpakesftk.o   ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libfreebl.a  -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lsqlite3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
chmod +x Linux3.6_x86_glibc_PTH_OPT.OBJ/libsoftokn3.so
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.6_x86_glibc_PTH_OPT.OBJ/libsoftokn.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.6_x86_glibc_PTH_OPT.OBJ/libsoftokn3.so ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib
cd legacydb; gmake libs
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/softoken/legacydb'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/dbmshim.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm  dbmshim.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/keydb.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm  keydb.c
keydb.c: In function seckey_encrypt_private_key:
keydb.c:1480:14: warning: variable fordebug set but not used [-Wunused-but-set-variable]
keydb.c: In function seckey_decrypt_private_key:
keydb.c:1709:14: warning: variable fordebug set but not used [-Wunused-but-set-variable]
keydb.c: In function encodePWCheckEntry:
keydb.c:1994:15: warning: variable rv set but not used [-Wunused-but-set-variable]
keydb.c: In function nsslowkey_ResetKeyDB:
keydb.c:2036:9: warning: variable ret set but not used [-Wunused-but-set-variable]
keydb.c: In function keydb_Get:
keydb.c:2093:14: warning: variable prstat set but not used [-Wunused-but-set-variable]
keydb.c: In function keydb_Put:
keydb.c:2111:14: warning: variable prstat set but not used [-Wunused-but-set-variable]
keydb.c: In function keydb_Sync:
keydb.c:2129:14: warning: variable prstat set but not used [-Wunused-but-set-variable]
keydb.c: In function keydb_Del:
keydb.c:2147:14: warning: variable prstat set but not used [-Wunused-but-set-variable]
keydb.c: In function keydb_Seq:
keydb.c:2165:14: warning: variable prstat set but not used [-Wunused-but-set-variable]
keydb.c: In function keydb_Close:
keydb.c:2183:14: warning: variable prstat set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/lgattr.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm  lgattr.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/lgcreate.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm  lgcreate.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/lgdestroy.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm  lgdestroy.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/lgfind.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm  lgfind.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/lginit.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm  lginit.c
lginit.c: In function legacy_Open:
lginit.c:597:19: warning: variable c set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/lgutil.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm  lgutil.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/lowcert.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm  lowcert.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/lowkey.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm  lowkey.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pcertdb.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm  pcertdb.c
pcertdb.c: In function nsslowcert_UnlockDB:
pcertdb.c:108:14: warning: variable prstat set but not used [-Wunused-but-set-variable]
pcertdb.c: In function nsslowcert_UnlockCertRefCount:
pcertdb.c:139:14: warning: variable prstat set but not used [-Wunused-but-set-variable]
pcertdb.c: In function nsslowcert_UnlockCertTrust:
pcertdb.c:171:14: warning: variable prstat set but not used [-Wunused-but-set-variable]
pcertdb.c: In function nsslowcert_UnlockFreeList:
pcertdb.c:204:14: warning: variable prstat set but not used [-Wunused-but-set-variable]
pcertdb.c: In function certdb_Get:
pcertdb.c:229:14: warning: variable prstat set but not used [-Wunused-but-set-variable]
pcertdb.c: In function certdb_Put:
pcertdb.c:245:14: warning: variable prstat set but not used [-Wunused-but-set-variable]
pcertdb.c: In function certdb_Sync:
pcertdb.c:261:14: warning: variable prstat set but not used [-Wunused-but-set-variable]
pcertdb.c: In function certdb_Del:
pcertdb.c:278:14: warning: variable prstat set but not used [-Wunused-but-set-variable]
pcertdb.c: In function certdb_Seq:
pcertdb.c:299:14: warning: variable prstat set but not used [-Wunused-but-set-variable]
pcertdb.c: In function certdb_Close:
pcertdb.c:315:14: warning: variable prstat set but not used [-Wunused-but-set-variable]
pcertdb.c: In function NewDBSubjectEntry:
pcertdb.c:2435:18: warning: variable eaddrlen set but not used [-Wunused-but-set-variable]
pcertdb.c: In function UpdateV6DB:
pcertdb.c:3591:15: warning: variable rv set but not used [-Wunused-but-set-variable]
pcertdb.c: In function UpdateV5DB:
pcertdb.c:3796:15: warning: variable rv set but not used [-Wunused-but-set-variable]
pcertdb.c: In function nsslowcert_FindCrlByKey:
pcertdb.c:5075:9: warning: variable key set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11db.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm  pk11db.c
rm -f Linux3.6_x86_glibc_PTH_OPT.OBJ/libnssdbm.a
ar cr Linux3.6_x86_glibc_PTH_OPT.OBJ/libnssdbm.a Linux3.6_x86_glibc_PTH_OPT.OBJ/dbmshim.o Linux3.6_x86_glibc_PTH_OPT.OBJ/keydb.o Linux3.6_x86_glibc_PTH_OPT.OBJ/lgattr.o Linux3.6_x86_glibc_PTH_OPT.OBJ/lgcreate.o Linux3.6_x86_glibc_PTH_OPT.OBJ/lgdestroy.o Linux3.6_x86_glibc_PTH_OPT.OBJ/lgfind.o Linux3.6_x86_glibc_PTH_OPT.OBJ/lginit.o Linux3.6_x86_glibc_PTH_OPT.OBJ/lgutil.o Linux3.6_x86_glibc_PTH_OPT.OBJ/lowcert.o Linux3.6_x86_glibc_PTH_OPT.OBJ/lowkey.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pcertdb.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11db.o
ranlib Linux3.6_x86_glibc_PTH_OPT.OBJ/libnssdbm.a
grep -v ';-' nssdbm.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux3.6_x86_glibc_PTH_OPT.OBJ/nssdbm.def
rm -f Linux3.6_x86_glibc_PTH_OPT.OBJ/libnssdbm3.so
gcc -shared -m32 -Wl,-z,defs -Wl,-soname -Wl,libnssdbm3.so  -Wl,--version-script,Linux3.6_x86_glibc_PTH_OPT.OBJ/nssdbm.def -o Linux3.6_x86_glibc_PTH_OPT.OBJ/libnssdbm3.so Linux3.6_x86_glibc_PTH_OPT.OBJ/dbmshim.o Linux3.6_x86_glibc_PTH_OPT.OBJ/keydb.o Linux3.6_x86_glibc_PTH_OPT.OBJ/lgattr.o Linux3.6_x86_glibc_PTH_OPT.OBJ/lgcreate.o Linux3.6_x86_glibc_PTH_OPT.OBJ/lgdestroy.o Linux3.6_x86_glibc_PTH_OPT.OBJ/lgfind.o Linux3.6_x86_glibc_PTH_OPT.OBJ/lginit.o Linux3.6_x86_glibc_PTH_OPT.OBJ/lgutil.o Linux3.6_x86_glibc_PTH_OPT.OBJ/lowcert.o Linux3.6_x86_glibc_PTH_OPT.OBJ/lowkey.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pcertdb.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11db.o   ../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libfreebl.a ../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libdbm.a  -L../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -L../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
chmod +x Linux3.6_x86_glibc_PTH_OPT.OBJ/libnssdbm3.so
../../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.6_x86_glibc_PTH_OPT.OBJ/libnssdbm.a ../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib
../../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.6_x86_glibc_PTH_OPT.OBJ/libnssdbm3.so ../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/softoken/legacydb'
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/softoken'
cd base; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/base'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/arena.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  arena.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/error.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  error.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/errorval.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  errorval.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/hashops.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  hashops.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/libc.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  libc.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/tracker.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  tracker.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/item.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  item.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/utf8.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  utf8.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/list.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  list.c
list.c: In function nssList_Add:
list.c:224:14: warning: variable nssrv set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/hash.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  hash.c
rm -f Linux3.6_x86_glibc_PTH_OPT.OBJ/libnssb.a
ar cr Linux3.6_x86_glibc_PTH_OPT.OBJ/libnssb.a Linux3.6_x86_glibc_PTH_OPT.OBJ/arena.o Linux3.6_x86_glibc_PTH_OPT.OBJ/error.o Linux3.6_x86_glibc_PTH_OPT.OBJ/errorval.o Linux3.6_x86_glibc_PTH_OPT.OBJ/hashops.o Linux3.6_x86_glibc_PTH_OPT.OBJ/libc.o Linux3.6_x86_glibc_PTH_OPT.OBJ/tracker.o Linux3.6_x86_glibc_PTH_OPT.OBJ/item.o Linux3.6_x86_glibc_PTH_OPT.OBJ/utf8.o Linux3.6_x86_glibc_PTH_OPT.OBJ/list.o Linux3.6_x86_glibc_PTH_OPT.OBJ/hash.o
ranlib Linux3.6_x86_glibc_PTH_OPT.OBJ/libnssb.a
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.6_x86_glibc_PTH_OPT.OBJ/libnssb.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/base'
cd dev; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/dev'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/devslot.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  devslot.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/devtoken.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  devtoken.c
devtoken.c: In function nssToken_TraverseCertificates:
devtoken.c:1473:14: warning: variable status set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/devutil.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  devutil.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/ckhelper.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  ckhelper.c
rm -f Linux3.6_x86_glibc_PTH_OPT.OBJ/libnssdev.a
ar cr Linux3.6_x86_glibc_PTH_OPT.OBJ/libnssdev.a Linux3.6_x86_glibc_PTH_OPT.OBJ/devslot.o Linux3.6_x86_glibc_PTH_OPT.OBJ/devtoken.o Linux3.6_x86_glibc_PTH_OPT.OBJ/devutil.o Linux3.6_x86_glibc_PTH_OPT.OBJ/ckhelper.o
ranlib Linux3.6_x86_glibc_PTH_OPT.OBJ/libnssdev.a
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.6_x86_glibc_PTH_OPT.OBJ/libnssdev.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/dev'
cd pki; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/pki'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/asymmkey.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  asymmkey.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/certificate.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  certificate.c
certificate.c: In function nssCertificateList_DoCallback:
certificate.c:902:14: warning: variable nssrv set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/cryptocontext.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  cryptocontext.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/symmkey.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  symmkey.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/trustdomain.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  trustdomain.c
trustdomain.c: In function NSSTrustDomain_TraverseCertificates:
trustdomain.c:1002:14: warning: variable status set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/tdcache.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  tdcache.c
tdcache.c: In function merge_object_instances:
tdcache.c:704:49: warning: comparison between PRStatus and enum _SECStatus [-Wenum-compare]
tdcache.c: In function add_cert_to_cache:
tdcache.c:776:9: warning: variable handle set but not used [-Wunused-but-set-variable]
tdcache.c: In function nssTrustDomain_RemoveCertFromCacheLOCKED:
tdcache.c:276:16: warning: nickname may be used uninitialized in this function [-Wmaybe-uninitialized]
tdcache.c:336:14: note: nickname was declared here
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/certdecode.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  certdecode.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkistore.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  pkistore.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkibase.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  pkibase.c
pkibase.c: In function nssPKIObjectCollection_Traverse:
pkibase.c:910:14: warning: variable status set but not used [-Wunused-but-set-variable]
pkibase.c: In function nssCertificateCollection_Create:
pkibase.c:1064:14: warning: variable status set but not used [-Wunused-but-set-variable]
pkibase.c: In function nssCRLCollection_Create:
pkibase.c:1171:14: warning: variable status set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pki3hack.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  pki3hack.c
rm -f Linux3.6_x86_glibc_PTH_OPT.OBJ/libnsspki.a
ar cr Linux3.6_x86_glibc_PTH_OPT.OBJ/libnsspki.a Linux3.6_x86_glibc_PTH_OPT.OBJ/asymmkey.o Linux3.6_x86_glibc_PTH_OPT.OBJ/certificate.o Linux3.6_x86_glibc_PTH_OPT.OBJ/cryptocontext.o Linux3.6_x86_glibc_PTH_OPT.OBJ/symmkey.o Linux3.6_x86_glibc_PTH_OPT.OBJ/trustdomain.o Linux3.6_x86_glibc_PTH_OPT.OBJ/tdcache.o Linux3.6_x86_glibc_PTH_OPT.OBJ/certdecode.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkistore.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkibase.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pki3hack.o
ranlib Linux3.6_x86_glibc_PTH_OPT.OBJ/libnsspki.a
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.6_x86_glibc_PTH_OPT.OBJ/libnsspki.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/pki'
cd libpkix; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix'
cd include; gmake libs
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/include'
gmake[3]: Nothing to be done for `libs'.
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/include'
cd pkix; gmake libs
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix'
cd certsel; gmake libs
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/certsel'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_certselector.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_certselector.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_comcertselparams.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_comcertselparams.c
rm -f Linux3.6_x86_glibc_PTH_OPT.OBJ/libpkixcertsel.a
ar cr Linux3.6_x86_glibc_PTH_OPT.OBJ/libpkixcertsel.a Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_certselector.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_comcertselparams.o
ranlib Linux3.6_x86_glibc_PTH_OPT.OBJ/libpkixcertsel.a
../../../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.6_x86_glibc_PTH_OPT.OBJ/libpkixcertsel.a ../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/certsel'
cd crlsel; gmake libs
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/crlsel'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_crlselector.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_crlselector.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_comcrlselparams.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_comcrlselparams.c
rm -f Linux3.6_x86_glibc_PTH_OPT.OBJ/libpkixcrlsel.a
ar cr Linux3.6_x86_glibc_PTH_OPT.OBJ/libpkixcrlsel.a Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_crlselector.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_comcrlselparams.o
ranlib Linux3.6_x86_glibc_PTH_OPT.OBJ/libpkixcrlsel.a
../../../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.6_x86_glibc_PTH_OPT.OBJ/libpkixcrlsel.a ../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/crlsel'
cd checker; gmake libs
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/checker'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_basicconstraintschecker.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_basicconstraintschecker.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_certchainchecker.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_certchainchecker.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_crlchecker.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_crlchecker.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_ekuchecker.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_ekuchecker.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_expirationchecker.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_expirationchecker.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_namechainingchecker.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_namechainingchecker.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_nameconstraintschecker.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_nameconstraintschecker.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_ocspchecker.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_ocspchecker.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_revocationmethod.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_revocationmethod.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_revocationchecker.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_revocationchecker.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_policychecker.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_policychecker.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_signaturechecker.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_signaturechecker.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_targetcertchecker.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_targetcertchecker.c
rm -f Linux3.6_x86_glibc_PTH_OPT.OBJ/libpkixchecker.a
ar cr Linux3.6_x86_glibc_PTH_OPT.OBJ/libpkixchecker.a Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_basicconstraintschecker.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_certchainchecker.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_crlchecker.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_ekuchecker.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_expirationchecker.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_namechainingchecker.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_nameconstraintschecker.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_ocspchecker.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_revocationmethod.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_revocationchecker.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_policychecker.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_signaturechecker.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_targetcertchecker.o
ranlib Linux3.6_x86_glibc_PTH_OPT.OBJ/libpkixchecker.a
../../../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.6_x86_glibc_PTH_OPT.OBJ/libpkixchecker.a ../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/checker'
cd params; gmake libs
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/params'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_trustanchor.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_trustanchor.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_procparams.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_procparams.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_valparams.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_valparams.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_resourcelimits.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_resourcelimits.c
rm -f Linux3.6_x86_glibc_PTH_OPT.OBJ/libpkixparams.a
ar cr Linux3.6_x86_glibc_PTH_OPT.OBJ/libpkixparams.a Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_trustanchor.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_procparams.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_valparams.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_resourcelimits.o
ranlib Linux3.6_x86_glibc_PTH_OPT.OBJ/libpkixparams.a
../../../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.6_x86_glibc_PTH_OPT.OBJ/libpkixparams.a ../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/params'
cd results; gmake libs
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/results'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_buildresult.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_buildresult.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_policynode.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_policynode.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_valresult.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_valresult.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_verifynode.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_verifynode.c
rm -f Linux3.6_x86_glibc_PTH_OPT.OBJ/libpkixresults.a
ar cr Linux3.6_x86_glibc_PTH_OPT.OBJ/libpkixresults.a Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_buildresult.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_policynode.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_valresult.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_verifynode.o
ranlib Linux3.6_x86_glibc_PTH_OPT.OBJ/libpkixresults.a
../../../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.6_x86_glibc_PTH_OPT.OBJ/libpkixresults.a ../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/results'
cd store; gmake libs
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/store'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_store.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_store.c
rm -f Linux3.6_x86_glibc_PTH_OPT.OBJ/libpkixstore.a
ar cr Linux3.6_x86_glibc_PTH_OPT.OBJ/libpkixstore.a Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_store.o
ranlib Linux3.6_x86_glibc_PTH_OPT.OBJ/libpkixstore.a
../../../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.6_x86_glibc_PTH_OPT.OBJ/libpkixstore.a ../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/store'
cd top; gmake libs
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/top'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_validate.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_validate.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_lifecycle.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_lifecycle.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_build.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_build.c
rm -f Linux3.6_x86_glibc_PTH_OPT.OBJ/libpkixtop.a
ar cr Linux3.6_x86_glibc_PTH_OPT.OBJ/libpkixtop.a Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_validate.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_lifecycle.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_build.o
ranlib Linux3.6_x86_glibc_PTH_OPT.OBJ/libpkixtop.a
../../../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.6_x86_glibc_PTH_OPT.OBJ/libpkixtop.a ../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/top'
cd util; gmake libs
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/util'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_tools.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_tools.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_error.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_error.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_logger.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_logger.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_list.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_list.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_errpaths.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_errpaths.c
rm -f Linux3.6_x86_glibc_PTH_OPT.OBJ/libpkixutil.a
ar cr Linux3.6_x86_glibc_PTH_OPT.OBJ/libpkixutil.a Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_tools.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_error.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_logger.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_list.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_errpaths.o
ranlib Linux3.6_x86_glibc_PTH_OPT.OBJ/libpkixutil.a
../../../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.6_x86_glibc_PTH_OPT.OBJ/libpkixutil.a ../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix/util'
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix'
cd pkix_pl_nss; gmake libs
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix_pl_nss'
cd pki; gmake libs
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_basicconstraints.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_basicconstraints.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_cert.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_cert.c
pkix_pl_cert.c: In function PKIX_PL_Cert_Create:
pkix_pl_cert.c:1518:22: warning: variable copyDER set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyinfo.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_certpolicyinfo.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_certpolicymap.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_certpolicymap.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyqualifier.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_certpolicyqualifier.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_crl.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_crl.c
pkix_pl_crl.c: In function pkix_pl_CRL_ToString:
pkix_pl_crl.c:455:58: warning: crlVersion may be used uninitialized in this function [-Wmaybe-uninitialized]
pkix_pl_crl.c:354:21: note: crlVersion was declared here
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_crldp.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_crldp.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_crlentry.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_crlentry.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_date.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_date.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_generalname.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_generalname.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_infoaccess.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_infoaccess.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_nameconstraints.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_nameconstraints.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ocsprequest.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_ocsprequest.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ocspresponse.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_ocspresponse.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_publickey.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_publickey.c
pkix_pl_publickey.c: In function pkix_pl_PublicKey_Hashcode:
pkix_pl_publickey.c:214:21: warning: variable fullHash set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_x500name.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_x500name.c
pkix_pl_x500name.c:37:1: warning: pkix_pl_X500Name_ToString_Helper defined but not used [-Wunused-function]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ocspcertid.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_ocspcertid.c
rm -f Linux3.6_x86_glibc_PTH_OPT.OBJ/libpkixpki.a
ar cr Linux3.6_x86_glibc_PTH_OPT.OBJ/libpkixpki.a Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_basicconstraints.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_cert.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyinfo.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_certpolicymap.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyqualifier.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_crl.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_crldp.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_crlentry.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_date.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_generalname.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_infoaccess.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_nameconstraints.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ocsprequest.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ocspresponse.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_publickey.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_x500name.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ocspcertid.o
ranlib Linux3.6_x86_glibc_PTH_OPT.OBJ/libpkixpki.a
../../../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.6_x86_glibc_PTH_OPT.OBJ/libpkixpki.a ../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki'
cd system; gmake libs
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_bigint.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_bigint.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_bytearray.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_bytearray.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_common.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_common.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_error.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_error.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_hashtable.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_hashtable.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_lifecycle.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_lifecycle.c
pkix_pl_lifecycle.c: In function PKIX_PL_Shutdown:
pkix_pl_lifecycle.c:246:21: warning: variable numLeakedObjects set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_mem.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_mem.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_monitorlock.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_monitorlock.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_mutex.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_mutex.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_object.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_object.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_oid.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_oid.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_primhash.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_primhash.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_rwlock.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_rwlock.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_string.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_string.c
rm -f Linux3.6_x86_glibc_PTH_OPT.OBJ/libpkixsystem.a
ar cr Linux3.6_x86_glibc_PTH_OPT.OBJ/libpkixsystem.a Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_bigint.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_bytearray.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_common.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_error.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_hashtable.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_lifecycle.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_mem.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_monitorlock.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_mutex.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_object.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_oid.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_primhash.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_rwlock.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_string.o
ranlib Linux3.6_x86_glibc_PTH_OPT.OBJ/libpkixsystem.a
../../../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.6_x86_glibc_PTH_OPT.OBJ/libpkixsystem.a ../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system'
cd module; gmake libs
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_aiamgr.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_aiamgr.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_colcertstore.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_colcertstore.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_httpcertstore.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_httpcertstore.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_httpdefaultclient.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_httpdefaultclient.c
pkix_pl_httpdefaultclient.c: In function pkix_pl_HttpDefaultClient_KeepAliveSession:
pkix_pl_httpdefaultclient.c:1135:36: warning: variable client set but not used [-Wunused-but-set-variable]
pkix_pl_httpdefaultclient.c: In function pkix_pl_HttpDefaultClient_Cancel:
pkix_pl_httpdefaultclient.c:1487:36: warning: variable client set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ldaptemplates.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_ldaptemplates.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ldapcertstore.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_ldapcertstore.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ldapresponse.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_ldapresponse.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ldaprequest.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_ldaprequest.c
pkix_pl_ldaprequest.c: In function pkix_pl_LdapRequest_Destroy:
pkix_pl_ldaprequest.c:266:30: warning: variable ldapRq set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ldapdefaultclient.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_ldapdefaultclient.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_nsscontext.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_nsscontext.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_pk11certstore.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_pk11certstore.c
pkix_pl_pk11certstore.c: In function NameCacheHasFetchedCrlInfo:
pkix_pl_pk11certstore.c:382:22: warning: variable cert set but not used [-Wunused-but-set-variable]
pkix_pl_pk11certstore.c: In function DownloadCrl:
pkix_pl_pk11certstore.c:782:16: warning: variable savedError set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_socket.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_socket.c
rm -f Linux3.6_x86_glibc_PTH_OPT.OBJ/libpkixmodule.a
ar cr Linux3.6_x86_glibc_PTH_OPT.OBJ/libpkixmodule.a Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_aiamgr.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_colcertstore.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_httpcertstore.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_httpdefaultclient.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ldaptemplates.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ldapcertstore.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ldapresponse.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ldaprequest.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ldapdefaultclient.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_nsscontext.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_pk11certstore.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_socket.o
ranlib Linux3.6_x86_glibc_PTH_OPT.OBJ/libpkixmodule.a
../../../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.6_x86_glibc_PTH_OPT.OBJ/libpkixmodule.a ../../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module'
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix/pkix_pl_nss'
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/libpkix'
cd certdb; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/certdb'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/alg1485.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  alg1485.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/certdb.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  certdb.c
certdb.c: In function cert_VerifySubjectAltName:
certdb.c:1426:18: warning: variable hnLen set but not used [-Wunused-but-set-variable]
certdb.c: In function CERT_ImportCerts:
certdb.c:2435:15: warning: variable rv set but not used [-Wunused-but-set-variable]
certdb.c: In function CERT_UnlockCertRefCount:
certdb.c:2881:14: warning: variable prstat set but not used [-Wunused-but-set-variable]
certdb.c: In function CERT_UnlockCertTrust:
certdb.c:2961:14: warning: variable prstat set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/certv3.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  certv3.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/certxutl.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  certxutl.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/crl.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  crl.c
crl.c: In function crl_storeCRL:
crl.c:632:15: warning: variable rv set but not used [-Wunused-but-set-variable]
crl.c: In function cert_CheckCertRevocationStatus:
crl.c:2634:25: warning: comparison between enum _SECStatus and SECCertTimeValidity [-Wenum-compare]
crl.c:2690:27: warning: unused variable rv2 [-Wunused-variable]
crl.c: In function cert_CacheCRLByGeneralName:
crl.c:3047:32: warning: variable rv2 set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/genname.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  genname.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/stanpcertdb.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  stanpcertdb.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/polcyxtn.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  polcyxtn.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/secname.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  secname.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/xauthkid.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  xauthkid.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/xbsconst.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  xbsconst.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/xconst.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  xconst.c
rm -f Linux3.6_x86_glibc_PTH_OPT.OBJ/libcertdb.a
ar cr Linux3.6_x86_glibc_PTH_OPT.OBJ/libcertdb.a Linux3.6_x86_glibc_PTH_OPT.OBJ/alg1485.o Linux3.6_x86_glibc_PTH_OPT.OBJ/certdb.o Linux3.6_x86_glibc_PTH_OPT.OBJ/certv3.o Linux3.6_x86_glibc_PTH_OPT.OBJ/certxutl.o Linux3.6_x86_glibc_PTH_OPT.OBJ/crl.o Linux3.6_x86_glibc_PTH_OPT.OBJ/genname.o Linux3.6_x86_glibc_PTH_OPT.OBJ/stanpcertdb.o Linux3.6_x86_glibc_PTH_OPT.OBJ/polcyxtn.o Linux3.6_x86_glibc_PTH_OPT.OBJ/secname.o Linux3.6_x86_glibc_PTH_OPT.OBJ/xauthkid.o Linux3.6_x86_glibc_PTH_OPT.OBJ/xbsconst.o Linux3.6_x86_glibc_PTH_OPT.OBJ/xconst.o
ranlib Linux3.6_x86_glibc_PTH_OPT.OBJ/libcertdb.a
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.6_x86_glibc_PTH_OPT.OBJ/libcertdb.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/certdb'
cd certhigh; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/certhigh'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/certhtml.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  certhtml.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/certreq.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  certreq.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/crlv2.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  crlv2.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/ocsp.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  ocsp.c
ocsp.c: In function ocsp_RemoveCacheItem:
ocsp.c:564:12: warning: variable couldRemoveFromHashTable set but not used [-Wunused-but-set-variable]
ocsp.c: In function CERT_EncodeOCSPRequest:
ocsp.c:1437:21: warning: variable tbsRequest set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/ocspsig.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  ocspsig.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/certhigh.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  certhigh.c
certhigh.c: In function CERT_MatchNickname:
certhigh.c:28:9: warning: variable len set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/certvfy.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  certvfy.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/certvfypkix.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  certvfypkix.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/certvfypkixprint.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  certvfypkixprint.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/xcrldist.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  xcrldist.c
rm -f Linux3.6_x86_glibc_PTH_OPT.OBJ/libcerthi.a
ar cr Linux3.6_x86_glibc_PTH_OPT.OBJ/libcerthi.a Linux3.6_x86_glibc_PTH_OPT.OBJ/certhtml.o Linux3.6_x86_glibc_PTH_OPT.OBJ/certreq.o Linux3.6_x86_glibc_PTH_OPT.OBJ/crlv2.o Linux3.6_x86_glibc_PTH_OPT.OBJ/ocsp.o Linux3.6_x86_glibc_PTH_OPT.OBJ/ocspsig.o Linux3.6_x86_glibc_PTH_OPT.OBJ/certhigh.o Linux3.6_x86_glibc_PTH_OPT.OBJ/certvfy.o Linux3.6_x86_glibc_PTH_OPT.OBJ/certvfypkix.o Linux3.6_x86_glibc_PTH_OPT.OBJ/certvfypkixprint.o Linux3.6_x86_glibc_PTH_OPT.OBJ/xcrldist.o
ranlib Linux3.6_x86_glibc_PTH_OPT.OBJ/libcerthi.a
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.6_x86_glibc_PTH_OPT.OBJ/libcerthi.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/certhigh'
cd pk11wrap; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/pk11wrap'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/dev3hack.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  dev3hack.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11akey.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11akey.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11auth.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11auth.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11cert.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11cert.c
pk11cert.c: In function pk11_fastCert:
pk11cert.c:231:14: warning: variable status set but not used [-Wunused-but-set-variable]
pk11cert.c: In function PK11_MakeCertFromHandle:
pk11cert.c:297:12: warning: variable swapNickname set but not used [-Wunused-but-set-variable]
pk11cert.c:296:12: warning: variable isFortezzaRootCA set but not used [-Wunused-but-set-variable]
pk11cert.c: In function PK11_TraverseCertsForNicknameInSlot:
pk11cert.c:2002:28: warning: variable pk11cb set but not used [-Wunused-but-set-variable]
pk11cert.c: In function PK11_FindCertFromDERCertItem:
pk11cert.c:2146:21: warning: unused variable td [-Wunused-variable]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11cxt.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11cxt.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11err.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11err.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11kea.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11kea.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11list.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11list.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11load.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11load.c
pk11load.c: In function SECMOD_UnloadModule:
pk11load.c:569:28: warning: unused variable status [-Wunused-variable]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11mech.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11mech.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11merge.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11merge.c
pk11merge.c: In function pk11_mergeByObjectIDs:
pk11merge.c:850:20: warning: error may be used uninitialized in this function [-Wmaybe-uninitialized]
pk11merge.c:751:9: note: error was declared here
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11nobj.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11nobj.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11obj.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11obj.c
pk11obj.c: In function PK11_MatchItem:
pk11obj.c:1604:22: warning: variable parent set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11pars.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11pars.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11pbe.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11pbe.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11pk12.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11pk12.c
pk11pk12.c: In function PK11_ImportPrivateKeyInfoAndReturnKey:
pk11pk12.c:424:17: warning: variable keyType set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11pqg.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11pqg.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11sdr.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11sdr.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11skey.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11skey.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11slot.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11slot.c
pk11slot.c: In function PK11_InitToken:
pk11slot.c:1101:11: warning: variable tmp set but not used [-Wunused-but-set-variable]
pk11slot.c: In function PK11_InitSlot:
pk11slot.c:1345:11: warning: variable tmp set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11util.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11util.c
rm -f Linux3.6_x86_glibc_PTH_OPT.OBJ/libpk11wrap.a
ar cr Linux3.6_x86_glibc_PTH_OPT.OBJ/libpk11wrap.a Linux3.6_x86_glibc_PTH_OPT.OBJ/dev3hack.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11akey.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11auth.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11cert.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11cxt.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11err.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11kea.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11list.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11load.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11mech.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11merge.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11nobj.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11obj.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11pars.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11pbe.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11pk12.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11pqg.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11sdr.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11skey.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11slot.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11util.o
ranlib Linux3.6_x86_glibc_PTH_OPT.OBJ/libpk11wrap.a
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.6_x86_glibc_PTH_OPT.OBJ/libpk11wrap.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/pk11wrap'
cd cryptohi; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/cryptohi'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/sechash.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sechash.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/seckey.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  seckey.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/secsign.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  secsign.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/secvfy.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  secvfy.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/dsautil.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  dsautil.c
rm -f Linux3.6_x86_glibc_PTH_OPT.OBJ/libcryptohi.a
ar cr Linux3.6_x86_glibc_PTH_OPT.OBJ/libcryptohi.a Linux3.6_x86_glibc_PTH_OPT.OBJ/sechash.o Linux3.6_x86_glibc_PTH_OPT.OBJ/seckey.o Linux3.6_x86_glibc_PTH_OPT.OBJ/secsign.o Linux3.6_x86_glibc_PTH_OPT.OBJ/secvfy.o Linux3.6_x86_glibc_PTH_OPT.OBJ/dsautil.o
ranlib Linux3.6_x86_glibc_PTH_OPT.OBJ/libcryptohi.a
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.6_x86_glibc_PTH_OPT.OBJ/libcryptohi.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/cryptohi'
cd nss; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/nss'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/nssinit.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  nssinit.c
nssinit.c: In function NSS_VersionCheck:
nssinit.c:1251:19: warning: variable c set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/nssver.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  nssver.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/utilwrap.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  utilwrap.c
rm -f Linux3.6_x86_glibc_PTH_OPT.OBJ/libnss.a
ar cr Linux3.6_x86_glibc_PTH_OPT.OBJ/libnss.a Linux3.6_x86_glibc_PTH_OPT.OBJ/nssinit.o Linux3.6_x86_glibc_PTH_OPT.OBJ/nssver.o Linux3.6_x86_glibc_PTH_OPT.OBJ/utilwrap.o
ranlib Linux3.6_x86_glibc_PTH_OPT.OBJ/libnss.a
grep -v ';-' nss.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux3.6_x86_glibc_PTH_OPT.OBJ/nss.def
rm -f Linux3.6_x86_glibc_PTH_OPT.OBJ/libnss3.so
gcc -shared -m32 -Wl,-z,defs -Wl,-soname -Wl,libnss3.so  -Wl,--version-script,Linux3.6_x86_glibc_PTH_OPT.OBJ/nss.def -o Linux3.6_x86_glibc_PTH_OPT.OBJ/libnss3.so Linux3.6_x86_glibc_PTH_OPT.OBJ/nssinit.o Linux3.6_x86_glibc_PTH_OPT.OBJ/nssver.o Linux3.6_x86_glibc_PTH_OPT.OBJ/utilwrap.o ../certhigh/Linux3.6_x86_glibc_PTH_OPT.OBJ/certhtml.o ../certhigh/Linux3.6_x86_glibc_PTH_OPT.OBJ/certreq.o ../certhigh/Linux3.6_x86_glibc_PTH_OPT.OBJ/crlv2.o ../certhigh/Linux3.6_x86_glibc_PTH_OPT.OBJ/ocsp.o ../certhigh/Linux3.6_x86_glibc_PTH_OPT.OBJ/ocspsig.o ../certhigh/Linux3.6_x86_glibc_PTH_OPT.OBJ/certhigh.o ../certhigh/Linux3.6_x86_glibc_PTH_OPT.OBJ/certvfy.o ../certhigh/Linux3.6_x86_glibc_PTH_OPT.OBJ/certvfypkix.o ../certhigh/Linux3.6_x86_glibc_PTH_OPT.OBJ/certvfypkixprint.o ../certhigh/Linux3.6_x86_glibc_PTH_OPT.OBJ/xcrldist.o ../cryptohi/Linux3.6_x86_glibc_PTH_OPT.OBJ/sechash.o ../cryptohi/Linux3.6_x86_glibc_PTH_OPT.OBJ/seckey.o ../cryptohi/Linux3.6_x86_glibc_PTH_OPT.OBJ/secsign.o ../cryptohi/Linux3.6_x86_glibc_PTH_OPT.OBJ/secvfy.o ../cryptohi/Linux3.6_x86_glibc_PTH_OPT.OBJ/dsautil.o ../pk11wrap/Linux3.6_x86_glibc_PTH_OPT.OBJ/dev3hack.o ../pk11wrap/Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11akey.o ../pk11wrap/Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11auth.o ../pk11wrap/Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11cert.o ../pk11wrap/Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11cxt.o ../pk11wrap/Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11err.o ../pk11wrap/Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11kea.o ../pk11wrap/Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11list.o ../pk11wrap/Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11load.o ../pk11wrap/Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11mech.o ../pk11wrap/Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11merge.o ../pk11wrap/Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11nobj.o ../pk11wrap/Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11obj.o ../pk11wrap/Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11pars.o ../pk11wrap/Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11pbe.o ../pk11wrap/Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11pk12.o ../pk11wrap/Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11pqg.o ../pk11wrap/Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11sdr.o ../pk11wrap/Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11skey.o ../pk11wrap/Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11slot.o ../pk11wrap/Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11util.o ../certdb/Linux3.6_x86_glibc_PTH_OPT.OBJ/alg1485.o ../certdb/Linux3.6_x86_glibc_PTH_OPT.OBJ/certdb.o ../certdb/Linux3.6_x86_glibc_PTH_OPT.OBJ/certv3.o ../certdb/Linux3.6_x86_glibc_PTH_OPT.OBJ/certxutl.o ../certdb/Linux3.6_x86_glibc_PTH_OPT.OBJ/crl.o ../certdb/Linux3.6_x86_glibc_PTH_OPT.OBJ/genname.o ../certdb/Linux3.6_x86_glibc_PTH_OPT.OBJ/stanpcertdb.o ../certdb/Linux3.6_x86_glibc_PTH_OPT.OBJ/polcyxtn.o ../certdb/Linux3.6_x86_glibc_PTH_OPT.OBJ/secname.o ../certdb/Linux3.6_x86_glibc_PTH_OPT.OBJ/xauthkid.o ../certdb/Linux3.6_x86_glibc_PTH_OPT.OBJ/xbsconst.o ../certdb/Linux3.6_x86_glibc_PTH_OPT.OBJ/xconst.o ../pki/Linux3.6_x86_glibc_PTH_OPT.OBJ/asymmkey.o ../pki/Linux3.6_x86_glibc_PTH_OPT.OBJ/certificate.o ../pki/Linux3.6_x86_glibc_PTH_OPT.OBJ/cryptocontext.o ../pki/Linux3.6_x86_glibc_PTH_OPT.OBJ/symmkey.o ../pki/Linux3.6_x86_glibc_PTH_OPT.OBJ/trustdomain.o ../pki/Linux3.6_x86_glibc_PTH_OPT.OBJ/tdcache.o ../pki/Linux3.6_x86_glibc_PTH_OPT.OBJ/certdecode.o ../pki/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkistore.o ../pki/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkibase.o ../pki/Linux3.6_x86_glibc_PTH_OPT.OBJ/pki3hack.o ../dev/Linux3.6_x86_glibc_PTH_OPT.OBJ/devslot.o ../dev/Linux3.6_x86_glibc_PTH_OPT.OBJ/devtoken.o ../dev/Linux3.6_x86_glibc_PTH_OPT.OBJ/devutil.o ../dev/Linux3.6_x86_glibc_PTH_OPT.OBJ/ckhelper.o ../base/Linux3.6_x86_glibc_PTH_OPT.OBJ/arena.o ../base/Linux3.6_x86_glibc_PTH_OPT.OBJ/error.o ../base/Linux3.6_x86_glibc_PTH_OPT.OBJ/errorval.o ../base/Linux3.6_x86_glibc_PTH_OPT.OBJ/hashops.o ../base/Linux3.6_x86_glibc_PTH_OPT.OBJ/libc.o ../base/Linux3.6_x86_glibc_PTH_OPT.OBJ/tracker.o ../base/Linux3.6_x86_glibc_PTH_OPT.OBJ/item.o ../base/Linux3.6_x86_glibc_PTH_OPT.OBJ/utf8.o ../base/Linux3.6_x86_glibc_PTH_OPT.OBJ/list.o ../base/Linux3.6_x86_glibc_PTH_OPT.OBJ/hash.o ../libpkix/pkix/certsel/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_certselector.o ../libpkix/pkix/certsel/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_comcertselparams.o ../libpkix/pkix/checker/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_basicconstraintschecker.o ../libpkix/pkix/checker/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_certchainchecker.o ../libpkix/pkix/checker/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_crlchecker.o ../libpkix/pkix/checker/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_ekuchecker.o ../libpkix/pkix/checker/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_expirationchecker.o ../libpkix/pkix/checker/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_namechainingchecker.o ../libpkix/pkix/checker/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_nameconstraintschecker.o ../libpkix/pkix/checker/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_ocspchecker.o ../libpkix/pkix/checker/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_revocationmethod.o ../libpkix/pkix/checker/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_revocationchecker.o ../libpkix/pkix/checker/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_policychecker.o ../libpkix/pkix/checker/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_signaturechecker.o ../libpkix/pkix/checker/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_targetcertchecker.o ../libpkix/pkix/params/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_trustanchor.o ../libpkix/pkix/params/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_procparams.o ../libpkix/pkix/params/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_valparams.o ../libpkix/pkix/params/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_resourcelimits.o ../libpkix/pkix/results/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_buildresult.o ../libpkix/pkix/results/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_policynode.o ../libpkix/pkix/results/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_valresult.o ../libpkix/pkix/results/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_verifynode.o ../libpkix/pkix/top/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_validate.o ../libpkix/pkix/top/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_lifecycle.o ../libpkix/pkix/top/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_build.o ../libpkix/pkix/util/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_tools.o ../libpkix/pkix/util/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_error.o ../libpkix/pkix/util/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_logger.o ../libpkix/pkix/util/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_list.o ../libpkix/pkix/util/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_errpaths.o ../libpkix/pkix/crlsel/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_crlselector.o ../libpkix/pkix/crlsel/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_comcrlselparams.o ../libpkix/pkix/store/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_store.o ../libpkix/pkix_pl_nss/pki/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_basicconstraints.o ../libpkix/pkix_pl_nss/pki/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_cert.o ../libpkix/pkix_pl_nss/pki/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyinfo.o ../libpkix/pkix_pl_nss/pki/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_certpolicymap.o ../libpkix/pkix_pl_nss/pki/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyqualifier.o ../libpkix/pkix_pl_nss/pki/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_crl.o ../libpkix/pkix_pl_nss/pki/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_crldp.o ../libpkix/pkix_pl_nss/pki/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_crlentry.o ../libpkix/pkix_pl_nss/pki/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_date.o ../libpkix/pkix_pl_nss/pki/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_generalname.o ../libpkix/pkix_pl_nss/pki/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_infoaccess.o ../libpkix/pkix_pl_nss/pki/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_nameconstraints.o ../libpkix/pkix_pl_nss/pki/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ocsprequest.o ../libpkix/pkix_pl_nss/pki/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ocspresponse.o ../libpkix/pkix_pl_nss/pki/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_publickey.o ../libpkix/pkix_pl_nss/pki/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_x500name.o ../libpkix/pkix_pl_nss/pki/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ocspcertid.o ../libpkix/pkix_pl_nss/system/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_bigint.o ../libpkix/pkix_pl_nss/system/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_bytearray.o ../libpkix/pkix_pl_nss/system/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_common.o ../libpkix/pkix_pl_nss/system/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_error.o ../libpkix/pkix_pl_nss/system/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_hashtable.o ../libpkix/pkix_pl_nss/system/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_lifecycle.o ../libpkix/pkix_pl_nss/system/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_mem.o ../libpkix/pkix_pl_nss/system/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_monitorlock.o ../libpkix/pkix_pl_nss/system/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_mutex.o ../libpkix/pkix_pl_nss/system/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_object.o ../libpkix/pkix_pl_nss/system/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_oid.o ../libpkix/pkix_pl_nss/system/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_primhash.o ../libpkix/pkix_pl_nss/system/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_rwlock.o ../libpkix/pkix_pl_nss/system/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_string.o ../libpkix/pkix_pl_nss/module/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_aiamgr.o ../libpkix/pkix_pl_nss/module/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_colcertstore.o ../libpkix/pkix_pl_nss/module/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_httpcertstore.o ../libpkix/pkix_pl_nss/module/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_httpdefaultclient.o ../libpkix/pkix_pl_nss/module/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ldaptemplates.o ../libpkix/pkix_pl_nss/module/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ldapcertstore.o ../libpkix/pkix_pl_nss/module/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ldapresponse.o ../libpkix/pkix_pl_nss/module/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ldaprequest.o ../libpkix/pkix_pl_nss/module/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ldapdefaultclient.o ../libpkix/pkix_pl_nss/module/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_nsscontext.o ../libpkix/pkix_pl_nss/module/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_pk11certstore.o ../libpkix/pkix_pl_nss/module/Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_socket.o   -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
chmod +x Linux3.6_x86_glibc_PTH_OPT.OBJ/libnss3.so
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.6_x86_glibc_PTH_OPT.OBJ/libnss.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.6_x86_glibc_PTH_OPT.OBJ/libnss3.so ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/nss'
cd ssl; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/ssl'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/derive.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  derive.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/dtlscon.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  dtlscon.c
dtlscon.c: In function ssl3_DisableNonDTLSSuites:
dtlscon.c:92:12: warning: unused variable rv [-Wunused-variable]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/prelib.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  prelib.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/ssl3con.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  ssl3con.c
ssl3con.c: In function ssl3_InitPendingContextsBypass:
ssl3con.c:1414:28: warning: variable compression_method set but not used [-Wunused-but-set-variable]
ssl3con.c:1412:16: warning: variable macLength set but not used [-Wunused-but-set-variable]
ssl3con.c: In function ssl3_IllegalParameter:
ssl3con.c:2742:12: warning: variable isTLS set but not used [-Wunused-but-set-variable]
ssl3con.c: In function ssl3_HandleCertificate:
ssl3con.c:8345:12: warning: variable trusted set but not used [-Wunused-but-set-variable]
ssl3con.c: In function ssl3_RecordKeyLog:
ssl3con.c:8791:19: warning: variable sid set but not used [-Wunused-but-set-variable]
ssl3con.c: In function ssl3_HandleHandshakeMessage:
ssl3con.c:8607:5: warning: desc may be used uninitialized in this function [-Wmaybe-uninitialized]
ssl3con.c:8347:26: note: desc was declared here
ssl3con.c: In function ssl3_HandleRecord:
ssl3con.c:9796:21: warning: dtls_seq_num may be used uninitialized in this function [-Wmaybe-uninitialized]
ssl3con.c:9575:14: note: dtls_seq_num was declared here
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/ssl3gthr.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  ssl3gthr.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/sslauth.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sslauth.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/sslcon.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sslcon.c
sslcon.c: In function ssl2_HandleMessage:
sslcon.c:2498:9: warning: variable rv2 set but not used [-Wunused-but-set-variable]
sslcon.c: In function NSSSSL_VersionCheck:
sslcon.c:3687:19: warning: variable c set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/ssldef.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  ssldef.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/sslenum.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sslenum.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/sslerr.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sslerr.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/sslerrstrs.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sslerrstrs.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/sslinit.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sslinit.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/ssl3ext.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  ssl3ext.c
ssl3ext.c: In function ssl3_GetSessionTicketKeys:
ssl3ext.c:195:38: warning: comparison between PRStatus and enum _SECStatus [-Wenum-compare]
ssl3ext.c: In function ssl3_HandleServerNameXtn:
ssl3ext.c:390:17: warning: variable type set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/sslgathr.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sslgathr.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/sslmutex.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sslmutex.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/sslnonce.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sslnonce.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/sslreveal.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sslreveal.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/sslsecur.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sslsecur.c
sslsecur.c: In function ssl_SecureRecv:
sslsecur.c:1103:22: warning: variable sec set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/sslsnce.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sslsnce.c
sslsnce.c: In function InitCache:
sslsnce.c:1234:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing]
sslsnce.c:1235:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing]
sslsnce.c:1236:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing]
sslsnce.c:1237:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing]
sslsnce.c:1238:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing]
sslsnce.c:1239:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing]
sslsnce.c:1240:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing]
sslsnce.c:1241:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing]
sslsnce.c:1242:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing]
sslsnce.c:1243:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing]
sslsnce.c:1244:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing]
sslsnce.c:1245:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing]
sslsnce.c:1246:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing]
sslsnce.c: In function SSL_InheritMPServerSIDCacheInstance:
sslsnce.c:1586:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing]
sslsnce.c:1587:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing]
sslsnce.c:1588:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing]
sslsnce.c:1589:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing]
sslsnce.c:1590:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing]
sslsnce.c:1591:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing]
sslsnce.c:1592:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing]
sslsnce.c:1593:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing]
sslsnce.c:1594:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing]
sslsnce.c:1595:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing]
sslsnce.c:1596:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing]
sslsnce.c:1597:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing]
sslsnce.c:1598:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/sslsock.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sslsock.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/ssltrace.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  ssltrace.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/sslver.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sslver.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/authcert.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  authcert.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmpcert.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmpcert.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/sslinfo.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sslinfo.c
sslinfo.c: In function SSL_DisableDefaultExportCipherSuites:
sslinfo.c:239:15: warning: variable rv set but not used [-Wunused-but-set-variable]
sslinfo.c: In function SSL_DisableExportCipherSuites:
sslinfo.c:260:15: warning: variable rv set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/ssl3ecc.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  ssl3ecc.c
ssl3ecc.c: In function ssl3_DisableECCSuites:
ssl3ecc.c:902:12: warning: unused variable rv [-Wunused-variable]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/unix_err.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  unix_err.c
rm -f Linux3.6_x86_glibc_PTH_OPT.OBJ/libssl.a
ar cr Linux3.6_x86_glibc_PTH_OPT.OBJ/libssl.a Linux3.6_x86_glibc_PTH_OPT.OBJ/derive.o Linux3.6_x86_glibc_PTH_OPT.OBJ/dtlscon.o Linux3.6_x86_glibc_PTH_OPT.OBJ/prelib.o Linux3.6_x86_glibc_PTH_OPT.OBJ/ssl3con.o Linux3.6_x86_glibc_PTH_OPT.OBJ/ssl3gthr.o Linux3.6_x86_glibc_PTH_OPT.OBJ/sslauth.o Linux3.6_x86_glibc_PTH_OPT.OBJ/sslcon.o Linux3.6_x86_glibc_PTH_OPT.OBJ/ssldef.o Linux3.6_x86_glibc_PTH_OPT.OBJ/sslenum.o Linux3.6_x86_glibc_PTH_OPT.OBJ/sslerr.o Linux3.6_x86_glibc_PTH_OPT.OBJ/sslerrstrs.o Linux3.6_x86_glibc_PTH_OPT.OBJ/sslinit.o Linux3.6_x86_glibc_PTH_OPT.OBJ/ssl3ext.o Linux3.6_x86_glibc_PTH_OPT.OBJ/sslgathr.o Linux3.6_x86_glibc_PTH_OPT.OBJ/sslmutex.o Linux3.6_x86_glibc_PTH_OPT.OBJ/sslnonce.o Linux3.6_x86_glibc_PTH_OPT.OBJ/sslreveal.o Linux3.6_x86_glibc_PTH_OPT.OBJ/sslsecur.o Linux3.6_x86_glibc_PTH_OPT.OBJ/sslsnce.o Linux3.6_x86_glibc_PTH_OPT.OBJ/sslsock.o Linux3.6_x86_glibc_PTH_OPT.OBJ/ssltrace.o Linux3.6_x86_glibc_PTH_OPT.OBJ/sslver.o Linux3.6_x86_glibc_PTH_OPT.OBJ/authcert.o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmpcert.o Linux3.6_x86_glibc_PTH_OPT.OBJ/sslinfo.o Linux3.6_x86_glibc_PTH_OPT.OBJ/ssl3ecc.o Linux3.6_x86_glibc_PTH_OPT.OBJ/unix_err.o
ranlib Linux3.6_x86_glibc_PTH_OPT.OBJ/libssl.a
grep -v ';-' ssl.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux3.6_x86_glibc_PTH_OPT.OBJ/ssl.def
rm -f Linux3.6_x86_glibc_PTH_OPT.OBJ/libssl3.so
gcc -shared -m32 -Wl,-z,defs -Wl,-soname -Wl,libssl3.so  -Wl,--version-script,Linux3.6_x86_glibc_PTH_OPT.OBJ/ssl.def -o Linux3.6_x86_glibc_PTH_OPT.OBJ/libssl3.so Linux3.6_x86_glibc_PTH_OPT.OBJ/derive.o Linux3.6_x86_glibc_PTH_OPT.OBJ/dtlscon.o Linux3.6_x86_glibc_PTH_OPT.OBJ/prelib.o Linux3.6_x86_glibc_PTH_OPT.OBJ/ssl3con.o Linux3.6_x86_glibc_PTH_OPT.OBJ/ssl3gthr.o Linux3.6_x86_glibc_PTH_OPT.OBJ/sslauth.o Linux3.6_x86_glibc_PTH_OPT.OBJ/sslcon.o Linux3.6_x86_glibc_PTH_OPT.OBJ/ssldef.o Linux3.6_x86_glibc_PTH_OPT.OBJ/sslenum.o Linux3.6_x86_glibc_PTH_OPT.OBJ/sslerr.o Linux3.6_x86_glibc_PTH_OPT.OBJ/sslerrstrs.o Linux3.6_x86_glibc_PTH_OPT.OBJ/sslinit.o Linux3.6_x86_glibc_PTH_OPT.OBJ/ssl3ext.o Linux3.6_x86_glibc_PTH_OPT.OBJ/sslgathr.o Linux3.6_x86_glibc_PTH_OPT.OBJ/sslmutex.o Linux3.6_x86_glibc_PTH_OPT.OBJ/sslnonce.o Linux3.6_x86_glibc_PTH_OPT.OBJ/sslreveal.o Linux3.6_x86_glibc_PTH_OPT.OBJ/sslsecur.o Linux3.6_x86_glibc_PTH_OPT.OBJ/sslsnce.o Linux3.6_x86_glibc_PTH_OPT.OBJ/sslsock.o Linux3.6_x86_glibc_PTH_OPT.OBJ/ssltrace.o Linux3.6_x86_glibc_PTH_OPT.OBJ/sslver.o Linux3.6_x86_glibc_PTH_OPT.OBJ/authcert.o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmpcert.o Linux3.6_x86_glibc_PTH_OPT.OBJ/sslinfo.o Linux3.6_x86_glibc_PTH_OPT.OBJ/ssl3ecc.o Linux3.6_x86_glibc_PTH_OPT.OBJ/unix_err.o   ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libfreebl.a  -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lnss3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc -lz
chmod +x Linux3.6_x86_glibc_PTH_OPT.OBJ/libssl3.so
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.6_x86_glibc_PTH_OPT.OBJ/libssl.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.6_x86_glibc_PTH_OPT.OBJ/libssl3.so ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/ssl'
cd pkcs12; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/pkcs12'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/p12local.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  p12local.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/p12creat.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  p12creat.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/p12dec.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  p12dec.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/p12plcy.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  p12plcy.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/p12tmpl.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  p12tmpl.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/p12e.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  p12e.c
p12e.c: In function sec_PKCS12CreateSafeBag:
p12e.c:698:12: warning: variable setName set but not used [-Wunused-but-set-variable]
p12e.c: In function sec_pkcs12_encoder_start_context:
p12e.c:1535:12: warning: variable rv set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/p12d.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  p12d.c
rm -f Linux3.6_x86_glibc_PTH_OPT.OBJ/libpkcs12.a
ar cr Linux3.6_x86_glibc_PTH_OPT.OBJ/libpkcs12.a Linux3.6_x86_glibc_PTH_OPT.OBJ/p12local.o Linux3.6_x86_glibc_PTH_OPT.OBJ/p12creat.o Linux3.6_x86_glibc_PTH_OPT.OBJ/p12dec.o Linux3.6_x86_glibc_PTH_OPT.OBJ/p12plcy.o Linux3.6_x86_glibc_PTH_OPT.OBJ/p12tmpl.o Linux3.6_x86_glibc_PTH_OPT.OBJ/p12e.o Linux3.6_x86_glibc_PTH_OPT.OBJ/p12d.o
ranlib Linux3.6_x86_glibc_PTH_OPT.OBJ/libpkcs12.a
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.6_x86_glibc_PTH_OPT.OBJ/libpkcs12.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/pkcs12'
cd pkcs7; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/pkcs7'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/certread.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  certread.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/p7common.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  p7common.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/p7create.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  p7create.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/p7decode.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  p7decode.c
p7decode.c: In function sec_pkcs7_decoder_get_recipient_key:
p7decode.c:410:9: warning: unused variable bulkLength [-Wunused-variable]
p7decode.c: In function sec_pkcs7_verify_signature:
p7decode.c:1291:21: warning: variable crls set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/p7encode.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  p7encode.c
p7encode.c: In function sec_pkcs7_encoder_start_encrypt:
p7encode.c:64:18: warning: variable wincx set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/p7local.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  p7local.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/secmime.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  secmime.c
rm -f Linux3.6_x86_glibc_PTH_OPT.OBJ/libpkcs7.a
ar cr Linux3.6_x86_glibc_PTH_OPT.OBJ/libpkcs7.a Linux3.6_x86_glibc_PTH_OPT.OBJ/certread.o Linux3.6_x86_glibc_PTH_OPT.OBJ/p7common.o Linux3.6_x86_glibc_PTH_OPT.OBJ/p7create.o Linux3.6_x86_glibc_PTH_OPT.OBJ/p7decode.o Linux3.6_x86_glibc_PTH_OPT.OBJ/p7encode.o Linux3.6_x86_glibc_PTH_OPT.OBJ/p7local.o Linux3.6_x86_glibc_PTH_OPT.OBJ/secmime.o
ranlib Linux3.6_x86_glibc_PTH_OPT.OBJ/libpkcs7.a
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.6_x86_glibc_PTH_OPT.OBJ/libpkcs7.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/pkcs7'
cd smime; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/smime'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmsarray.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmsarray.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmsasn1.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmsasn1.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmsattr.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmsattr.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmscinfo.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmscinfo.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmscipher.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmscipher.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmsdecode.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmsdecode.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmsdigdata.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmsdigdata.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmsdigest.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmsdigest.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmsencdata.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmsencdata.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmsencode.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmsencode.c
cmsencode.c: In function nss_cms_encoder_notify:
cmsencode.c:127:18: warning: variable poolp set but not used [-Wunused-but-set-variable]
cmsencode.c: In function nss_cms_before_data:
cmsencode.c:206:18: warning: variable poolp set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmsenvdata.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmsenvdata.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmsmessage.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmsmessage.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmspubkey.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmspubkey.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmsrecinfo.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmsrecinfo.c
cmsrecinfo.c: In function NSS_CMSRecipientInfo_UnwrapBulkKey:
cmsrecinfo.c:531:21: warning: variable encalg set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmsreclist.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmsreclist.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmssigdata.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmssigdata.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmssiginfo.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmssiginfo.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmsudf.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmsudf.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmsutil.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmsutil.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/smimemessage.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  smimemessage.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/smimeutil.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  smimeutil.c
smimeutil.c: In function NSSSMIME_VersionCheck:
smimeutil.c:772:19: warning: variable c set but not used [-Wunused-but-set-variable]
smimeutil.c: In function NSS_SMIMEUtil_FindBulkAlgForRecipients:
smimeutil.c:448:9: warning: key_type may be used uninitialized in this function [-Wmaybe-uninitialized]
smimeutil.c:427:14: note: key_type was declared here
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/smimever.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  smimever.c
rm -f Linux3.6_x86_glibc_PTH_OPT.OBJ/libsmime.a
ar cr Linux3.6_x86_glibc_PTH_OPT.OBJ/libsmime.a Linux3.6_x86_glibc_PTH_OPT.OBJ/cmsarray.o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmsasn1.o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmsattr.o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmscinfo.o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmscipher.o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmsdecode.o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmsdigdata.o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmsdigest.o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmsencdata.o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmsencode.o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmsenvdata.o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmsmessage.o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmspubkey.o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmsrecinfo.o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmsreclist.o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmssigdata.o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmssiginfo.o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmsudf.o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmsutil.o Linux3.6_x86_glibc_PTH_OPT.OBJ/smimemessage.o Linux3.6_x86_glibc_PTH_OPT.OBJ/smimeutil.o Linux3.6_x86_glibc_PTH_OPT.OBJ/smimever.o
ranlib Linux3.6_x86_glibc_PTH_OPT.OBJ/libsmime.a
grep -v ';-' smime.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux3.6_x86_glibc_PTH_OPT.OBJ/smime.def
rm -f Linux3.6_x86_glibc_PTH_OPT.OBJ/libsmime3.so
gcc -shared -m32 -Wl,-z,defs -Wl,-soname -Wl,libsmime3.so  -Wl,--version-script,Linux3.6_x86_glibc_PTH_OPT.OBJ/smime.def -o Linux3.6_x86_glibc_PTH_OPT.OBJ/libsmime3.so Linux3.6_x86_glibc_PTH_OPT.OBJ/cmsarray.o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmsasn1.o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmsattr.o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmscinfo.o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmscipher.o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmsdecode.o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmsdigdata.o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmsdigest.o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmsencdata.o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmsencode.o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmsenvdata.o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmsmessage.o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmspubkey.o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmsrecinfo.o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmsreclist.o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmssigdata.o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmssiginfo.o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmsudf.o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmsutil.o Linux3.6_x86_glibc_PTH_OPT.OBJ/smimemessage.o Linux3.6_x86_glibc_PTH_OPT.OBJ/smimeutil.o Linux3.6_x86_glibc_PTH_OPT.OBJ/smimever.o ../pkcs12/Linux3.6_x86_glibc_PTH_OPT.OBJ/p12local.o ../pkcs12/Linux3.6_x86_glibc_PTH_OPT.OBJ/p12creat.o ../pkcs12/Linux3.6_x86_glibc_PTH_OPT.OBJ/p12dec.o ../pkcs12/Linux3.6_x86_glibc_PTH_OPT.OBJ/p12plcy.o ../pkcs12/Linux3.6_x86_glibc_PTH_OPT.OBJ/p12tmpl.o ../pkcs12/Linux3.6_x86_glibc_PTH_OPT.OBJ/p12e.o ../pkcs12/Linux3.6_x86_glibc_PTH_OPT.OBJ/p12d.o ../pkcs7/Linux3.6_x86_glibc_PTH_OPT.OBJ/certread.o ../pkcs7/Linux3.6_x86_glibc_PTH_OPT.OBJ/p7common.o ../pkcs7/Linux3.6_x86_glibc_PTH_OPT.OBJ/p7create.o ../pkcs7/Linux3.6_x86_glibc_PTH_OPT.OBJ/p7decode.o ../pkcs7/Linux3.6_x86_glibc_PTH_OPT.OBJ/p7encode.o ../pkcs7/Linux3.6_x86_glibc_PTH_OPT.OBJ/p7local.o ../pkcs7/Linux3.6_x86_glibc_PTH_OPT.OBJ/secmime.o   -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lnss3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
chmod +x Linux3.6_x86_glibc_PTH_OPT.OBJ/libsmime3.so
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.6_x86_glibc_PTH_OPT.OBJ/libsmime.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.6_x86_glibc_PTH_OPT.OBJ/libsmime3.so ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/smime'
cd crmf; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/crmf'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/crmfenc.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  crmfenc.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/crmftmpl.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  crmftmpl.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/crmfreq.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  crmfreq.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/crmfpop.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  crmfpop.c
crmfpop.c: In function CRMF_CertReqMsgSetRAVerifiedPOP:
crmfpop.c:36:14: warning: variable dummy set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/crmfdec.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  crmfdec.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/crmfget.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  crmfget.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/crmfcont.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  crmfcont.c
crmfcont.c: In function CRMF_CreateEncryptedKeyWithEncryptedValue:
crmfcont.c:860:25: warning: variable dummy set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmmfasn1.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmmfasn1.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmmfresp.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmmfresp.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmmfrec.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmmfrec.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmmfchal.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmmfchal.c
cmmfchal.c: In function cmmf_create_witness_and_challenge:
cmmfchal.c:33:22: warning: variable id set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/servget.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  servget.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/encutil.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  encutil.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/respcli.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  respcli.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/respcmn.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  respcmn.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/challcli.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  challcli.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/asn1cmn.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  asn1cmn.c
rm -f Linux3.6_x86_glibc_PTH_OPT.OBJ/libcrmf.a
ar cr Linux3.6_x86_glibc_PTH_OPT.OBJ/libcrmf.a Linux3.6_x86_glibc_PTH_OPT.OBJ/crmfenc.o Linux3.6_x86_glibc_PTH_OPT.OBJ/crmftmpl.o Linux3.6_x86_glibc_PTH_OPT.OBJ/crmfreq.o Linux3.6_x86_glibc_PTH_OPT.OBJ/crmfpop.o Linux3.6_x86_glibc_PTH_OPT.OBJ/crmfdec.o Linux3.6_x86_glibc_PTH_OPT.OBJ/crmfget.o Linux3.6_x86_glibc_PTH_OPT.OBJ/crmfcont.o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmmfasn1.o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmmfresp.o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmmfrec.o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmmfchal.o Linux3.6_x86_glibc_PTH_OPT.OBJ/servget.o Linux3.6_x86_glibc_PTH_OPT.OBJ/encutil.o Linux3.6_x86_glibc_PTH_OPT.OBJ/respcli.o Linux3.6_x86_glibc_PTH_OPT.OBJ/respcmn.o Linux3.6_x86_glibc_PTH_OPT.OBJ/challcli.o Linux3.6_x86_glibc_PTH_OPT.OBJ/asn1cmn.o
ranlib Linux3.6_x86_glibc_PTH_OPT.OBJ/libcrmf.a
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.6_x86_glibc_PTH_OPT.OBJ/libcrmf.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/crmf'
cd jar; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/jar'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/jarver.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  jarver.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/jarsign.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  jarsign.c
jarsign.c: In function jar_create_pk7:
jarsign.c:174:11: warning: variable errstring set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/jar.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  jar.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/jar-ds.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  jar-ds.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/jarfile.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  jarfile.c
jarfile.c: In function jar_listzip:
jarfile.c:690:2: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing]
jarfile.c:694:6: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing]
jarfile.c:695:6: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing]
jarfile.c:717:6: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing]
jarfile.c:722:6: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing]
jarfile.c:723:6: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing]
jarfile.c:761:3: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing]
jarfile.c:784:11: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing]
jarfile.c:785:4: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing]
jarfile.c:786:4: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing]
jarfile.c: In function jar_listtar:
jarfile.c:824:12: warning: variable when set but not used [-Wunused-but-set-variable]
jarfile.c:823:14: warning: variable mode set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/jarint.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  jarint.c
rm -f Linux3.6_x86_glibc_PTH_OPT.OBJ/libjar.a
ar cr Linux3.6_x86_glibc_PTH_OPT.OBJ/libjar.a Linux3.6_x86_glibc_PTH_OPT.OBJ/jarver.o Linux3.6_x86_glibc_PTH_OPT.OBJ/jarsign.o Linux3.6_x86_glibc_PTH_OPT.OBJ/jar.o Linux3.6_x86_glibc_PTH_OPT.OBJ/jar-ds.o Linux3.6_x86_glibc_PTH_OPT.OBJ/jarfile.o Linux3.6_x86_glibc_PTH_OPT.OBJ/jarint.o
ranlib Linux3.6_x86_glibc_PTH_OPT.OBJ/libjar.a
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.6_x86_glibc_PTH_OPT.OBJ/libjar.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/jar'
cd ckfw; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/ckfw'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/crypto.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  crypto.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/find.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  find.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/hash.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  hash.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/instance.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  instance.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/mutex.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  mutex.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/object.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  object.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/session.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  session.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/sessobj.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  sessobj.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/slot.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  slot.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/token.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  token.c
token.c: In function nssCKFWToken_GetUTCTime:
token.c:1265:27: warning: variable z set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/wrap.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  wrap.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/mechanism.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  mechanism.c
rm -f Linux3.6_x86_glibc_PTH_OPT.OBJ/libnssckfw.a
ar cr Linux3.6_x86_glibc_PTH_OPT.OBJ/libnssckfw.a Linux3.6_x86_glibc_PTH_OPT.OBJ/crypto.o Linux3.6_x86_glibc_PTH_OPT.OBJ/find.o Linux3.6_x86_glibc_PTH_OPT.OBJ/hash.o Linux3.6_x86_glibc_PTH_OPT.OBJ/instance.o Linux3.6_x86_glibc_PTH_OPT.OBJ/mutex.o Linux3.6_x86_glibc_PTH_OPT.OBJ/object.o Linux3.6_x86_glibc_PTH_OPT.OBJ/session.o Linux3.6_x86_glibc_PTH_OPT.OBJ/sessobj.o Linux3.6_x86_glibc_PTH_OPT.OBJ/slot.o Linux3.6_x86_glibc_PTH_OPT.OBJ/token.o Linux3.6_x86_glibc_PTH_OPT.OBJ/wrap.o Linux3.6_x86_glibc_PTH_OPT.OBJ/mechanism.o
ranlib Linux3.6_x86_glibc_PTH_OPT.OBJ/libnssckfw.a
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.6_x86_glibc_PTH_OPT.OBJ/libnssckfw.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib
cd builtins; gmake libs
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/ckfw/builtins'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/anchor.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr  anchor.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/constants.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr  constants.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/bfind.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr  bfind.c
bfind.c: In function nss_builtins_FindObjectsInit:
bfind.c:126:19: warning: data may be used uninitialized in this function [-Wmaybe-uninitialized]
bfind.c:122:17: note: data was declared here
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/binst.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr  binst.c
binst.c: In function builtins_mdInstance_GetLibraryVersion:
binst.c:74:17: warning: variable c set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/bobject.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr  bobject.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/bsession.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr  bsession.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/bslot.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr  bslot.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/btoken.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr  btoken.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/certdata.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr  certdata.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/ckbiver.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr  ckbiver.c
grep -v ';-' nssckbi.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux3.6_x86_glibc_PTH_OPT.OBJ/nssckbi.def
rm -f Linux3.6_x86_glibc_PTH_OPT.OBJ/libnssckbi.so
gcc -shared -m32 -Wl,-z,defs -Wl,-soname -Wl,libnssckbi.so  -Wl,--version-script,Linux3.6_x86_glibc_PTH_OPT.OBJ/nssckbi.def -o Linux3.6_x86_glibc_PTH_OPT.OBJ/libnssckbi.so Linux3.6_x86_glibc_PTH_OPT.OBJ/anchor.o Linux3.6_x86_glibc_PTH_OPT.OBJ/constants.o Linux3.6_x86_glibc_PTH_OPT.OBJ/bfind.o Linux3.6_x86_glibc_PTH_OPT.OBJ/binst.o Linux3.6_x86_glibc_PTH_OPT.OBJ/bobject.o Linux3.6_x86_glibc_PTH_OPT.OBJ/bsession.o Linux3.6_x86_glibc_PTH_OPT.OBJ/bslot.o Linux3.6_x86_glibc_PTH_OPT.OBJ/btoken.o Linux3.6_x86_glibc_PTH_OPT.OBJ/certdata.o Linux3.6_x86_glibc_PTH_OPT.OBJ/ckbiver.o   ../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckfw.a ../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssb.a  -L../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
chmod +x Linux3.6_x86_glibc_PTH_OPT.OBJ/libnssckbi.so
../../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.6_x86_glibc_PTH_OPT.OBJ/libnssckbi.so ../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/ckfw/builtins'
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/ckfw'
cd sysinit; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/sysinit'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/nsssysinit.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss   nsssysinit.c
rm -f Linux3.6_x86_glibc_PTH_OPT.OBJ/libnsssysinit.a
ar cr Linux3.6_x86_glibc_PTH_OPT.OBJ/libnsssysinit.a Linux3.6_x86_glibc_PTH_OPT.OBJ/nsssysinit.o
ranlib Linux3.6_x86_glibc_PTH_OPT.OBJ/libnsssysinit.a
rm -f Linux3.6_x86_glibc_PTH_OPT.OBJ/libnsssysinit.so
gcc -shared -m32 -Wl,-z,defs -Wl,-soname -Wl,libnsssysinit.so  -o Linux3.6_x86_glibc_PTH_OPT.OBJ/libnsssysinit.so Linux3.6_x86_glibc_PTH_OPT.OBJ/nsssysinit.o    -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
chmod +x Linux3.6_x86_glibc_PTH_OPT.OBJ/libnsssysinit.so
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.6_x86_glibc_PTH_OPT.OBJ/libnsssysinit.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.6_x86_glibc_PTH_OPT.OBJ/libnsssysinit.so ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib/sysinit'
gmake[1]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/lib'
cd cmd; gmake libs
gmake[1]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd'
cd lib; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/lib'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/basicutil.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  basicutil.c
basicutil.c: In function SECU_PrintAsHex:
basicutil.c:305:9: warning: column may be used uninitialized in this function [-Wmaybe-uninitialized]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/secutil.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  secutil.c
secutil.c: In function SECU_ChangePW2:
secutil.c:319:15: warning: variable rv set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/secpwd.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  secpwd.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/derprint.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  derprint.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/moreoids.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  moreoids.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pppolicy.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pppolicy.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/ffs.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  ffs.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11table.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11table.c
rm -f Linux3.6_x86_glibc_PTH_OPT.OBJ/libsectool.a
ar cr Linux3.6_x86_glibc_PTH_OPT.OBJ/libsectool.a Linux3.6_x86_glibc_PTH_OPT.OBJ/basicutil.o Linux3.6_x86_glibc_PTH_OPT.OBJ/secutil.o Linux3.6_x86_glibc_PTH_OPT.OBJ/secpwd.o Linux3.6_x86_glibc_PTH_OPT.OBJ/derprint.o Linux3.6_x86_glibc_PTH_OPT.OBJ/moreoids.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pppolicy.o Linux3.6_x86_glibc_PTH_OPT.OBJ/ffs.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11table.o
ranlib Linux3.6_x86_glibc_PTH_OPT.OBJ/libsectool.a
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.6_x86_glibc_PTH_OPT.OBJ/libsectool.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/lib'
cd addbuiltin; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/addbuiltin'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/addbuiltin.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd  addbuiltin.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/addbuiltin -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd  Linux3.6_x86_glibc_PTH_OPT.OBJ/addbuiltin.o -m32 ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.6_x86_glibc_PTH_OPT.OBJ/addbuiltin ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/addbuiltin'
cd atob; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/atob'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/atob.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  atob.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/atob -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Linux3.6_x86_glibc_PTH_OPT.OBJ/atob.o -m32 ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.6_x86_glibc_PTH_OPT.OBJ/atob ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/atob'
cd bltest; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/bltest'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/blapitest.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../nss/lib/softoken -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -I../../../../dist/public/softoken  blapitest.c
blapitest.c: In function serialize_key:
blapitest.c:319:15: warning: variable status set but not used [-Wunused-but-set-variable]
blapitest.c: In function dsaOp:
blapitest.c:2143:83: warning: variable L100 set but not used [-Wunused-but-set-variable]
blapitest.c:2175:83: warning: variable L100 set but not used [-Wunused-but-set-variable]
blapitest.c:2211:79: warning: variable L100 set but not used [-Wunused-but-set-variable]
blapitest.c: In function ecdsaOp:
blapitest.c:2265:83: warning: variable L100 set but not used [-Wunused-but-set-variable]
blapitest.c:2298:83: warning: variable L100 set but not used [-Wunused-but-set-variable]
blapitest.c:2333:79: warning: variable L100 set but not used [-Wunused-but-set-variable]
blapitest.c: In function cipherDoOp:
blapitest.c:2403:79: warning: variable L100 set but not used [-Wunused-but-set-variable]
blapitest.c:2437:79: warning: variable L100 set but not used [-Wunused-but-set-variable]
blapitest.c:2471:79: warning: variable L100 set but not used [-Wunused-but-set-variable]
blapitest.c: In function printPR_smpString:
blapitest.c:2602:13: warning: variable prnRes set but not used [-Wunused-but-set-variable]
blapitest.c: In function main:
blapitest.c:3473:11: warning: variable infileName set but not used [-Wunused-but-set-variable]
blapitest.c:3586:5: warning: ret may be used uninitialized in this function [-Wuninitialized]
blapitest.c:3982:30: warning: totalTime may be used uninitialized in this function [-Wmaybe-uninitialized]
blapitest.c:3723:23: warning: cipherInfo may be used uninitialized in this function [-Wmaybe-uninitialized]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/bltest -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../nss/lib/softoken -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -I../../../../dist/public/softoken  Linux3.6_x86_glibc_PTH_OPT.OBJ/blapitest.o -m32 ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsmime.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkcs12.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkcs7.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libcryptohi.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsoftokn.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libcertdb.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssdev.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssb.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libfreebl.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libdbm.a  ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixutil.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixstore.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixparams.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixpki.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixresults.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libcerthi.a  -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lsqlite3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.6_x86_glibc_PTH_OPT.OBJ/bltest ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/bltest'
cd btoa; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/btoa'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/btoa.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  btoa.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/btoa -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Linux3.6_x86_glibc_PTH_OPT.OBJ/btoa.o -m32 ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.6_x86_glibc_PTH_OPT.OBJ/btoa ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/btoa'
cd certcgi; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/certcgi'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/certcgi.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  certcgi.c
certcgi.c: In function MakeV1Cert:
certcgi.c:530:15: warning: variable rv set but not used [-Wunused-but-set-variable]
certcgi.c: In function get_serial_number:
certcgi.c:594:6: warning: this decimal constant is unsigned only in ISO C90 [enabled by default]
certcgi.c: In function string_to_binary:
certcgi.c:1420:9: warning: variable low_digit set but not used [-Wunused-but-set-variable]
certcgi.c:1419:9: warning: variable high_digit set but not used [-Wunused-but-set-variable]
certcgi.c: At top level:
certcgi.c:360:1: warning: update_data_by_name defined but not used [-Wunused-function]
certcgi.c:388:1: warning: update_data_by_index defined but not used [-Wunused-function]
certcgi.c:404:1: warning: add_field defined but not used [-Wunused-function]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/certcgi -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Linux3.6_x86_glibc_PTH_OPT.OBJ/certcgi.o -m32 ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsmime.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkcs12.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkcs7.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libcryptohi.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsoftokn.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libcertdb.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssdev.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssb.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libfreebl.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libdbm.a  ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixutil.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixstore.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixparams.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixpki.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixresults.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libcerthi.a  -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lsqlite3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.6_x86_glibc_PTH_OPT.OBJ/certcgi ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/certcgi'
cd certutil; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/certutil'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/certext.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  certext.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/certutil.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  certutil.c
certutil.c: In function CreateCert:
certutil.c:1805:13: warning: variable reqDER set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/keystuff.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  keystuff.c
keystuff.c: In function CERTUTIL_GeneratePrivateKey:
keystuff.c:496:15: warning: variable algtag set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/certutil -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  Linux3.6_x86_glibc_PTH_OPT.OBJ/certext.o Linux3.6_x86_glibc_PTH_OPT.OBJ/certutil.o Linux3.6_x86_glibc_PTH_OPT.OBJ/keystuff.o -m32 ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.6_x86_glibc_PTH_OPT.OBJ/certutil ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/certutil'
cd checkcert; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/checkcert'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/checkcert.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  checkcert.c
checkcert.c: In function OurVerifyData:
checkcert.c:125:15: warning: variable sigAlgTag set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/checkcert -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Linux3.6_x86_glibc_PTH_OPT.OBJ/checkcert.o -m32 ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.6_x86_glibc_PTH_OPT.OBJ/checkcert ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/checkcert'
cd chktest; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/chktest'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/chktest.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  chktest.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/chktest -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Linux3.6_x86_glibc_PTH_OPT.OBJ/chktest.o -m32 ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsmime.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkcs12.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkcs7.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libcryptohi.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsoftokn.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libcertdb.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssdev.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssb.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libfreebl.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libdbm.a  ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixutil.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixstore.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixparams.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixpki.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixresults.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libcerthi.a  -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lsqlite3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.6_x86_glibc_PTH_OPT.OBJ/chktest ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/chktest'
cd crlutil; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/crlutil'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/crlgen_lex.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  crlgen_lex.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/crlgen.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  crlgen.c
crlgen.c: In function crlgen_RmCert:
crlgen.c:1082:18: warning: variable arena set but not used [-Wunused-but-set-variable]
crlgen.c: In function crlgen_CreateInvalidityDate:
crlgen.c:627:27: warning: mark may be used uninitialized in this function [-Wmaybe-uninitialized]
crlgen.c: In function crlgen_CreateReasonCode:
crlgen.c:586:28: warning: mark may be used uninitialized in this function [-Wmaybe-uninitialized]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/crlutil.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  crlutil.c
crlutil.c: In function main:
crlutil.c:1108:16: warning: rv may be used uninitialized in this function [-Wmaybe-uninitialized]
crlutil.c:851:9: note: rv was declared here
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/crlutil -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Linux3.6_x86_glibc_PTH_OPT.OBJ/crlgen_lex.o Linux3.6_x86_glibc_PTH_OPT.OBJ/crlgen.o Linux3.6_x86_glibc_PTH_OPT.OBJ/crlutil.o -m32 ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.6_x86_glibc_PTH_OPT.OBJ/crlutil ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/crlutil'
cd crmftest; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/crmftest'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/testcrmf.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  testcrmf.c
testcrmf.c: In function get_serial_number:
testcrmf.c:130:14: warning: variable rv set but not used [-Wunused-but-set-variable]
testcrmf.c: In function main:
testcrmf.c:1539:12: warning: variable PArg set but not used [-Wunused-but-set-variable]
testcrmf.c:1538:12: warning: variable sArg set but not used [-Wunused-but-set-variable]
testcrmf.c:1537:12: warning: variable eArg set but not used [-Wunused-but-set-variable]
testcrmf.c:1536:12: warning: variable pArg set but not used [-Wunused-but-set-variable]
testcrmf.c: At top level:
testcrmf.c:941:1: warning: mapWrapKeyType defined but not used [-Wunused-function]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/crmftest -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  Linux3.6_x86_glibc_PTH_OPT.OBJ/testcrmf.o -m32 ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libcrmf.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.6_x86_glibc_PTH_OPT.OBJ/crmftest ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/crmftest'
cd dbtest; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/dbtest'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/dbtest.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  dbtest.c
In file included from ../modutil/modutil.h:21:0,
                 from dbtest.c:32:
../modutil/error.h:136:14: warning: msgStrings defined but not used [-Wunused-variable]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/dbtest -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Linux3.6_x86_glibc_PTH_OPT.OBJ/dbtest.o -m32 ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.6_x86_glibc_PTH_OPT.OBJ/dbtest ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/dbtest'
cd derdump; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/derdump'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/derdump.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  derdump.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/derdump -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Linux3.6_x86_glibc_PTH_OPT.OBJ/derdump.o -m32 ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.6_x86_glibc_PTH_OPT.OBJ/derdump ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/derdump'
cd digest; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/digest'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/digest.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  digest.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/digest -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Linux3.6_x86_glibc_PTH_OPT.OBJ/digest.o -m32 ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.6_x86_glibc_PTH_OPT.OBJ/digest ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/digest'
cd httpserv; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/httpserv'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/httpserv.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  httpserv.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/httpserv -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Linux3.6_x86_glibc_PTH_OPT.OBJ/httpserv.o -m32 ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.6_x86_glibc_PTH_OPT.OBJ/httpserv ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/httpserv'
cd fipstest; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/fipstest'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/fipstest.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  fipstest.c
fipstest.c: In function drbg:
fipstest.c:2602:12: warning: variable predictionResistance set but not used [-Wunused-but-set-variable]
fipstest.c: At top level:
fipstest.c:2540:1: warning: alloc_value defined but not used [-Wunused-function]
fipstest.c: In function tdea_kat_mmt:
fipstest.c:456:16: warning: mode may be used uninitialized in this function [-Wmaybe-uninitialized]
fipstest.c: In function aes_kat_mmt:
fipstest.c:1116:9: warning: keysize may be used uninitialized in this function [-Wmaybe-uninitialized]
fipstest.c:1116:9: warning: mode may be used uninitialized in this function [-Wmaybe-uninitialized]
fipstest.c: In function aes_ecb_mct:
fipstest.c:1380:6: warning: keysize may be used uninitialized in this function [-Wmaybe-uninitialized]
fipstest.c: In function aes_cbc_mct:
fipstest.c:1763:19: warning: keysize may be used uninitialized in this function [-Wmaybe-uninitialized]
fipstest.c:1483:18: note: keysize was declared here
fipstest.c: In function ecdsa_pkv_test:
fipstest.c:2179:15: warning: len may be used uninitialized in this function [-Wmaybe-uninitialized]
fipstest.c: In function ecdsa_sigver_test:
fipstest.c:2514:23: warning: olen may be used uninitialized in this function [-Wmaybe-uninitialized]
fipstest.c:2477:15: warning: flen may be used uninitialized in this function [-Wmaybe-uninitialized]
fipstest.c: In function rng_vst:
fipstest.c:3066:19: warning: b may be used uninitialized in this function [-Wmaybe-uninitialized]
fipstest.c: In function rng_mct:
fipstest.c:3190:19: warning: b may be used uninitialized in this function [-Wmaybe-uninitialized]
fipstest.c: In function sha_test:
fipstest.c:3495:26: warning: msgLen may be used uninitialized in this function [-Wmaybe-uninitialized]
fipstest.c:3495:26: warning: MDlen may be used uninitialized in this function [-Wmaybe-uninitialized]
fipstest.c: In function hmac_test:
fipstest.c:3563:13: warning: hash_alg may be used uninitialized in this function [-Wmaybe-uninitialized]
fipstest.c:3608:19: note: hash_alg was declared here
fipstest.c:3636:23: warning: TLen may be used uninitialized in this function [-Wmaybe-uninitialized]
fipstest.c:3577:17: warning: HMACLen may be used uninitialized in this function [-Wmaybe-uninitialized]
fipstest.c:3602:18: note: HMACLen was declared here
fipstest.c:3700:13: warning: keyLen may be used uninitialized in this function [-Wmaybe-uninitialized]
fipstest.c: In function dsa_pqgver_test:
fipstest.c:4030:35: warning: pghSize may be used uninitialized in this function [-Wmaybe-uninitialized]
fipstest.c: In function dsa_pqggen_test:
fipstest.c:4310:24: warning: keySizeIndex may be used uninitialized in this function [-Wmaybe-uninitialized]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/fipstest -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  Linux3.6_x86_glibc_PTH_OPT.OBJ/fipstest.o -m32 ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsmime.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkcs12.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkcs7.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libcryptohi.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsoftokn.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libcertdb.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssdev.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssb.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libfreebl.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libdbm.a  ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixutil.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixstore.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixparams.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixpki.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixresults.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libcerthi.a  -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lsqlite3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.6_x86_glibc_PTH_OPT.OBJ/fipstest ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/fipstest'
cd lowhashtest; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/lowhashtest'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/lowhashtest.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../nss/lib/freebl -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -I../../../../dist/public/softoken  lowhashtest.c
lowhashtest.c: In function main:
lowhashtest.c:402:17: warning: unused variable status [-Wunused-variable]
lowhashtest.c:401:17: warning: unused variable optstate [-Wunused-variable]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/lowhashtest -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../nss/lib/freebl -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -I../../../../dist/public/softoken  Linux3.6_x86_glibc_PTH_OPT.OBJ/lowhashtest.o -m32 ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a  ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -lfreebl3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.6_x86_glibc_PTH_OPT.OBJ/lowhashtest ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/lowhashtest'
cd listsuites; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/listsuites'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/listsuites.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  listsuites.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/listsuites -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  Linux3.6_x86_glibc_PTH_OPT.OBJ/listsuites.o -m32 ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.6_x86_glibc_PTH_OPT.OBJ/listsuites ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/listsuites'
cd makepqg; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/makepqg'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/makepqg.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm  makepqg.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/makepqg -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm  Linux3.6_x86_glibc_PTH_OPT.OBJ/makepqg.o -m32 ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.6_x86_glibc_PTH_OPT.OBJ/makepqg ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/makepqg'
cd multinit; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/multinit'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/multinit.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss   multinit.c
multinit.c:320:1: warning: appendItem defined but not used [-Wunused-function]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/multinit -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss   Linux3.6_x86_glibc_PTH_OPT.OBJ/multinit.o -m32 ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.6_x86_glibc_PTH_OPT.OBJ/multinit ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/multinit'
cd ocspclnt; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/ocspclnt'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/ocspclnt.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  ocspclnt.c
ocspclnt.c: In function main:
ocspclnt.c:448:8: warning: cert_usage may be used uninitialized in this function [-Wmaybe-uninitialized]
ocspclnt.c:964:18: note: cert_usage was declared here
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/ocspclnt -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  Linux3.6_x86_glibc_PTH_OPT.OBJ/ocspclnt.o -m32 ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsmime.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkcs12.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkcs7.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libcryptohi.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsoftokn.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libcertdb.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssdev.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssb.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libfreebl.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libdbm.a  ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixutil.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixstore.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixparams.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixpki.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixresults.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libcerthi.a  -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lsqlite3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.6_x86_glibc_PTH_OPT.OBJ/ocspclnt ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/ocspclnt'
cd ocspresp; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/ocspresp'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/ocspresp.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  ocspresp.c
ocspresp.c: In function main:
ocspresp.c:142:15: warning: variable statusDecodedFail set but not used [-Wunused-but-set-variable]
ocspresp.c:138:15: warning: variable statusDecodedRev set but not used [-Wunused-but-set-variable]
ocspresp.c:134:15: warning: variable statusDecoded set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/ocspresp -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  Linux3.6_x86_glibc_PTH_OPT.OBJ/ocspresp.o -m32 ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.6_x86_glibc_PTH_OPT.OBJ/ocspresp ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/ocspresp'
cd oidcalc; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/oidcalc'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/oidcalc.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  oidcalc.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/oidcalc -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Linux3.6_x86_glibc_PTH_OPT.OBJ/oidcalc.o -m32 ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.6_x86_glibc_PTH_OPT.OBJ/oidcalc ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/oidcalc'
cd p7content; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/p7content'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/p7content.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  p7content.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/p7content -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  Linux3.6_x86_glibc_PTH_OPT.OBJ/p7content.o -m32 ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.6_x86_glibc_PTH_OPT.OBJ/p7content ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/p7content'
cd p7env; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/p7env'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/p7env.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  p7env.c
p7env.c: In function main:
p7env.c:135:11: warning: variable certName set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/p7env -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  Linux3.6_x86_glibc_PTH_OPT.OBJ/p7env.o -m32 ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.6_x86_glibc_PTH_OPT.OBJ/p7env ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/p7env'
cd p7sign; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/p7sign'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/p7sign.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  p7sign.c
p7sign.c: In function main:
p7sign.c:263:32: warning: cert may be used uninitialized in this function [-Wmaybe-uninitialized]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/p7sign -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  Linux3.6_x86_glibc_PTH_OPT.OBJ/p7sign.o -m32 ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.6_x86_glibc_PTH_OPT.OBJ/p7sign ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/p7sign'
cd p7verify; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/p7verify'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/p7verify.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  p7verify.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/p7verify -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  Linux3.6_x86_glibc_PTH_OPT.OBJ/p7verify.o -m32 ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.6_x86_glibc_PTH_OPT.OBJ/p7verify ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/p7verify'
cd pk12util; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/pk12util'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk12util.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  pk12util.c
pk12util.c: In function p12u_InitContext:
pk12util.c:104:12: warning: variable fileExist set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk12util -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  Linux3.6_x86_glibc_PTH_OPT.OBJ/pk12util.o -m32 ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.6_x86_glibc_PTH_OPT.OBJ/pk12util ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/pk12util'
cd pk11mode; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/pk11mode'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11mode.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  pk11mode.c
pk11mode.c: In function PKM_TLSMasterKeyDerive:
pk11mode.c:4561:16: warning: variable expected_version set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11mode -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11mode.o -m32 ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11mode ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/pk11mode'
cd pk1sign; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/pk1sign'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk1sign.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  pk1sign.c
pk1sign.c: In function main:
pk1sign.c:282:32: warning: cert may be used uninitialized in this function [-Wmaybe-uninitialized]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk1sign -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  Linux3.6_x86_glibc_PTH_OPT.OBJ/pk1sign.o -m32 ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.6_x86_glibc_PTH_OPT.OBJ/pk1sign ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/pk1sign'
cd pkix-errcodes; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/pkix-errcodes'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix-errcodes.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  pkix-errcodes.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix-errcodes -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix-errcodes.o -m32 ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.6_x86_glibc_PTH_OPT.OBJ/pkix-errcodes ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/pkix-errcodes'
cd pp; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/pp'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pp.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  pp.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pp -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Linux3.6_x86_glibc_PTH_OPT.OBJ/pp.o -m32 ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.6_x86_glibc_PTH_OPT.OBJ/pp ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/pp'
cd pwdecrypt; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/pwdecrypt'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pwdecrypt.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  pwdecrypt.c
pwdecrypt.c: In function doDecrypt:
pwdecrypt.c:140:18: warning: unused variable i [-Wunused-variable]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pwdecrypt -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  Linux3.6_x86_glibc_PTH_OPT.OBJ/pwdecrypt.o -m32 ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.6_x86_glibc_PTH_OPT.OBJ/pwdecrypt ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/pwdecrypt'
cd rsaperf; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/rsaperf'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/rsaperf.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../nss/lib/softoken -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  rsaperf.c
rsaperf.c: In function main:
rsaperf.c:433:27: warning: variable certdb set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/defkey.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../nss/lib/softoken -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  defkey.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/rsaperf -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../nss/lib/softoken -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  Linux3.6_x86_glibc_PTH_OPT.OBJ/rsaperf.o Linux3.6_x86_glibc_PTH_OPT.OBJ/defkey.o -m32 ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsmime.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkcs12.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkcs7.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libcryptohi.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsoftokn.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libcertdb.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssdev.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssb.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libfreebl.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libdbm.a  ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixutil.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixstore.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixparams.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixpki.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixresults.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libcerthi.a  -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lsqlite3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.6_x86_glibc_PTH_OPT.OBJ/rsaperf ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/rsaperf'
cd sdrtest; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/sdrtest'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/sdrtest.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  sdrtest.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/sdrtest -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  Linux3.6_x86_glibc_PTH_OPT.OBJ/sdrtest.o -m32 ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.6_x86_glibc_PTH_OPT.OBJ/sdrtest ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/sdrtest'
cd selfserv; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/selfserv'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/selfserv.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  selfserv.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/selfserv -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Linux3.6_x86_glibc_PTH_OPT.OBJ/selfserv.o -m32 ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.6_x86_glibc_PTH_OPT.OBJ/selfserv ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/selfserv'
cd signtool; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/signtool'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/signtool.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  signtool.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/certgen.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  certgen.c
certgen.c: In function sign_cert:
certgen.c:423:11: warning: variable dummy set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/javascript.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  javascript.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/list.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  list.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/sign.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  sign.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/util.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  util.c
util.c: In function XP_GetString:
util.c:21:5: warning: return discards const qualifier from pointer target type [enabled by default]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/verify.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  verify.c
verify.c: In function VerifyJar:
verify.c:55:11: warning: assignment discards const qualifier from pointer target type [enabled by default]
verify.c: In function JarWho:
verify.c:286:11: warning: assignment discards const qualifier from pointer target type [enabled by default]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/zip.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  zip.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/signtool -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  Linux3.6_x86_glibc_PTH_OPT.OBJ/signtool.o Linux3.6_x86_glibc_PTH_OPT.OBJ/certgen.o Linux3.6_x86_glibc_PTH_OPT.OBJ/javascript.o Linux3.6_x86_glibc_PTH_OPT.OBJ/list.o Linux3.6_x86_glibc_PTH_OPT.OBJ/sign.o Linux3.6_x86_glibc_PTH_OPT.OBJ/util.o Linux3.6_x86_glibc_PTH_OPT.OBJ/verify.o Linux3.6_x86_glibc_PTH_OPT.OBJ/zip.o -m32 ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libjar.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc -lz
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.6_x86_glibc_PTH_OPT.OBJ/signtool ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/signtool'
cd signver; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/signver'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/signver.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  signver.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk7print.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  pk7print.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/signver -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  Linux3.6_x86_glibc_PTH_OPT.OBJ/signver.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk7print.o -m32 ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.6_x86_glibc_PTH_OPT.OBJ/signver ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/signver'
cd shlibsign; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/shlibsign'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/shlibsign.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  shlibsign.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/shlibsign -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  Linux3.6_x86_glibc_PTH_OPT.OBJ/shlibsign.o -m32  -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.6_x86_glibc_PTH_OPT.OBJ/shlibsign ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/bin
cd mangle; gmake libs
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/shlibsign/mangle'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/mangle.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss  mangle.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/mangle -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss  Linux3.6_x86_glibc_PTH_OPT.OBJ/mangle.o -m32  -L../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.6_x86_glibc_PTH_OPT.OBJ/mangle ../../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/bin
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/shlibsign/mangle'
cd Linux3.6_x86_glibc_PTH_OPT.OBJ ; sh "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/shlibsign/."/sign.sh "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ" \
"/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/shlibsign/Linux3.6_x86_glibc_PTH_OPT.OBJ" Linux \
"/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib" "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsoftokn3.so"
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/shlibsign/Linux3.6_x86_glibc_PTH_OPT.OBJ/shlibsign -v -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsoftokn3.so
Library File: ../../../security/nss/lib/softoken/Linux3.6_x86_glibc_PTH_OPT.OBJ/libsoftokn3.so 322005 bytes
Check File: ../../../security/nss/lib/softoken/Linux3.6_x86_glibc_PTH_OPT.OBJ/libsoftokn3.chk
Link: libsoftokn3.chk
  hash: 32 bytes
    be c7 16 ab f0 18 9b 28 66 46
    e6 0e 89 15 7a 73 5f c2 7c e8
    2a 96 bc 92 75 81 20 89 9e 38
    c7 5e
  signature: 64 bytes
    25 39 e5 4f e1 bb c4 52 1c 27
    9c 91 e6 e5 ef d3 c9 e5 bf ae
    1c 83 c1 71 5a 4e 0e bf a9 f4
    78 72 68 c8 ba 9c 1c 20 18 d7
    94 b1 22 9c e5 f9 3a dc f0 7d
    0d f4 da 14 fc 83 55 fc 96 b5
    a5 10 09 e5
moduleSpec configdir='' certPrefix='' keyPrefix='' secmod='' flags=noCertDB, noModDB
Generate a DSA key pair ... 
cd Linux3.6_x86_glibc_PTH_OPT.OBJ ; sh "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/shlibsign/."/sign.sh "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ" \
"/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/shlibsign/Linux3.6_x86_glibc_PTH_OPT.OBJ" Linux \
"/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib" "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libfreebl3.so"
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/shlibsign/Linux3.6_x86_glibc_PTH_OPT.OBJ/shlibsign -v -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libfreebl3.so
Library File: ../../../security/nss/lib/freebl/Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so 448523 bytes
Check File: ../../../security/nss/lib/freebl/Linux3.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.chk
Link: libfreebl3.chk
  hash: 32 bytes
    a6 0c e1 28 67 cd cf 41 a2 d5
    04 99 46 38 19 c1 7a ff ce f5
    91 01 96 df ab 99 96 2d fd 67
    ad a9
  signature: 64 bytes
    7d 0e bc 86 e2 96 e9 89 2f be
    c4 ff be dc 26 4e 39 e5 ab 7b
    9a b4 e5 82 e5 c6 92 4d 72 2d
    b4 73 85 8a 39 b2 a3 20 65 56
    07 f4 63 2a 9d dc 24 30 39 dd
    b4 5c ab 5b 25 34 4e a5 b4 a6
    14 d2 39 8b
moduleSpec configdir='' certPrefix='' keyPrefix='' secmod='' flags=noCertDB, noModDB
Generate a DSA key pair ... 
cd Linux3.6_x86_glibc_PTH_OPT.OBJ ; sh "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/shlibsign/."/sign.sh "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ" \
"/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/shlibsign/Linux3.6_x86_glibc_PTH_OPT.OBJ" Linux \
"/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib" "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssdbm3.so"
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/shlibsign/Linux3.6_x86_glibc_PTH_OPT.OBJ/shlibsign -v -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssdbm3.so
Library File: ../../../security/nss/lib/softoken/legacydb/Linux3.6_x86_glibc_PTH_OPT.OBJ/libnssdbm3.so 184391 bytes
Check File: ../../../security/nss/lib/softoken/legacydb/Linux3.6_x86_glibc_PTH_OPT.OBJ/libnssdbm3.chk
Link: libnssdbm3.chk
  hash: 32 bytes
    94 df 24 72 c8 eb 1e 80 73 9b
    8f 72 3d 71 da cd b5 40 fc a8
    71 97 f5 4b dd 32 51 ba f8 1c
    b1 5f
  signature: 64 bytes
    78 03 8d 7b 8d 56 bc 4c 5b 71
    e7 0c 78 c9 14 5e 71 eb 1a 8e
    57 f2 94 ca f2 b5 07 4a 90 91
    b6 13 73 29 9a fc db db 67 2b
    f8 46 37 2d 5d 82 d3 6f ef da
    f5 c2 f4 6c 00 99 f9 c6 ef 2d
    f4 03 d4 1e
moduleSpec configdir='' certPrefix='' keyPrefix='' secmod='' flags=noCertDB, noModDB
Generate a DSA key pair ... 
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/shlibsign'
cd smimetools; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/smimetools'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmsutil.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  cmsutil.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/cmsutil -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Linux3.6_x86_glibc_PTH_OPT.OBJ/cmsutil.o -m32 ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.6_x86_glibc_PTH_OPT.OBJ/cmsutil ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/smimetools'
cd ssltap; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/ssltap'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/ssltap.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  ssltap.c
ssltap.c: In function print_ssl:
ssltap.c:1137:9: warning: variable l set but not used [-Wunused-but-set-variable]
ssltap.c:1137:7: warning: variable i set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/ssltap -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Linux3.6_x86_glibc_PTH_OPT.OBJ/ssltap.o -m32 ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.6_x86_glibc_PTH_OPT.OBJ/ssltap ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/ssltap'
cd strsclnt; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/strsclnt'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/strsclnt.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  strsclnt.c
strsclnt.c: In function do_connects:
strsclnt.c:726:15: warning: variable result set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/strsclnt -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Linux3.6_x86_glibc_PTH_OPT.OBJ/strsclnt.o -m32 ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.6_x86_glibc_PTH_OPT.OBJ/strsclnt ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/strsclnt'
cd symkeyutil; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/symkeyutil'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/symkeyutil.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  symkeyutil.c
symkeyutil.c: In function main:
symkeyutil.c:1018:31: warning: unused variable rv2 [-Wunused-variable]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/symkeyutil -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  Linux3.6_x86_glibc_PTH_OPT.OBJ/symkeyutil.o -m32 ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.6_x86_glibc_PTH_OPT.OBJ/symkeyutil ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/symkeyutil'
cd tests; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/tests'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/baddbdir.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  baddbdir.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/baddbdir -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Linux3.6_x86_glibc_PTH_OPT.OBJ/baddbdir.o \
-m32 ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/conflict.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  conflict.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/conflict -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Linux3.6_x86_glibc_PTH_OPT.OBJ/conflict.o \
-m32 ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/dertimetest.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  dertimetest.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/dertimetest -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Linux3.6_x86_glibc_PTH_OPT.OBJ/dertimetest.o \
-m32 ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/encodeinttest.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  encodeinttest.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/encodeinttest -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Linux3.6_x86_glibc_PTH_OPT.OBJ/encodeinttest.o \
-m32 ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/nonspr10.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  nonspr10.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/nonspr10 -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Linux3.6_x86_glibc_PTH_OPT.OBJ/nonspr10.o \
-m32 ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/remtest.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  remtest.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/remtest -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Linux3.6_x86_glibc_PTH_OPT.OBJ/remtest.o \
-m32 ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/secmodtest.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  secmodtest.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/secmodtest -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Linux3.6_x86_glibc_PTH_OPT.OBJ/secmodtest.o \
-m32 ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.6_x86_glibc_PTH_OPT.OBJ/baddbdir Linux3.6_x86_glibc_PTH_OPT.OBJ/conflict Linux3.6_x86_glibc_PTH_OPT.OBJ/dertimetest Linux3.6_x86_glibc_PTH_OPT.OBJ/encodeinttest Linux3.6_x86_glibc_PTH_OPT.OBJ/nonspr10 Linux3.6_x86_glibc_PTH_OPT.OBJ/remtest Linux3.6_x86_glibc_PTH_OPT.OBJ/secmodtest ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/tests'
cd tstclnt; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/tstclnt'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/tstclnt.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  tstclnt.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/tstclnt -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Linux3.6_x86_glibc_PTH_OPT.OBJ/tstclnt.o -m32 ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.6_x86_glibc_PTH_OPT.OBJ/tstclnt ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/tstclnt'
cd vfychain; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/vfychain'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/vfychain.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  vfychain.c
vfychain.c: In function configureRevocationParams:
vfychain.c:360:50: warning: revFlags may be used uninitialized in this function [-Wmaybe-uninitialized]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/vfychain -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  Linux3.6_x86_glibc_PTH_OPT.OBJ/vfychain.o -m32 ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.6_x86_glibc_PTH_OPT.OBJ/vfychain ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/vfychain'
cd vfyserv; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/vfyserv'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/vfyserv.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  vfyserv.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/vfyutil.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  vfyutil.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/vfyserv -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Linux3.6_x86_glibc_PTH_OPT.OBJ/vfyserv.o Linux3.6_x86_glibc_PTH_OPT.OBJ/vfyutil.o -m32 ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.6_x86_glibc_PTH_OPT.OBJ/vfyserv ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/vfyserv'
cd modutil; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/modutil'
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/modutil.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/sectools -I../../../../dist/private/sectools -I../../../../dist/public/seccmd -I../../../../dist/public/nss -I../../../../dist/public/dbm -I../../../../dist/private/seccmd -I../../../../dist/private/nss -I../../../../dist/private/dbm  modutil.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/sectools -I../../../../dist/private/sectools -I../../../../dist/public/seccmd -I../../../../dist/public/nss -I../../../../dist/public/dbm -I../../../../dist/private/seccmd -I../../../../dist/private/nss -I../../../../dist/private/dbm  pk11.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/instsec.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/sectools -I../../../../dist/private/sectools -I../../../../dist/public/seccmd -I../../../../dist/public/nss -I../../../../dist/public/dbm -I../../../../dist/private/seccmd -I../../../../dist/private/nss -I../../../../dist/private/dbm  instsec.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/install.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/sectools -I../../../../dist/private/sectools -I../../../../dist/public/seccmd -I../../../../dist/public/nss -I../../../../dist/public/dbm -I../../../../dist/private/seccmd -I../../../../dist/private/nss -I../../../../dist/private/dbm  install.c
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/installparse.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/sectools -I../../../../dist/private/sectools -I../../../../dist/public/seccmd -I../../../../dist/public/nss -I../../../../dist/public/dbm -I../../../../dist/private/seccmd -I../../../../dist/private/nss -I../../../../dist/private/dbm  installparse.c
ytab.c: In function Pk11Install_yyparse:
ytab.c:219:5: warning: suggest parentheses around assignment used as truth value [-Wparentheses]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/install-ds.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/sectools -I../../../../dist/private/sectools -I../../../../dist/public/seccmd -I../../../../dist/public/nss -I../../../../dist/public/dbm -I../../../../dist/private/seccmd -I../../../../dist/private/nss -I../../../../dist/private/dbm  install-ds.c
install-ds.c: In function Pk11Install_File_Generate:
install-ds.c:223:40: warning: comparison with string literal results in unspecified behavior [-Waddress]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/lex.Pk11Install_yy.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/sectools -I../../../../dist/private/sectools -I../../../../dist/public/seccmd -I../../../../dist/public/nss -I../../../../dist/public/dbm -I../../../../dist/private/seccmd -I../../../../dist/private/nss -I../../../../dist/private/dbm  lex.Pk11Install_yy.c
lex.Pk11Install_yy.cpp:1060:13: warning: Pkcs11Install_yyunput defined but not used [-Wunused-function]
lex.Pk11Install_yy.cpp:1106:12: warning: input defined but not used [-Wunused-function]
gcc -o Linux3.6_x86_glibc_PTH_OPT.OBJ/modutil -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -m32 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/sectools -I../../../../dist/private/sectools -I../../../../dist/public/seccmd -I../../../../dist/public/nss -I../../../../dist/public/dbm -I../../../../dist/private/seccmd -I../../../../dist/private/nss -I../../../../dist/private/dbm  Linux3.6_x86_glibc_PTH_OPT.OBJ/modutil.o Linux3.6_x86_glibc_PTH_OPT.OBJ/pk11.o Linux3.6_x86_glibc_PTH_OPT.OBJ/instsec.o Linux3.6_x86_glibc_PTH_OPT.OBJ/install.o Linux3.6_x86_glibc_PTH_OPT.OBJ/installparse.o Linux3.6_x86_glibc_PTH_OPT.OBJ/install-ds.o Linux3.6_x86_glibc_PTH_OPT.OBJ/lex.Pk11Install_yy.o -m32 ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libjar.a ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc -lz
../../../coreconf/nsinstall/Linux3.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.6_x86_glibc_PTH_OPT.OBJ/modutil ../../../../dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd/modutil'
gmake[1]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/cmd'
TB [2012-11-28 10:56:01] NSS - build - 32 bits - OPT PASSED
TB [2012-11-28 10:56:01] ######## NSS - tests - 32 bits - OPT ########
TinderboxPrint:
TB [2012-11-28 10:56:01] $ cd /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests
TB [2012-11-28 10:56:01] $ ./all.sh
testdir is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security
init.sh init: Creating /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security
********************************************
   Platform: Linux3.6_x86_glibc_PTH_OPT.OBJ
   Results: buildnss02.1
********************************************

init.sh init: Testing PATH .:/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/bin:/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib:/bin:/usr/bin:/usr/lib64/ccache:/usr/local/bin:/usr/local/sbin:/usr/sbin:/home/tinderbox/.local/bin:/home/tinderbox/bin against LIB /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib:
Running tests for cipher
TIMESTAMP cipher BEGIN: Wed Nov 28 10:56:01 EST 2012
cipher.sh: Cipher Tests ===============================
cipher.sh: DES ECB Encrypt --------------------------------
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for des_ecb passed.
cipher.sh: #1: DES ECB Encrypt  - PASSED
cipher.sh: DES ECB Decrypt --------------------------------
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for des_ecb passed.
cipher.sh: #2: DES ECB Decrypt  - PASSED
cipher.sh: DES CBC Encrypt --------------------------------
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for des_cbc passed.
cipher.sh: #3: DES CBC Encrypt  - PASSED
cipher.sh: DES CBC Decrypt --------------------------------
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for des_cbc passed.
cipher.sh: #4: DES CBC Decrypt  - PASSED
cipher.sh: DES3 ECB Encrypt --------------------------------
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for des3_ecb passed.
cipher.sh: #5: DES3 ECB Encrypt  - PASSED
cipher.sh: DES3 ECB Decrypt --------------------------------
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for des3_ecb passed.
cipher.sh: #6: DES3 ECB Decrypt  - PASSED
cipher.sh: DES3 CBC Encrypt --------------------------------
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for des3_cbc passed.
cipher.sh: #7: DES3 CBC Encrypt  - PASSED
cipher.sh: DES3 CBC Decrypt --------------------------------
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for des3_cbc passed.
cipher.sh: #8: DES3 CBC Decrypt  - PASSED
cipher.sh: AES ECB Encrypt --------------------------------
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for aes_ecb passed.
cipher.sh: #9: AES ECB Encrypt  - PASSED
cipher.sh: AES ECB Decrypt --------------------------------
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for aes_ecb passed.
cipher.sh: #10: AES ECB Decrypt  - PASSED
cipher.sh: AES CBC Encrypt --------------------------------
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for aes_cbc passed.
cipher.sh: #11: AES CBC Encrypt  - PASSED
cipher.sh: AES CBC Decrypt --------------------------------
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for aes_cbc passed.
cipher.sh: #12: AES CBC Decrypt  - PASSED
cipher.sh: Camellia ECB Encrypt --------------------------------
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
cipher.sh: #13: Camellia ECB Encrypt  - PASSED
cipher.sh: Camellia ECB Decrypt --------------------------------
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
cipher.sh: #14: Camellia ECB Decrypt  - PASSED
cipher.sh: Camellia CBC Encrypt --------------------------------
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
cipher.sh: #15: Camellia CBC Encrypt  - PASSED
cipher.sh: Camellia CBC Decrypt --------------------------------
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
cipher.sh: #16: Camellia CBC Decrypt  - PASSED
cipher.sh: SEED ECB Encrypt --------------------------------
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for seed_ecb passed.
cipher.sh: #17: SEED ECB Encrypt  - PASSED
cipher.sh: SEED ECB Decrypt --------------------------------
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for seed_ecb passed.
cipher.sh: #18: SEED ECB Decrypt  - PASSED
cipher.sh: SEED CBC Encrypt --------------------------------
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for seed_cbc passed.
cipher.sh: #19: SEED CBC Encrypt  - PASSED
cipher.sh: SEED CBC Decrypt --------------------------------
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for seed_cbc passed.
cipher.sh: #20: SEED CBC Decrypt  - PASSED
cipher.sh: RC2 ECB Encrypt --------------------------------
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for rc2_ecb passed.
cipher.sh: #21: RC2 ECB Encrypt  - PASSED
cipher.sh: RC2 ECB Decrypt --------------------------------
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for rc2_ecb passed.
cipher.sh: #22: RC2 ECB Decrypt  - PASSED
cipher.sh: RC2 CBC Encrypt --------------------------------
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for rc2_cbc passed.
cipher.sh: #23: RC2 CBC Encrypt  - PASSED
cipher.sh: RC2 CBC Decrypt --------------------------------
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for rc2_cbc passed.
cipher.sh: #24: RC2 CBC Decrypt  - PASSED
cipher.sh: RC4 Encrypt --------------------------------
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
cipher.sh: #25: RC4 Encrypt  - PASSED
cipher.sh: RC4 Decrypt --------------------------------
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
cipher.sh: #26: RC4 Decrypt  - PASSED
cipher.sh: RSA Encrypt --------------------------------
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for rsa passed.
cipher.sh: #27: RSA Encrypt  - PASSED
cipher.sh: RSA Decrypt --------------------------------
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for rsa passed.
cipher.sh: #28: RSA Decrypt  - PASSED
cipher.sh: DSA Sign --------------------------------
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
cipher.sh: #29: DSA Sign  - PASSED
cipher.sh: DSA Verify --------------------------------
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
cipher.sh: #30: DSA Verify  - PASSED
cipher.sh: MD2 Hash --------------------------------
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Hash self-test for md2 passed.
cipher.sh: #31: MD2 Hash  - PASSED
cipher.sh: MD5 Hash --------------------------------
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Hash self-test for md5 passed.
cipher.sh: #32: MD5 Hash  - PASSED
cipher.sh: SHA1 Hash --------------------------------
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Hash self-test for sha1 passed.
cipher.sh: #33: SHA1 Hash  - PASSED
cipher.sh: SHA224 Hash --------------------------------
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
cipher.sh: #34: SHA224 Hash  - PASSED
cipher.sh: SHA256 Hash --------------------------------
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
cipher.sh: #35: SHA256 Hash  - PASSED
cipher.sh: SHA384 Hash --------------------------------
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
cipher.sh: #36: SHA384 Hash  - PASSED
cipher.sh: SHA512 Hash --------------------------------
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
cipher.sh: #37: SHA512 Hash  - PASSED
TIMESTAMP cipher END: Wed Nov 28 10:56:48 EST 2012
Running tests for lowhash
TIMESTAMP lowhash BEGIN: Wed Nov 28 10:56:48 EST 2012
lowhash.sh: Lowhash Tests ===============================
lowhashtest with fips mode=
lowhashtest MD5
lowhash.sh: #38: lowhashtest with fips mode= for MD5  - PASSED
lowhashtest SHA1
lowhash.sh: #39: lowhashtest with fips mode= for SHA1  - PASSED
lowhashtest SHA224
lowhash.sh: #40: lowhashtest with fips mode= for SHA224  - PASSED
lowhashtest SHA256
lowhash.sh: #41: lowhashtest with fips mode= for SHA256  - PASSED
lowhashtest SHA384
lowhash.sh: #42: lowhashtest with fips mode= for SHA384  - PASSED
lowhashtest SHA512
lowhash.sh: #43: lowhashtest with fips mode= for SHA512  - PASSED
lowhashtest with fips mode=
lowhashtest MD5
lowhash.sh: #44: lowhashtest with fips mode= for MD5  - PASSED
lowhashtest SHA1
lowhash.sh: #45: lowhashtest with fips mode= for SHA1  - PASSED
lowhashtest SHA224
lowhash.sh: #46: lowhashtest with fips mode= for SHA224  - PASSED
lowhashtest SHA256
lowhash.sh: #47: lowhashtest with fips mode= for SHA256  - PASSED
lowhashtest SHA384
lowhash.sh: #48: lowhashtest with fips mode= for SHA384  - PASSED
lowhashtest SHA512
lowhash.sh: #49: lowhashtest with fips mode= for SHA512  - PASSED
lowhash.sh done
TIMESTAMP lowhash END: Wed Nov 28 10:56:49 EST 2012
Running tests for libpkix
TIMESTAMP libpkix BEGIN: Wed Nov 28 10:56:49 EST 2012
TIMESTAMP libpkix END: Wed Nov 28 10:56:49 EST 2012
Running tests for cert
TIMESTAMP cert BEGIN: Wed Nov 28 10:56:49 EST 2012
cert.sh: Certutil and Crlutil Tests with ECC ===============================
cert.sh: #50: Looking for root certs module. - PASSED
cert.sh: Creating a CA Certificate TestCA ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/CA
cert.sh: Creating CA Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/CA -f ../tests.pw
cert.sh: #51: Creating CA Cert DB - PASSED
cert.sh: Loading root cert module to CA Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/CA

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #52: Loading root cert module to CA Cert DB - PASSED
cert.sh: Certificate initialized ----------
cert.sh: Creating CA Cert TestCA  --------------------------
certutil -s "CN=NSS Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA -t CTu,CTu,CTu -v 600 -x -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #53: Creating CA Cert TestCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n TestCA -r -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/CA -o root.cert
cert.sh: #54: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate serverCA ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/serverCA
cert.sh: Creating CA Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/serverCA -f ../tests.pw
cert.sh: #55: Creating CA Cert DB - PASSED
cert.sh: Loading root cert module to CA Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/serverCA

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #56: Loading root cert module to CA Cert DB - PASSED
cert.sh: Certificate initialized ----------
cert.sh: Creating CA Cert serverCA  --------------------------
certutil -s "CN=NSS Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA -t Cu,Cu,Cu -v 600 -x -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #57: Creating CA Cert serverCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n serverCA -r -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/serverCA -o root.cert
cert.sh: #58: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate chain-1-serverCA ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/serverCA
cert.sh: Creating CA Cert chain-1-serverCA  --------------------------
certutil -s "CN=NSS Chain1 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA -t u,u,u -v 600 -c serverCA -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #59: Creating CA Cert chain-1-serverCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n chain-1-serverCA -r -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/serverCA -o root.cert
cert.sh: #60: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate chain-2-serverCA ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/serverCA
cert.sh: Creating CA Cert chain-2-serverCA  --------------------------
certutil -s "CN=NSS Chain2 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA -t u,u,u -v 600 -c chain-1-serverCA -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #61: Creating CA Cert chain-2-serverCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n chain-2-serverCA -r -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/serverCA -o root.cert
cert.sh: #62: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate clientCA ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/clientCA
cert.sh: Creating CA Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/clientCA -f ../tests.pw
cert.sh: #63: Creating CA Cert DB - PASSED
cert.sh: Loading root cert module to CA Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/clientCA

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #64: Loading root cert module to CA Cert DB - PASSED
cert.sh: Certificate initialized ----------
cert.sh: Creating CA Cert clientCA  --------------------------
certutil -s "CN=NSS Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA -t Tu,Cu,Cu -v 600 -x -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #65: Creating CA Cert clientCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n clientCA -r -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/clientCA -o root.cert
cert.sh: #66: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate chain-1-clientCA ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/clientCA
cert.sh: Creating CA Cert chain-1-clientCA  --------------------------
certutil -s "CN=NSS Chain1 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA -t u,u,u -v 600 -c clientCA -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #67: Creating CA Cert chain-1-clientCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n chain-1-clientCA -r -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/clientCA -o root.cert
cert.sh: #68: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate chain-2-clientCA ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/clientCA
cert.sh: Creating CA Cert chain-2-clientCA  --------------------------
certutil -s "CN=NSS Chain2 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA -t u,u,u -v 600 -c chain-1-clientCA -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #69: Creating CA Cert chain-2-clientCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n chain-2-clientCA -r -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/clientCA -o root.cert
cert.sh: #70: Exporting Root Cert - PASSED
cert.sh: Creating an EC CA Certificate TestCA-ec ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/CA
cert.sh: Creating EC CA Cert TestCA-ec  --------------------------
certutil -s "CN=NSS Test CA (ECC), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-ec -k ec -q secp521r1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #71: Creating EC CA Cert TestCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n TestCA-ec -r -d . -o ecroot.cert
cert.sh: #72: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate serverCA-ec ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/serverCA
cert.sh: Creating EC CA Cert serverCA-ec  --------------------------
certutil -s "CN=NSS Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-ec -k ec -q secp521r1 -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #73: Creating EC CA Cert serverCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n serverCA-ec -r -d . -o ecroot.cert
cert.sh: #74: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate chain-1-serverCA-ec ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/serverCA
cert.sh: Creating EC CA Cert chain-1-serverCA-ec  --------------------------
certutil -s "CN=NSS Chain1 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #75: Creating EC CA Cert chain-1-serverCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n chain-1-serverCA-ec -r -d . -o ecroot.cert
cert.sh: #76: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate chain-2-serverCA-ec ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/serverCA
cert.sh: Creating EC CA Cert chain-2-serverCA-ec  --------------------------
certutil -s "CN=NSS Chain2 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #77: Creating EC CA Cert chain-2-serverCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n chain-2-serverCA-ec -r -d . -o ecroot.cert
cert.sh: #78: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate clientCA-ec ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/clientCA
cert.sh: Creating EC CA Cert clientCA-ec  --------------------------
certutil -s "CN=NSS Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-ec -k ec -q secp521r1 -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #79: Creating EC CA Cert clientCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n clientCA-ec -r -d . -o ecroot.cert
cert.sh: #80: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate chain-1-clientCA-ec ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/clientCA
cert.sh: Creating EC CA Cert chain-1-clientCA-ec  --------------------------
certutil -s "CN=NSS Chain1 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #81: Creating EC CA Cert chain-1-clientCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n chain-1-clientCA-ec -r -d . -o ecroot.cert
cert.sh: #82: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate chain-2-clientCA-ec ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/clientCA
cert.sh: Creating EC CA Cert chain-2-clientCA-ec  --------------------------
certutil -s "CN=NSS Chain2 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #83: Creating EC CA Cert chain-2-clientCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n chain-2-clientCA-ec -r -d . -o ecroot.cert
cert.sh: #84: Exporting EC Root Cert - PASSED
cert.sh: Creating Certificates, issued by the last ===============
     of a chain of CA's which are not in the same database============
Server Cert
cert.sh: Initializing buildnss02.usersys.redhat.com's Cert DB (ext.) --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/ext_server -f ../tests.pw
cert.sh: #85: Initializing buildnss02.usersys.redhat.com's Cert DB (ext.) - PASSED
cert.sh: Loading root cert module to buildnss02.usersys.redhat.com's Cert DB (ext.) --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/ext_server

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #86: Loading root cert module to buildnss02.usersys.redhat.com's Cert DB (ext.) - PASSED
cert.sh: Generate Cert Request for buildnss02.usersys.redhat.com (ext) --------------------------
certutil -s "CN=buildnss02.usersys.redhat.com, E=buildnss02.usersys.redhat.com@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/ext_server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #87: Generate Cert Request for buildnss02.usersys.redhat.com (ext) - PASSED
cert.sh: Sign buildnss02.usersys.redhat.com's Request (ext) --------------------------
certutil -C -c chain-2-serverCA -m 200 -v 60 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/serverCA -i req -o buildnss02.usersys.redhat.com.cert -f ../tests.pw
cert.sh: #88: Sign buildnss02.usersys.redhat.com's Request (ext) - PASSED
cert.sh: Import buildnss02.usersys.redhat.com's Cert  -t u,u,u (ext) --------------------------
certutil -A -n buildnss02.usersys.redhat.com -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/ext_server -f ../tests.pw -i buildnss02.usersys.redhat.com.cert
cert.sh: #89: Import buildnss02.usersys.redhat.com's Cert  -t u,u,u (ext) - PASSED
cert.sh: Import Client Root CA -t T,, for buildnss02.usersys.redhat.com (ext.) --------------------------
certutil -A -n clientCA -t T,, -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/ext_server -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/clientCA/clientCA.ca.cert
cert.sh: #90: Import Client Root CA -t T,, for buildnss02.usersys.redhat.com (ext.) - PASSED
cert.sh: Generate EC Cert Request for buildnss02.usersys.redhat.com (ext) --------------------------
certutil -s "CN=buildnss02.usersys.redhat.com, E=buildnss02.usersys.redhat.com-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #91: Generate EC Cert Request for buildnss02.usersys.redhat.com (ext) - PASSED
cert.sh: Sign buildnss02.usersys.redhat.com's EC Request (ext) --------------------------
certutil -C -c chain-2-serverCA-ec -m 200 -v 60 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/serverCA -i req -o buildnss02.usersys.redhat.com-ec.cert -f ../tests.pw
cert.sh: #92: Sign buildnss02.usersys.redhat.com's EC Request (ext) - PASSED
cert.sh: Import buildnss02.usersys.redhat.com's EC Cert  -t u,u,u (ext) --------------------------
certutil -A -n buildnss02.usersys.redhat.com-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/ext_server -f ../tests.pw -i buildnss02.usersys.redhat.com-ec.cert
cert.sh: #93: Import buildnss02.usersys.redhat.com's EC Cert  -t u,u,u (ext) - PASSED
cert.sh: Import Client EC Root CA -t T,, for buildnss02.usersys.redhat.com (ext.) --------------------------
certutil -A -n clientCA-ec -t T,, -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/ext_server -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/clientCA/clientCA-ec.ca.cert
cert.sh: #94: Import Client EC Root CA -t T,, for buildnss02.usersys.redhat.com (ext.) - PASSED
cert.sh: Generate mixed EC Cert Request for buildnss02.usersys.redhat.com (ext) --------------------------
certutil -s "CN=buildnss02.usersys.redhat.com, E=buildnss02.usersys.redhat.com-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #95: Generate mixed EC Cert Request for buildnss02.usersys.redhat.com (ext) - PASSED
cert.sh: Sign buildnss02.usersys.redhat.com's mixed EC Request (ext) --------------------------
certutil -C -c chain-2-serverCA -m 201 -v 60 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/serverCA -i req -o buildnss02.usersys.redhat.com-ecmixed.cert -f ../tests.pw
cert.sh: #96: Sign buildnss02.usersys.redhat.com's mixed EC Request (ext) - PASSED
cert.sh: Import buildnss02.usersys.redhat.com's mixed EC Cert  -t u,u,u (ext) --------------------------
certutil -A -n buildnss02.usersys.redhat.com-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/ext_server -f ../tests.pw -i buildnss02.usersys.redhat.com-ecmixed.cert
cert.sh: #97: Import buildnss02.usersys.redhat.com's mixed EC Cert  -t u,u,u (ext) - PASSED
Importing all the server's own CA chain into the servers DB
cert.sh: Import chain-2-serverCA-ec CA -t u,u,u for buildnss02.usersys.redhat.com (ext.)  --------------------------
certutil -A -n chain-2-serverCA-ec -t u,u,u -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/ext_server -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/serverCA/chain-2-serverCA-ec.ca.cert
cert.sh: #98: Import chain-2-serverCA-ec CA -t u,u,u for buildnss02.usersys.redhat.com (ext.)  - PASSED
cert.sh: Import chain-1-serverCA CA -t u,u,u for buildnss02.usersys.redhat.com (ext.)  --------------------------
certutil -A -n chain-1-serverCA -t u,u,u -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/ext_server -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/serverCA/chain-1-serverCA.ca.cert
cert.sh: #99: Import chain-1-serverCA CA -t u,u,u for buildnss02.usersys.redhat.com (ext.)  - PASSED
cert.sh: Import serverCA CA -t C,C,C for buildnss02.usersys.redhat.com (ext.)  --------------------------
certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/ext_server -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/serverCA/serverCA.ca.cert
cert.sh: #100: Import serverCA CA -t C,C,C for buildnss02.usersys.redhat.com (ext.)  - PASSED
cert.sh: Import chain-2-serverCA CA -t u,u,u for buildnss02.usersys.redhat.com (ext.)  --------------------------
certutil -A -n chain-2-serverCA -t u,u,u -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/ext_server -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/serverCA/chain-2-serverCA.ca.cert
cert.sh: #101: Import chain-2-serverCA CA -t u,u,u for buildnss02.usersys.redhat.com (ext.)  - PASSED
cert.sh: Import serverCA-ec CA -t C,C,C for buildnss02.usersys.redhat.com (ext.)  --------------------------
certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/ext_server -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/serverCA/serverCA-ec.ca.cert
cert.sh: #102: Import serverCA-ec CA -t C,C,C for buildnss02.usersys.redhat.com (ext.)  - PASSED
cert.sh: Import chain-1-serverCA-ec CA -t u,u,u for buildnss02.usersys.redhat.com (ext.)  --------------------------
certutil -A -n chain-1-serverCA-ec -t u,u,u -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/ext_server -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/serverCA/chain-1-serverCA-ec.ca.cert
cert.sh: #103: Import chain-1-serverCA-ec CA -t u,u,u for buildnss02.usersys.redhat.com (ext.)  - PASSED
Client Cert
cert.sh: Initializing ExtendedSSLUser's Cert DB (ext.) --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/ext_client -f ../tests.pw
cert.sh: #104: Initializing ExtendedSSLUser's Cert DB (ext.) - PASSED
cert.sh: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/ext_client

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #105: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) - PASSED
cert.sh: Generate Cert Request for ExtendedSSLUser (ext) --------------------------
certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/ext_client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #106: Generate Cert Request for ExtendedSSLUser (ext) - PASSED
cert.sh: Sign ExtendedSSLUser's Request (ext) --------------------------
certutil -C -c chain-2-clientCA -m 300 -v 60 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/clientCA -i req -o ExtendedSSLUser.cert -f ../tests.pw
cert.sh: #107: Sign ExtendedSSLUser's Request (ext) - PASSED
cert.sh: Import ExtendedSSLUser's Cert -t u,u,u (ext) --------------------------
certutil -A -n ExtendedSSLUser -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/ext_client -f ../tests.pw -i ExtendedSSLUser.cert
cert.sh: #108: Import ExtendedSSLUser's Cert -t u,u,u (ext) - PASSED
cert.sh: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) --------------------------
certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/ext_client -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/serverCA/serverCA.ca.cert
cert.sh: #109: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED
cert.sh: Generate EC Cert Request for ExtendedSSLUser (ext) --------------------------
certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #110: Generate EC Cert Request for ExtendedSSLUser (ext) - PASSED
cert.sh: Sign ExtendedSSLUser's EC Request (ext) --------------------------
certutil -C -c chain-2-clientCA-ec -m 300 -v 60 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/clientCA -i req -o ExtendedSSLUser-ec.cert -f ../tests.pw
cert.sh: #111: Sign ExtendedSSLUser's EC Request (ext) - PASSED
cert.sh: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) --------------------------
certutil -A -n ExtendedSSLUser-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/ext_client -f ../tests.pw -i ExtendedSSLUser-ec.cert
cert.sh: #112: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) - PASSED
cert.sh: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) --------------------------
certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/ext_client -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/serverCA/serverCA-ec.ca.cert
cert.sh: #113: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED
cert.sh: Generate mixed EC Cert Request for ExtendedSSLUser (ext) --------------------------
certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #114: Generate mixed EC Cert Request for ExtendedSSLUser (ext) - PASSED
cert.sh: Sign ExtendedSSLUser's mixed EC Request (ext) --------------------------
certutil -C -c chain-2-clientCA -m 301 -v 60 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/clientCA -i req -o ExtendedSSLUser-ecmixed.cert -f ../tests.pw
cert.sh: #115: Sign ExtendedSSLUser's mixed EC Request (ext) - PASSED
cert.sh: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) --------------------------
certutil -A -n ExtendedSSLUser-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/ext_client -f ../tests.pw -i ExtendedSSLUser-ecmixed.cert
cert.sh: #116: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) - PASSED
Importing all the client's own CA chain into the servers DB
cert.sh: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) --------------------------
certutil -A -n chain-2-clientCA-ec -t u,u,u -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/ext_client -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/clientCA/chain-2-clientCA-ec.ca.cert
cert.sh: #117: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) --------------------------
certutil -A -n clientCA -t T,C,C -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/ext_client -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/clientCA/clientCA.ca.cert
cert.sh: #118: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) --------------------------
certutil -A -n chain-2-clientCA -t u,u,u -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/ext_client -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/clientCA/chain-2-clientCA.ca.cert
cert.sh: #119: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) --------------------------
certutil -A -n clientCA-ec -t T,C,C -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/ext_client -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/clientCA/clientCA-ec.ca.cert
cert.sh: #120: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) --------------------------
certutil -A -n chain-1-clientCA-ec -t u,u,u -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/ext_client -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/clientCA/chain-1-clientCA-ec.ca.cert
cert.sh: #121: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) --------------------------
certutil -A -n chain-1-clientCA -t u,u,u -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/ext_client -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/clientCA/chain-1-clientCA.ca.cert
cert.sh: #122: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED
cert.sh SUCCESS: EXT passed
cert.sh: Creating Client CA Issued Certificates ===============
cert.sh: Initializing TestUser's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw
cert.sh: #123: Initializing TestUser's Cert DB - PASSED
cert.sh: Loading root cert module to TestUser's Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #124: Loading root cert module to TestUser's Cert DB - PASSED
cert.sh: Import Root CA for TestUser --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -i ../CA/TestCA.ca.cert
cert.sh: #125: Import Root CA for TestUser - PASSED
cert.sh: Import EC Root CA for TestUser --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -i ../CA/TestCA-ec.ca.cert
cert.sh: #126: Import EC Root CA for TestUser - PASSED
cert.sh: Generate Cert Request for TestUser --------------------------
certutil -s "CN=TestUser, E=TestUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #127: Generate Cert Request for TestUser - PASSED
cert.sh: Sign TestUser's Request --------------------------
certutil -C -c TestCA -m 70 -v 60 -d ../CA -i req -o TestUser.cert -f ../tests.pw 
cert.sh: #128: Sign TestUser's Request - PASSED
cert.sh: Import TestUser's Cert --------------------------
certutil -A -n TestUser -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser.cert
cert.sh: #129: Import TestUser's Cert - PASSED
cert.sh SUCCESS: TestUser's Cert Created
cert.sh: Generate EC Cert Request for TestUser --------------------------
certutil -s "CN=TestUser, E=TestUser-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #130: Generate EC Cert Request for TestUser - PASSED
cert.sh: Sign TestUser's EC Request --------------------------
certutil -C -c TestCA-ec -m 70 -v 60 -d ../CA -i req -o TestUser-ec.cert -f ../tests.pw 
cert.sh: #131: Sign TestUser's EC Request - PASSED
cert.sh: Import TestUser's EC Cert --------------------------
certutil -A -n TestUser-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser-ec.cert
cert.sh: #132: Import TestUser's EC Cert - PASSED
cert.sh SUCCESS: TestUser's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser --------------------------
certutil -s "CN=TestUser, E=TestUser-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #133: Generate mixed EC Cert Request for TestUser - PASSED
cert.sh: Sign TestUser's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10070 -v 60 -d ../CA -i req -o TestUser-ecmixed.cert -f ../tests.pw 
cert.sh: #134: Sign TestUser's EC Request with RSA - PASSED
cert.sh: Import TestUser's mixed EC Cert --------------------------
certutil -A -n TestUser-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser-ecmixed.cert
cert.sh: #135: Import TestUser's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser's mixed EC Cert Created
cert.sh: Creating Server CA Issued Certificate for \
             buildnss02.usersys.redhat.com ------------------------------------
cert.sh: Initializing buildnss02.usersys.redhat.com's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/server -f ../tests.pw
cert.sh: #136: Initializing buildnss02.usersys.redhat.com's Cert DB - PASSED
cert.sh: Loading root cert module to buildnss02.usersys.redhat.com's Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/server

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #137: Loading root cert module to buildnss02.usersys.redhat.com's Cert DB - PASSED
cert.sh: Import Root CA for buildnss02.usersys.redhat.com --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/server -i ../CA/TestCA.ca.cert
cert.sh: #138: Import Root CA for buildnss02.usersys.redhat.com - PASSED
cert.sh: Import EC Root CA for buildnss02.usersys.redhat.com --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/server -i ../CA/TestCA-ec.ca.cert
cert.sh: #139: Import EC Root CA for buildnss02.usersys.redhat.com - PASSED
cert.sh: Generate Cert Request for buildnss02.usersys.redhat.com --------------------------
certutil -s "CN=buildnss02.usersys.redhat.com, E=buildnss02.usersys.redhat.com@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #140: Generate Cert Request for buildnss02.usersys.redhat.com - PASSED
cert.sh: Sign buildnss02.usersys.redhat.com's Request --------------------------
certutil -C -c TestCA -m 100 -v 60 -d ../CA -i req -o buildnss02.usersys.redhat.com.cert -f ../tests.pw 
cert.sh: #141: Sign buildnss02.usersys.redhat.com's Request - PASSED
cert.sh: Import buildnss02.usersys.redhat.com's Cert --------------------------
certutil -A -n buildnss02.usersys.redhat.com -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/server -f ../tests.pw -i buildnss02.usersys.redhat.com.cert
cert.sh: #142: Import buildnss02.usersys.redhat.com's Cert - PASSED
cert.sh SUCCESS: buildnss02.usersys.redhat.com's Cert Created
cert.sh: Generate EC Cert Request for buildnss02.usersys.redhat.com --------------------------
certutil -s "CN=buildnss02.usersys.redhat.com, E=buildnss02.usersys.redhat.com-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #143: Generate EC Cert Request for buildnss02.usersys.redhat.com - PASSED
cert.sh: Sign buildnss02.usersys.redhat.com's EC Request --------------------------
certutil -C -c TestCA-ec -m 100 -v 60 -d ../CA -i req -o buildnss02.usersys.redhat.com-ec.cert -f ../tests.pw 
cert.sh: #144: Sign buildnss02.usersys.redhat.com's EC Request - PASSED
cert.sh: Import buildnss02.usersys.redhat.com's EC Cert --------------------------
certutil -A -n buildnss02.usersys.redhat.com-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/server -f ../tests.pw -i buildnss02.usersys.redhat.com-ec.cert
cert.sh: #145: Import buildnss02.usersys.redhat.com's EC Cert - PASSED
cert.sh SUCCESS: buildnss02.usersys.redhat.com's EC Cert Created
cert.sh: Generate mixed EC Cert Request for buildnss02.usersys.redhat.com --------------------------
certutil -s "CN=buildnss02.usersys.redhat.com, E=buildnss02.usersys.redhat.com-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #146: Generate mixed EC Cert Request for buildnss02.usersys.redhat.com - PASSED
cert.sh: Sign buildnss02.usersys.redhat.com's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10100 -v 60 -d ../CA -i req -o buildnss02.usersys.redhat.com-ecmixed.cert -f ../tests.pw 
cert.sh: #147: Sign buildnss02.usersys.redhat.com's EC Request with RSA - PASSED
cert.sh: Import buildnss02.usersys.redhat.com's mixed EC Cert --------------------------
certutil -A -n buildnss02.usersys.redhat.com-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/server -f ../tests.pw -i buildnss02.usersys.redhat.com-ecmixed.cert
cert.sh: #148: Import buildnss02.usersys.redhat.com's mixed EC Cert - PASSED
cert.sh SUCCESS: buildnss02.usersys.redhat.com's mixed EC Cert Created
cert.sh: Creating Server CA Issued Certificate for \
             buildnss02.usersys.redhat.com-sni --------------------------------
cert.sh: Generate Cert Request for buildnss02-sni.usersys.redhat.com --------------------------
certutil -s "CN=buildnss02-sni.usersys.redhat.com, E=buildnss02-sni.usersys.redhat.com@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #149: Generate Cert Request for buildnss02-sni.usersys.redhat.com - PASSED
cert.sh: Sign buildnss02-sni.usersys.redhat.com's Request --------------------------
certutil -C -c TestCA -m 101 -v 60 -d ../CA -i req -o buildnss02-sni.usersys.redhat.com.cert -f ../tests.pw 
cert.sh: #150: Sign buildnss02-sni.usersys.redhat.com's Request - PASSED
cert.sh: Import buildnss02-sni.usersys.redhat.com's Cert --------------------------
certutil -A -n buildnss02-sni.usersys.redhat.com -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/server -f ../tests.pw -i buildnss02-sni.usersys.redhat.com.cert
cert.sh: #151: Import buildnss02-sni.usersys.redhat.com's Cert - PASSED
cert.sh SUCCESS: buildnss02-sni.usersys.redhat.com's Cert Created
cert.sh: Generate EC Cert Request for buildnss02-sni.usersys.redhat.com --------------------------
certutil -s "CN=buildnss02-sni.usersys.redhat.com, E=buildnss02-sni.usersys.redhat.com-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #152: Generate EC Cert Request for buildnss02-sni.usersys.redhat.com - PASSED
cert.sh: Sign buildnss02-sni.usersys.redhat.com's EC Request --------------------------
certutil -C -c TestCA-ec -m 101 -v 60 -d ../CA -i req -o buildnss02-sni.usersys.redhat.com-ec.cert -f ../tests.pw 
cert.sh: #153: Sign buildnss02-sni.usersys.redhat.com's EC Request - PASSED
cert.sh: Import buildnss02-sni.usersys.redhat.com's EC Cert --------------------------
certutil -A -n buildnss02-sni.usersys.redhat.com-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/server -f ../tests.pw -i buildnss02-sni.usersys.redhat.com-ec.cert
cert.sh: #154: Import buildnss02-sni.usersys.redhat.com's EC Cert - PASSED
cert.sh SUCCESS: buildnss02-sni.usersys.redhat.com's EC Cert Created
cert.sh: Generate mixed EC Cert Request for buildnss02-sni.usersys.redhat.com --------------------------
certutil -s "CN=buildnss02-sni.usersys.redhat.com, E=buildnss02-sni.usersys.redhat.com-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #155: Generate mixed EC Cert Request for buildnss02-sni.usersys.redhat.com - PASSED
cert.sh: Sign buildnss02-sni.usersys.redhat.com's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10101 -v 60 -d ../CA -i req -o buildnss02-sni.usersys.redhat.com-ecmixed.cert -f ../tests.pw 
cert.sh: #156: Sign buildnss02-sni.usersys.redhat.com's EC Request with RSA - PASSED
cert.sh: Import buildnss02-sni.usersys.redhat.com's mixed EC Cert --------------------------
certutil -A -n buildnss02-sni.usersys.redhat.com-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/server -f ../tests.pw -i buildnss02-sni.usersys.redhat.com-ecmixed.cert
cert.sh: #157: Import buildnss02-sni.usersys.redhat.com's mixed EC Cert - PASSED
cert.sh SUCCESS: buildnss02-sni.usersys.redhat.com's mixed EC Cert Created
cert.sh: Modify trust attributes of Root CA -t TC,TC,TC --------------------------
certutil -M -n TestCA -t TC,TC,TC -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/server -f ../tests.pw
cert.sh: #158: Modify trust attributes of Root CA -t TC,TC,TC - PASSED
cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC --------------------------
certutil -M -n TestCA-ec -t TC,TC,TC -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/server -f ../tests.pw
cert.sh: #159: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED
cert.sh SUCCESS: SSL passed
cert.sh: Creating Client CA Issued Certificates ==============
cert.sh: Initializing Alice's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/alicedir -f ../tests.pw
cert.sh: #160: Initializing Alice's Cert DB - PASSED
cert.sh: Loading root cert module to Alice's Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/alicedir

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #161: Loading root cert module to Alice's Cert DB - PASSED
cert.sh: Import Root CA for Alice --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/alicedir -i ../CA/TestCA.ca.cert
cert.sh: #162: Import Root CA for Alice - PASSED
cert.sh: Import EC Root CA for Alice --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/alicedir -i ../CA/TestCA-ec.ca.cert
cert.sh: #163: Import EC Root CA for Alice - PASSED
cert.sh: Generate Cert Request for Alice --------------------------
certutil -s "CN=Alice, E=Alice@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/alicedir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #164: Generate Cert Request for Alice - PASSED
cert.sh: Sign Alice's Request --------------------------
certutil -C -c TestCA -m 30 -v 60 -d ../CA -i req -o Alice.cert -f ../tests.pw 
cert.sh: #165: Sign Alice's Request - PASSED
cert.sh: Import Alice's Cert --------------------------
certutil -A -n Alice -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/alicedir -f ../tests.pw -i Alice.cert
cert.sh: #166: Import Alice's Cert - PASSED
cert.sh SUCCESS: Alice's Cert Created
cert.sh: Generate EC Cert Request for Alice --------------------------
certutil -s "CN=Alice, E=Alice-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/alicedir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #167: Generate EC Cert Request for Alice - PASSED
cert.sh: Sign Alice's EC Request --------------------------
certutil -C -c TestCA-ec -m 30 -v 60 -d ../CA -i req -o Alice-ec.cert -f ../tests.pw 
cert.sh: #168: Sign Alice's EC Request - PASSED
cert.sh: Import Alice's EC Cert --------------------------
certutil -A -n Alice-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/alicedir -f ../tests.pw -i Alice-ec.cert
cert.sh: #169: Import Alice's EC Cert - PASSED
cert.sh SUCCESS: Alice's EC Cert Created
cert.sh: Generate mixed EC Cert Request for Alice --------------------------
certutil -s "CN=Alice, E=Alice-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/alicedir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #170: Generate mixed EC Cert Request for Alice - PASSED
cert.sh: Sign Alice's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10030 -v 60 -d ../CA -i req -o Alice-ecmixed.cert -f ../tests.pw 
cert.sh: #171: Sign Alice's EC Request with RSA - PASSED
cert.sh: Import Alice's mixed EC Cert --------------------------
certutil -A -n Alice-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/alicedir -f ../tests.pw -i Alice-ecmixed.cert
cert.sh: #172: Import Alice's mixed EC Cert - PASSED
cert.sh SUCCESS: Alice's mixed EC Cert Created
cert.sh: Initializing Bob's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/bobdir -f ../tests.pw
cert.sh: #173: Initializing Bob's Cert DB - PASSED
cert.sh: Loading root cert module to Bob's Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/bobdir

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #174: Loading root cert module to Bob's Cert DB - PASSED
cert.sh: Import Root CA for Bob --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/bobdir -i ../CA/TestCA.ca.cert
cert.sh: #175: Import Root CA for Bob - PASSED
cert.sh: Import EC Root CA for Bob --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/bobdir -i ../CA/TestCA-ec.ca.cert
cert.sh: #176: Import EC Root CA for Bob - PASSED
cert.sh: Generate Cert Request for Bob --------------------------
certutil -s "CN=Bob, E=Bob@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/bobdir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #177: Generate Cert Request for Bob - PASSED
cert.sh: Sign Bob's Request --------------------------
certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o Bob.cert -f ../tests.pw 
cert.sh: #178: Sign Bob's Request - PASSED
cert.sh: Import Bob's Cert --------------------------
certutil -A -n Bob -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/bobdir -f ../tests.pw -i Bob.cert
cert.sh: #179: Import Bob's Cert - PASSED
cert.sh SUCCESS: Bob's Cert Created
cert.sh: Generate EC Cert Request for Bob --------------------------
certutil -s "CN=Bob, E=Bob-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/bobdir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #180: Generate EC Cert Request for Bob - PASSED
cert.sh: Sign Bob's EC Request --------------------------
certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o Bob-ec.cert -f ../tests.pw 
cert.sh: #181: Sign Bob's EC Request - PASSED
cert.sh: Import Bob's EC Cert --------------------------
certutil -A -n Bob-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/bobdir -f ../tests.pw -i Bob-ec.cert
cert.sh: #182: Import Bob's EC Cert - PASSED
cert.sh SUCCESS: Bob's EC Cert Created
cert.sh: Generate mixed EC Cert Request for Bob --------------------------
certutil -s "CN=Bob, E=Bob-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/bobdir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #183: Generate mixed EC Cert Request for Bob - PASSED
cert.sh: Sign Bob's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o Bob-ecmixed.cert -f ../tests.pw 
cert.sh: #184: Sign Bob's EC Request with RSA - PASSED
cert.sh: Import Bob's mixed EC Cert --------------------------
certutil -A -n Bob-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/bobdir -f ../tests.pw -i Bob-ecmixed.cert
cert.sh: #185: Import Bob's mixed EC Cert - PASSED
cert.sh SUCCESS: Bob's mixed EC Cert Created
cert.sh: Creating Dave's Certificate -------------------------
cert.sh: Initializing Dave's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/dave -f ../tests.pw
cert.sh: #186: Initializing Dave's Cert DB - PASSED
cert.sh: Loading root cert module to Dave's Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/dave

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #187: Loading root cert module to Dave's Cert DB - PASSED
cert.sh: Import Root CA for Dave --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/dave -i ../CA/TestCA.ca.cert
cert.sh: #188: Import Root CA for Dave - PASSED
cert.sh: Import EC Root CA for Dave --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/dave -i ../CA/TestCA-ec.ca.cert
cert.sh: #189: Import EC Root CA for Dave - PASSED
cert.sh: Generate Cert Request for Dave --------------------------
certutil -s "CN=Dave, E=Dave@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/dave -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #190: Generate Cert Request for Dave - PASSED
cert.sh: Sign Dave's Request --------------------------
certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o Dave.cert -f ../tests.pw 
cert.sh: #191: Sign Dave's Request - PASSED
cert.sh: Import Dave's Cert --------------------------
certutil -A -n Dave -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/dave -f ../tests.pw -i Dave.cert
cert.sh: #192: Import Dave's Cert - PASSED
cert.sh SUCCESS: Dave's Cert Created
cert.sh: Generate EC Cert Request for Dave --------------------------
certutil -s "CN=Dave, E=Dave-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/dave -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #193: Generate EC Cert Request for Dave - PASSED
cert.sh: Sign Dave's EC Request --------------------------
certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o Dave-ec.cert -f ../tests.pw 
cert.sh: #194: Sign Dave's EC Request - PASSED
cert.sh: Import Dave's EC Cert --------------------------
certutil -A -n Dave-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/dave -f ../tests.pw -i Dave-ec.cert
cert.sh: #195: Import Dave's EC Cert - PASSED
cert.sh SUCCESS: Dave's EC Cert Created
cert.sh: Generate mixed EC Cert Request for Dave --------------------------
certutil -s "CN=Dave, E=Dave-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/dave -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #196: Generate mixed EC Cert Request for Dave - PASSED
cert.sh: Sign Dave's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o Dave-ecmixed.cert -f ../tests.pw 
cert.sh: #197: Sign Dave's EC Request with RSA - PASSED
cert.sh: Import Dave's mixed EC Cert --------------------------
certutil -A -n Dave-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/dave -f ../tests.pw -i Dave-ecmixed.cert
cert.sh: #198: Import Dave's mixed EC Cert - PASSED
cert.sh SUCCESS: Dave's mixed EC Cert Created
cert.sh: Creating multiEmail's Certificate --------------------
cert.sh: Initializing Eve's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eve -f ../tests.pw
cert.sh: #199: Initializing Eve's Cert DB - PASSED
cert.sh: Loading root cert module to Eve's Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eve

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #200: Loading root cert module to Eve's Cert DB - PASSED
cert.sh: Import Root CA for Eve --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eve -i ../CA/TestCA.ca.cert
cert.sh: #201: Import Root CA for Eve - PASSED
cert.sh: Import EC Root CA for Eve --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eve -i ../CA/TestCA-ec.ca.cert
cert.sh: #202: Import EC Root CA for Eve - PASSED
cert.sh: Generate Cert Request for Eve --------------------------
certutil -s "CN=Eve, E=Eve@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eve -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #203: Generate Cert Request for Eve - PASSED
cert.sh: Sign Eve's Request --------------------------
certutil -C -c TestCA -m 60 -v 60 -d ../CA -i req -o Eve.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com
cert.sh: #204: Sign Eve's Request - PASSED
cert.sh: Import Eve's Cert --------------------------
certutil -A -n Eve -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eve -f ../tests.pw -i Eve.cert
cert.sh: #205: Import Eve's Cert - PASSED
cert.sh SUCCESS: Eve's Cert Created
cert.sh: Generate EC Cert Request for Eve --------------------------
certutil -s "CN=Eve, E=Eve-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eve -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #206: Generate EC Cert Request for Eve - PASSED
cert.sh: Sign Eve's EC Request --------------------------
certutil -C -c TestCA-ec -m 60 -v 60 -d ../CA -i req -o Eve-ec.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com
cert.sh: #207: Sign Eve's EC Request - PASSED
cert.sh: Import Eve's EC Cert --------------------------
certutil -A -n Eve-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eve -f ../tests.pw -i Eve-ec.cert
cert.sh: #208: Import Eve's EC Cert - PASSED
cert.sh SUCCESS: Eve's EC Cert Created
cert.sh: Generate mixed EC Cert Request for Eve --------------------------
certutil -s "CN=Eve, E=Eve-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eve -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #209: Generate mixed EC Cert Request for Eve - PASSED
cert.sh: Sign Eve's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10060 -v 60 -d ../CA -i req -o Eve-ecmixed.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com
cert.sh: #210: Sign Eve's EC Request with RSA - PASSED
cert.sh: Import Eve's mixed EC Cert --------------------------
certutil -A -n Eve-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eve -f ../tests.pw -i Eve-ecmixed.cert
cert.sh: #211: Import Eve's mixed EC Cert - PASSED
cert.sh SUCCESS: Eve's mixed EC Cert Created
cert.sh: Importing Certificates ==============================
cert.sh: Import Bob's cert into Alice's db --------------------------
certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob.cert
cert.sh: #212: Import Bob's cert into Alice's db - PASSED
cert.sh: Import Dave's cert into Alice's DB --------------------------
certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave.cert
cert.sh: #213: Import Dave's cert into Alice's DB - PASSED
cert.sh: Import Dave's cert into Bob's DB --------------------------
certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave.cert
cert.sh: #214: Import Dave's cert into Bob's DB - PASSED
cert.sh: Import Eve's cert into Alice's DB --------------------------
certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../eve/Eve.cert
cert.sh: #215: Import Eve's cert into Alice's DB - PASSED
cert.sh: Import Eve's cert into Bob's DB --------------------------
certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../eve/Eve.cert
cert.sh: #216: Import Eve's cert into Bob's DB - PASSED
cert.sh: Importing EC Certificates ==============================
cert.sh: Import Bob's EC cert into Alice's db --------------------------
certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob-ec.cert
cert.sh: #217: Import Bob's EC cert into Alice's db - PASSED
cert.sh: Import Dave's EC cert into Alice's DB --------------------------
certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave-ec.cert
cert.sh: #218: Import Dave's EC cert into Alice's DB - PASSED
cert.sh: Import Dave's EC cert into Bob's DB --------------------------
certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave-ec.cert
cert.sh: #219: Import Dave's EC cert into Bob's DB - PASSED
cert.sh SUCCESS: SMIME passed
cert.sh: Creating FIPS 140 DSA Certificates ==============
cert.sh: Initializing FIPS PUB 140 Test Certificate's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/fips -f ../tests.fipspw
cert.sh: #220: Initializing FIPS PUB 140 Test Certificate's Cert DB - PASSED
cert.sh: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/fips

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #221: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) - PASSED
cert.sh: Enable FIPS mode on database -----------------------
modutil -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/fips -fips true 

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
FIPS mode enabled.
cert.sh: #222: Enable FIPS mode on database for FIPS PUB 140 Test Certificate - PASSED
cert.sh: Generate Certificate for FIPS PUB 140 Test Certificate --------------------------
certutil -s "CN=FIPS PUB 140 Test Certificate, E=fips@bogus.com, O=BOGUS NSS, OU=FIPS PUB 140, L=Mountain View, ST=California, C=US" -S -n FIPS_PUB_140_Test_Certificate -x -t Cu,Cu,Cu -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/fips -f ../tests.fipspw -k dsa -v 600 -m 500 -z ../tests_noise


Generating key.  This may take a few moments...

cert.sh: #223: Generate Certificate for FIPS PUB 140 Test Certificate - PASSED
cert.sh SUCCESS: FIPS passed
cert.sh: Creating Server CA Issued Certificate for 
             EC Curves Test Certificates ------------------------------------
cert.sh: Initializing EC Curve's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw
cert.sh: #224: Initializing EC Curve's Cert DB - PASSED
cert.sh: Loading root cert module to EC Curve's Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #225: Loading root cert module to EC Curve's Cert DB - PASSED
cert.sh: Import EC Root CA for EC Curves Test Certificates --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -i ../CA/TestCA-ec.ca.cert
cert.sh: #226: Import EC Root CA for EC Curves Test Certificates - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb163v1 --------------------------
certutil -s "CN=Curve-c2pnb163v1, E=Curve-c2pnb163v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb163v1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #227: Generate EC Cert Request for Curve-c2pnb163v1 - PASSED
cert.sh: Sign Curve-c2pnb163v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2001 -v 60 -d ../CA -i req -o Curve-c2pnb163v1-ec.cert -f ../tests.pw 
cert.sh: #228: Sign Curve-c2pnb163v1's EC Request - PASSED
cert.sh: Import Curve-c2pnb163v1's EC Cert --------------------------
certutil -A -n Curve-c2pnb163v1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-c2pnb163v1-ec.cert
cert.sh: #229: Import Curve-c2pnb163v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb163v2 --------------------------
certutil -s "CN=Curve-c2pnb163v2, E=Curve-c2pnb163v2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb163v2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #230: Generate EC Cert Request for Curve-c2pnb163v2 - PASSED
cert.sh: Sign Curve-c2pnb163v2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2002 -v 60 -d ../CA -i req -o Curve-c2pnb163v2-ec.cert -f ../tests.pw 
cert.sh: #231: Sign Curve-c2pnb163v2's EC Request - PASSED
cert.sh: Import Curve-c2pnb163v2's EC Cert --------------------------
certutil -A -n Curve-c2pnb163v2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-c2pnb163v2-ec.cert
cert.sh: #232: Import Curve-c2pnb163v2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb163v3 --------------------------
certutil -s "CN=Curve-c2pnb163v3, E=Curve-c2pnb163v3-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb163v3 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #233: Generate EC Cert Request for Curve-c2pnb163v3 - PASSED
cert.sh: Sign Curve-c2pnb163v3's EC Request --------------------------
certutil -C -c TestCA-ec -m 2003 -v 60 -d ../CA -i req -o Curve-c2pnb163v3-ec.cert -f ../tests.pw 
cert.sh: #234: Sign Curve-c2pnb163v3's EC Request - PASSED
cert.sh: Import Curve-c2pnb163v3's EC Cert --------------------------
certutil -A -n Curve-c2pnb163v3-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-c2pnb163v3-ec.cert
cert.sh: #235: Import Curve-c2pnb163v3's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb176v1 --------------------------
certutil -s "CN=Curve-c2pnb176v1, E=Curve-c2pnb176v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb176v1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #236: Generate EC Cert Request for Curve-c2pnb176v1 - PASSED
cert.sh: Sign Curve-c2pnb176v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2004 -v 60 -d ../CA -i req -o Curve-c2pnb176v1-ec.cert -f ../tests.pw 
cert.sh: #237: Sign Curve-c2pnb176v1's EC Request - PASSED
cert.sh: Import Curve-c2pnb176v1's EC Cert --------------------------
certutil -A -n Curve-c2pnb176v1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-c2pnb176v1-ec.cert
cert.sh: #238: Import Curve-c2pnb176v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb208w1 --------------------------
certutil -s "CN=Curve-c2pnb208w1, E=Curve-c2pnb208w1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb208w1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #239: Generate EC Cert Request for Curve-c2pnb208w1 - PASSED
cert.sh: Sign Curve-c2pnb208w1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2005 -v 60 -d ../CA -i req -o Curve-c2pnb208w1-ec.cert -f ../tests.pw 
cert.sh: #240: Sign Curve-c2pnb208w1's EC Request - PASSED
cert.sh: Import Curve-c2pnb208w1's EC Cert --------------------------
certutil -A -n Curve-c2pnb208w1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-c2pnb208w1-ec.cert
cert.sh: #241: Import Curve-c2pnb208w1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb272w1 --------------------------
certutil -s "CN=Curve-c2pnb272w1, E=Curve-c2pnb272w1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb272w1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #242: Generate EC Cert Request for Curve-c2pnb272w1 - PASSED
cert.sh: Sign Curve-c2pnb272w1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2006 -v 60 -d ../CA -i req -o Curve-c2pnb272w1-ec.cert -f ../tests.pw 
cert.sh: #243: Sign Curve-c2pnb272w1's EC Request - PASSED
cert.sh: Import Curve-c2pnb272w1's EC Cert --------------------------
certutil -A -n Curve-c2pnb272w1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-c2pnb272w1-ec.cert
cert.sh: #244: Import Curve-c2pnb272w1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb304w1 --------------------------
certutil -s "CN=Curve-c2pnb304w1, E=Curve-c2pnb304w1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb304w1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #245: Generate EC Cert Request for Curve-c2pnb304w1 - PASSED
cert.sh: Sign Curve-c2pnb304w1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2007 -v 60 -d ../CA -i req -o Curve-c2pnb304w1-ec.cert -f ../tests.pw 
cert.sh: #246: Sign Curve-c2pnb304w1's EC Request - PASSED
cert.sh: Import Curve-c2pnb304w1's EC Cert --------------------------
certutil -A -n Curve-c2pnb304w1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-c2pnb304w1-ec.cert
cert.sh: #247: Import Curve-c2pnb304w1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb368w1 --------------------------
certutil -s "CN=Curve-c2pnb368w1, E=Curve-c2pnb368w1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb368w1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #248: Generate EC Cert Request for Curve-c2pnb368w1 - PASSED
cert.sh: Sign Curve-c2pnb368w1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2008 -v 60 -d ../CA -i req -o Curve-c2pnb368w1-ec.cert -f ../tests.pw 
cert.sh: #249: Sign Curve-c2pnb368w1's EC Request - PASSED
cert.sh: Import Curve-c2pnb368w1's EC Cert --------------------------
certutil -A -n Curve-c2pnb368w1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-c2pnb368w1-ec.cert
cert.sh: #250: Import Curve-c2pnb368w1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb191v1 --------------------------
certutil -s "CN=Curve-c2tnb191v1, E=Curve-c2tnb191v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb191v1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #251: Generate EC Cert Request for Curve-c2tnb191v1 - PASSED
cert.sh: Sign Curve-c2tnb191v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2009 -v 60 -d ../CA -i req -o Curve-c2tnb191v1-ec.cert -f ../tests.pw 
cert.sh: #252: Sign Curve-c2tnb191v1's EC Request - PASSED
cert.sh: Import Curve-c2tnb191v1's EC Cert --------------------------
certutil -A -n Curve-c2tnb191v1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-c2tnb191v1-ec.cert
cert.sh: #253: Import Curve-c2tnb191v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb191v2 --------------------------
certutil -s "CN=Curve-c2tnb191v2, E=Curve-c2tnb191v2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb191v2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #254: Generate EC Cert Request for Curve-c2tnb191v2 - PASSED
cert.sh: Sign Curve-c2tnb191v2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2010 -v 60 -d ../CA -i req -o Curve-c2tnb191v2-ec.cert -f ../tests.pw 
cert.sh: #255: Sign Curve-c2tnb191v2's EC Request - PASSED
cert.sh: Import Curve-c2tnb191v2's EC Cert --------------------------
certutil -A -n Curve-c2tnb191v2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-c2tnb191v2-ec.cert
cert.sh: #256: Import Curve-c2tnb191v2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb191v3 --------------------------
certutil -s "CN=Curve-c2tnb191v3, E=Curve-c2tnb191v3-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb191v3 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #257: Generate EC Cert Request for Curve-c2tnb191v3 - PASSED
cert.sh: Sign Curve-c2tnb191v3's EC Request --------------------------
certutil -C -c TestCA-ec -m 2011 -v 60 -d ../CA -i req -o Curve-c2tnb191v3-ec.cert -f ../tests.pw 
cert.sh: #258: Sign Curve-c2tnb191v3's EC Request - PASSED
cert.sh: Import Curve-c2tnb191v3's EC Cert --------------------------
certutil -A -n Curve-c2tnb191v3-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-c2tnb191v3-ec.cert
cert.sh: #259: Import Curve-c2tnb191v3's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb239v1 --------------------------
certutil -s "CN=Curve-c2tnb239v1, E=Curve-c2tnb239v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb239v1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #260: Generate EC Cert Request for Curve-c2tnb239v1 - PASSED
cert.sh: Sign Curve-c2tnb239v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2012 -v 60 -d ../CA -i req -o Curve-c2tnb239v1-ec.cert -f ../tests.pw 
cert.sh: #261: Sign Curve-c2tnb239v1's EC Request - PASSED
cert.sh: Import Curve-c2tnb239v1's EC Cert --------------------------
certutil -A -n Curve-c2tnb239v1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-c2tnb239v1-ec.cert
cert.sh: #262: Import Curve-c2tnb239v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb239v2 --------------------------
certutil -s "CN=Curve-c2tnb239v2, E=Curve-c2tnb239v2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb239v2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #263: Generate EC Cert Request for Curve-c2tnb239v2 - PASSED
cert.sh: Sign Curve-c2tnb239v2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2013 -v 60 -d ../CA -i req -o Curve-c2tnb239v2-ec.cert -f ../tests.pw 
cert.sh: #264: Sign Curve-c2tnb239v2's EC Request - PASSED
cert.sh: Import Curve-c2tnb239v2's EC Cert --------------------------
certutil -A -n Curve-c2tnb239v2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-c2tnb239v2-ec.cert
cert.sh: #265: Import Curve-c2tnb239v2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb239v3 --------------------------
certutil -s "CN=Curve-c2tnb239v3, E=Curve-c2tnb239v3-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb239v3 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #266: Generate EC Cert Request for Curve-c2tnb239v3 - PASSED
cert.sh: Sign Curve-c2tnb239v3's EC Request --------------------------
certutil -C -c TestCA-ec -m 2014 -v 60 -d ../CA -i req -o Curve-c2tnb239v3-ec.cert -f ../tests.pw 
cert.sh: #267: Sign Curve-c2tnb239v3's EC Request - PASSED
cert.sh: Import Curve-c2tnb239v3's EC Cert --------------------------
certutil -A -n Curve-c2tnb239v3-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-c2tnb239v3-ec.cert
cert.sh: #268: Import Curve-c2tnb239v3's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb359v1 --------------------------
certutil -s "CN=Curve-c2tnb359v1, E=Curve-c2tnb359v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb359v1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #269: Generate EC Cert Request for Curve-c2tnb359v1 - PASSED
cert.sh: Sign Curve-c2tnb359v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2015 -v 60 -d ../CA -i req -o Curve-c2tnb359v1-ec.cert -f ../tests.pw 
cert.sh: #270: Sign Curve-c2tnb359v1's EC Request - PASSED
cert.sh: Import Curve-c2tnb359v1's EC Cert --------------------------
certutil -A -n Curve-c2tnb359v1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-c2tnb359v1-ec.cert
cert.sh: #271: Import Curve-c2tnb359v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb431r1 --------------------------
certutil -s "CN=Curve-c2tnb431r1, E=Curve-c2tnb431r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb431r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #272: Generate EC Cert Request for Curve-c2tnb431r1 - PASSED
cert.sh: Sign Curve-c2tnb431r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2016 -v 60 -d ../CA -i req -o Curve-c2tnb431r1-ec.cert -f ../tests.pw 
cert.sh: #273: Sign Curve-c2tnb431r1's EC Request - PASSED
cert.sh: Import Curve-c2tnb431r1's EC Cert --------------------------
certutil -A -n Curve-c2tnb431r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-c2tnb431r1-ec.cert
cert.sh: #274: Import Curve-c2tnb431r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistb163 --------------------------
certutil -s "CN=Curve-nistb163, E=Curve-nistb163-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistb163 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #275: Generate EC Cert Request for Curve-nistb163 - PASSED
cert.sh: Sign Curve-nistb163's EC Request --------------------------
certutil -C -c TestCA-ec -m 2017 -v 60 -d ../CA -i req -o Curve-nistb163-ec.cert -f ../tests.pw 
cert.sh: #276: Sign Curve-nistb163's EC Request - PASSED
cert.sh: Import Curve-nistb163's EC Cert --------------------------
certutil -A -n Curve-nistb163-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-nistb163-ec.cert
cert.sh: #277: Import Curve-nistb163's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistb233 --------------------------
certutil -s "CN=Curve-nistb233, E=Curve-nistb233-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistb233 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #278: Generate EC Cert Request for Curve-nistb233 - PASSED
cert.sh: Sign Curve-nistb233's EC Request --------------------------
certutil -C -c TestCA-ec -m 2018 -v 60 -d ../CA -i req -o Curve-nistb233-ec.cert -f ../tests.pw 
cert.sh: #279: Sign Curve-nistb233's EC Request - PASSED
cert.sh: Import Curve-nistb233's EC Cert --------------------------
certutil -A -n Curve-nistb233-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-nistb233-ec.cert
cert.sh: #280: Import Curve-nistb233's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistb283 --------------------------
certutil -s "CN=Curve-nistb283, E=Curve-nistb283-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistb283 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #281: Generate EC Cert Request for Curve-nistb283 - PASSED
cert.sh: Sign Curve-nistb283's EC Request --------------------------
certutil -C -c TestCA-ec -m 2019 -v 60 -d ../CA -i req -o Curve-nistb283-ec.cert -f ../tests.pw 
cert.sh: #282: Sign Curve-nistb283's EC Request - PASSED
cert.sh: Import Curve-nistb283's EC Cert --------------------------
certutil -A -n Curve-nistb283-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-nistb283-ec.cert
cert.sh: #283: Import Curve-nistb283's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistb409 --------------------------
certutil -s "CN=Curve-nistb409, E=Curve-nistb409-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistb409 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #284: Generate EC Cert Request for Curve-nistb409 - PASSED
cert.sh: Sign Curve-nistb409's EC Request --------------------------
certutil -C -c TestCA-ec -m 2020 -v 60 -d ../CA -i req -o Curve-nistb409-ec.cert -f ../tests.pw 
cert.sh: #285: Sign Curve-nistb409's EC Request - PASSED
cert.sh: Import Curve-nistb409's EC Cert --------------------------
certutil -A -n Curve-nistb409-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-nistb409-ec.cert
cert.sh: #286: Import Curve-nistb409's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistb571 --------------------------
certutil -s "CN=Curve-nistb571, E=Curve-nistb571-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistb571 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #287: Generate EC Cert Request for Curve-nistb571 - PASSED
cert.sh: Sign Curve-nistb571's EC Request --------------------------
certutil -C -c TestCA-ec -m 2021 -v 60 -d ../CA -i req -o Curve-nistb571-ec.cert -f ../tests.pw 
cert.sh: #288: Sign Curve-nistb571's EC Request - PASSED
cert.sh: Import Curve-nistb571's EC Cert --------------------------
certutil -A -n Curve-nistb571-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-nistb571-ec.cert
cert.sh: #289: Import Curve-nistb571's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistk163 --------------------------
certutil -s "CN=Curve-nistk163, E=Curve-nistk163-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistk163 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #290: Generate EC Cert Request for Curve-nistk163 - PASSED
cert.sh: Sign Curve-nistk163's EC Request --------------------------
certutil -C -c TestCA-ec -m 2022 -v 60 -d ../CA -i req -o Curve-nistk163-ec.cert -f ../tests.pw 
cert.sh: #291: Sign Curve-nistk163's EC Request - PASSED
cert.sh: Import Curve-nistk163's EC Cert --------------------------
certutil -A -n Curve-nistk163-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-nistk163-ec.cert
cert.sh: #292: Import Curve-nistk163's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistk233 --------------------------
certutil -s "CN=Curve-nistk233, E=Curve-nistk233-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistk233 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #293: Generate EC Cert Request for Curve-nistk233 - PASSED
cert.sh: Sign Curve-nistk233's EC Request --------------------------
certutil -C -c TestCA-ec -m 2023 -v 60 -d ../CA -i req -o Curve-nistk233-ec.cert -f ../tests.pw 
cert.sh: #294: Sign Curve-nistk233's EC Request - PASSED
cert.sh: Import Curve-nistk233's EC Cert --------------------------
certutil -A -n Curve-nistk233-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-nistk233-ec.cert
cert.sh: #295: Import Curve-nistk233's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistk283 --------------------------
certutil -s "CN=Curve-nistk283, E=Curve-nistk283-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistk283 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #296: Generate EC Cert Request for Curve-nistk283 - PASSED
cert.sh: Sign Curve-nistk283's EC Request --------------------------
certutil -C -c TestCA-ec -m 2024 -v 60 -d ../CA -i req -o Curve-nistk283-ec.cert -f ../tests.pw 
cert.sh: #297: Sign Curve-nistk283's EC Request - PASSED
cert.sh: Import Curve-nistk283's EC Cert --------------------------
certutil -A -n Curve-nistk283-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-nistk283-ec.cert
cert.sh: #298: Import Curve-nistk283's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistk409 --------------------------
certutil -s "CN=Curve-nistk409, E=Curve-nistk409-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistk409 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #299: Generate EC Cert Request for Curve-nistk409 - PASSED
cert.sh: Sign Curve-nistk409's EC Request --------------------------
certutil -C -c TestCA-ec -m 2025 -v 60 -d ../CA -i req -o Curve-nistk409-ec.cert -f ../tests.pw 
cert.sh: #300: Sign Curve-nistk409's EC Request - PASSED
cert.sh: Import Curve-nistk409's EC Cert --------------------------
certutil -A -n Curve-nistk409-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-nistk409-ec.cert
cert.sh: #301: Import Curve-nistk409's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistk571 --------------------------
certutil -s "CN=Curve-nistk571, E=Curve-nistk571-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistk571 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #302: Generate EC Cert Request for Curve-nistk571 - PASSED
cert.sh: Sign Curve-nistk571's EC Request --------------------------
certutil -C -c TestCA-ec -m 2026 -v 60 -d ../CA -i req -o Curve-nistk571-ec.cert -f ../tests.pw 
cert.sh: #303: Sign Curve-nistk571's EC Request - PASSED
cert.sh: Import Curve-nistk571's EC Cert --------------------------
certutil -A -n Curve-nistk571-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-nistk571-ec.cert
cert.sh: #304: Import Curve-nistk571's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistp192 --------------------------
certutil -s "CN=Curve-nistp192, E=Curve-nistp192-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp192 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #305: Generate EC Cert Request for Curve-nistp192 - PASSED
cert.sh: Sign Curve-nistp192's EC Request --------------------------
certutil -C -c TestCA-ec -m 2027 -v 60 -d ../CA -i req -o Curve-nistp192-ec.cert -f ../tests.pw 
cert.sh: #306: Sign Curve-nistp192's EC Request - PASSED
cert.sh: Import Curve-nistp192's EC Cert --------------------------
certutil -A -n Curve-nistp192-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-nistp192-ec.cert
cert.sh: #307: Import Curve-nistp192's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistp224 --------------------------
certutil -s "CN=Curve-nistp224, E=Curve-nistp224-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp224 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #308: Generate EC Cert Request for Curve-nistp224 - PASSED
cert.sh: Sign Curve-nistp224's EC Request --------------------------
certutil -C -c TestCA-ec -m 2028 -v 60 -d ../CA -i req -o Curve-nistp224-ec.cert -f ../tests.pw 
cert.sh: #309: Sign Curve-nistp224's EC Request - PASSED
cert.sh: Import Curve-nistp224's EC Cert --------------------------
certutil -A -n Curve-nistp224-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-nistp224-ec.cert
cert.sh: #310: Import Curve-nistp224's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistp256 --------------------------
certutil -s "CN=Curve-nistp256, E=Curve-nistp256-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp256 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #311: Generate EC Cert Request for Curve-nistp256 - PASSED
cert.sh: Sign Curve-nistp256's EC Request --------------------------
certutil -C -c TestCA-ec -m 2029 -v 60 -d ../CA -i req -o Curve-nistp256-ec.cert -f ../tests.pw 
cert.sh: #312: Sign Curve-nistp256's EC Request - PASSED
cert.sh: Import Curve-nistp256's EC Cert --------------------------
certutil -A -n Curve-nistp256-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-nistp256-ec.cert
cert.sh: #313: Import Curve-nistp256's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistp384 --------------------------
certutil -s "CN=Curve-nistp384, E=Curve-nistp384-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp384 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #314: Generate EC Cert Request for Curve-nistp384 - PASSED
cert.sh: Sign Curve-nistp384's EC Request --------------------------
certutil -C -c TestCA-ec -m 2030 -v 60 -d ../CA -i req -o Curve-nistp384-ec.cert -f ../tests.pw 
cert.sh: #315: Sign Curve-nistp384's EC Request - PASSED
cert.sh: Import Curve-nistp384's EC Cert --------------------------
certutil -A -n Curve-nistp384-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-nistp384-ec.cert
cert.sh: #316: Import Curve-nistp384's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistp521 --------------------------
certutil -s "CN=Curve-nistp521, E=Curve-nistp521-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp521 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #317: Generate EC Cert Request for Curve-nistp521 - PASSED
cert.sh: Sign Curve-nistp521's EC Request --------------------------
certutil -C -c TestCA-ec -m 2031 -v 60 -d ../CA -i req -o Curve-nistp521-ec.cert -f ../tests.pw 
cert.sh: #318: Sign Curve-nistp521's EC Request - PASSED
cert.sh: Import Curve-nistp521's EC Cert --------------------------
certutil -A -n Curve-nistp521-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-nistp521-ec.cert
cert.sh: #319: Import Curve-nistp521's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-prime192v1 --------------------------
certutil -s "CN=Curve-prime192v1, E=Curve-prime192v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime192v1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #320: Generate EC Cert Request for Curve-prime192v1 - PASSED
cert.sh: Sign Curve-prime192v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2032 -v 60 -d ../CA -i req -o Curve-prime192v1-ec.cert -f ../tests.pw 
cert.sh: #321: Sign Curve-prime192v1's EC Request - PASSED
cert.sh: Import Curve-prime192v1's EC Cert --------------------------
certutil -A -n Curve-prime192v1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-prime192v1-ec.cert
cert.sh: #322: Import Curve-prime192v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-prime192v2 --------------------------
certutil -s "CN=Curve-prime192v2, E=Curve-prime192v2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime192v2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #323: Generate EC Cert Request for Curve-prime192v2 - PASSED
cert.sh: Sign Curve-prime192v2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2033 -v 60 -d ../CA -i req -o Curve-prime192v2-ec.cert -f ../tests.pw 
cert.sh: #324: Sign Curve-prime192v2's EC Request - PASSED
cert.sh: Import Curve-prime192v2's EC Cert --------------------------
certutil -A -n Curve-prime192v2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-prime192v2-ec.cert
cert.sh: #325: Import Curve-prime192v2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-prime192v3 --------------------------
certutil -s "CN=Curve-prime192v3, E=Curve-prime192v3-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime192v3 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #326: Generate EC Cert Request for Curve-prime192v3 - PASSED
cert.sh: Sign Curve-prime192v3's EC Request --------------------------
certutil -C -c TestCA-ec -m 2034 -v 60 -d ../CA -i req -o Curve-prime192v3-ec.cert -f ../tests.pw 
cert.sh: #327: Sign Curve-prime192v3's EC Request - PASSED
cert.sh: Import Curve-prime192v3's EC Cert --------------------------
certutil -A -n Curve-prime192v3-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-prime192v3-ec.cert
cert.sh: #328: Import Curve-prime192v3's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-prime239v1 --------------------------
certutil -s "CN=Curve-prime239v1, E=Curve-prime239v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime239v1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #329: Generate EC Cert Request for Curve-prime239v1 - PASSED
cert.sh: Sign Curve-prime239v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2035 -v 60 -d ../CA -i req -o Curve-prime239v1-ec.cert -f ../tests.pw 
cert.sh: #330: Sign Curve-prime239v1's EC Request - PASSED
cert.sh: Import Curve-prime239v1's EC Cert --------------------------
certutil -A -n Curve-prime239v1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-prime239v1-ec.cert
cert.sh: #331: Import Curve-prime239v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-prime239v2 --------------------------
certutil -s "CN=Curve-prime239v2, E=Curve-prime239v2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime239v2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #332: Generate EC Cert Request for Curve-prime239v2 - PASSED
cert.sh: Sign Curve-prime239v2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2036 -v 60 -d ../CA -i req -o Curve-prime239v2-ec.cert -f ../tests.pw 
cert.sh: #333: Sign Curve-prime239v2's EC Request - PASSED
cert.sh: Import Curve-prime239v2's EC Cert --------------------------
certutil -A -n Curve-prime239v2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-prime239v2-ec.cert
cert.sh: #334: Import Curve-prime239v2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-prime239v3 --------------------------
certutil -s "CN=Curve-prime239v3, E=Curve-prime239v3-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime239v3 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #335: Generate EC Cert Request for Curve-prime239v3 - PASSED
cert.sh: Sign Curve-prime239v3's EC Request --------------------------
certutil -C -c TestCA-ec -m 2037 -v 60 -d ../CA -i req -o Curve-prime239v3-ec.cert -f ../tests.pw 
cert.sh: #336: Sign Curve-prime239v3's EC Request - PASSED
cert.sh: Import Curve-prime239v3's EC Cert --------------------------
certutil -A -n Curve-prime239v3-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-prime239v3-ec.cert
cert.sh: #337: Import Curve-prime239v3's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp112r1 --------------------------
certutil -s "CN=Curve-secp112r1, E=Curve-secp112r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp112r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #338: Generate EC Cert Request for Curve-secp112r1 - PASSED
cert.sh: Sign Curve-secp112r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2038 -v 60 -d ../CA -i req -o Curve-secp112r1-ec.cert -f ../tests.pw 
cert.sh: #339: Sign Curve-secp112r1's EC Request - PASSED
cert.sh: Import Curve-secp112r1's EC Cert --------------------------
certutil -A -n Curve-secp112r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-secp112r1-ec.cert
cert.sh: #340: Import Curve-secp112r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp112r2 --------------------------
certutil -s "CN=Curve-secp112r2, E=Curve-secp112r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp112r2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #341: Generate EC Cert Request for Curve-secp112r2 - PASSED
cert.sh: Sign Curve-secp112r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2039 -v 60 -d ../CA -i req -o Curve-secp112r2-ec.cert -f ../tests.pw 
cert.sh: #342: Sign Curve-secp112r2's EC Request - PASSED
cert.sh: Import Curve-secp112r2's EC Cert --------------------------
certutil -A -n Curve-secp112r2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-secp112r2-ec.cert
cert.sh: #343: Import Curve-secp112r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp128r1 --------------------------
certutil -s "CN=Curve-secp128r1, E=Curve-secp128r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp128r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #344: Generate EC Cert Request for Curve-secp128r1 - PASSED
cert.sh: Sign Curve-secp128r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2040 -v 60 -d ../CA -i req -o Curve-secp128r1-ec.cert -f ../tests.pw 
cert.sh: #345: Sign Curve-secp128r1's EC Request - PASSED
cert.sh: Import Curve-secp128r1's EC Cert --------------------------
certutil -A -n Curve-secp128r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-secp128r1-ec.cert
cert.sh: #346: Import Curve-secp128r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp128r2 --------------------------
certutil -s "CN=Curve-secp128r2, E=Curve-secp128r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp128r2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #347: Generate EC Cert Request for Curve-secp128r2 - PASSED
cert.sh: Sign Curve-secp128r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2041 -v 60 -d ../CA -i req -o Curve-secp128r2-ec.cert -f ../tests.pw 
cert.sh: #348: Sign Curve-secp128r2's EC Request - PASSED
cert.sh: Import Curve-secp128r2's EC Cert --------------------------
certutil -A -n Curve-secp128r2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-secp128r2-ec.cert
cert.sh: #349: Import Curve-secp128r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp160k1 --------------------------
certutil -s "CN=Curve-secp160k1, E=Curve-secp160k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp160k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #350: Generate EC Cert Request for Curve-secp160k1 - PASSED
cert.sh: Sign Curve-secp160k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2042 -v 60 -d ../CA -i req -o Curve-secp160k1-ec.cert -f ../tests.pw 
cert.sh: #351: Sign Curve-secp160k1's EC Request - PASSED
cert.sh: Import Curve-secp160k1's EC Cert --------------------------
certutil -A -n Curve-secp160k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-secp160k1-ec.cert
cert.sh: #352: Import Curve-secp160k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp160r1 --------------------------
certutil -s "CN=Curve-secp160r1, E=Curve-secp160r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp160r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #353: Generate EC Cert Request for Curve-secp160r1 - PASSED
cert.sh: Sign Curve-secp160r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2043 -v 60 -d ../CA -i req -o Curve-secp160r1-ec.cert -f ../tests.pw 
cert.sh: #354: Sign Curve-secp160r1's EC Request - PASSED
cert.sh: Import Curve-secp160r1's EC Cert --------------------------
certutil -A -n Curve-secp160r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-secp160r1-ec.cert
cert.sh: #355: Import Curve-secp160r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp160r2 --------------------------
certutil -s "CN=Curve-secp160r2, E=Curve-secp160r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp160r2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #356: Generate EC Cert Request for Curve-secp160r2 - PASSED
cert.sh: Sign Curve-secp160r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2044 -v 60 -d ../CA -i req -o Curve-secp160r2-ec.cert -f ../tests.pw 
cert.sh: #357: Sign Curve-secp160r2's EC Request - PASSED
cert.sh: Import Curve-secp160r2's EC Cert --------------------------
certutil -A -n Curve-secp160r2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-secp160r2-ec.cert
cert.sh: #358: Import Curve-secp160r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp192k1 --------------------------
certutil -s "CN=Curve-secp192k1, E=Curve-secp192k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp192k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #359: Generate EC Cert Request for Curve-secp192k1 - PASSED
cert.sh: Sign Curve-secp192k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2045 -v 60 -d ../CA -i req -o Curve-secp192k1-ec.cert -f ../tests.pw 
cert.sh: #360: Sign Curve-secp192k1's EC Request - PASSED
cert.sh: Import Curve-secp192k1's EC Cert --------------------------
certutil -A -n Curve-secp192k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-secp192k1-ec.cert
cert.sh: #361: Import Curve-secp192k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp192r1 --------------------------
certutil -s "CN=Curve-secp192r1, E=Curve-secp192r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp192r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #362: Generate EC Cert Request for Curve-secp192r1 - PASSED
cert.sh: Sign Curve-secp192r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2046 -v 60 -d ../CA -i req -o Curve-secp192r1-ec.cert -f ../tests.pw 
cert.sh: #363: Sign Curve-secp192r1's EC Request - PASSED
cert.sh: Import Curve-secp192r1's EC Cert --------------------------
certutil -A -n Curve-secp192r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-secp192r1-ec.cert
cert.sh: #364: Import Curve-secp192r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp224k1 --------------------------
certutil -s "CN=Curve-secp224k1, E=Curve-secp224k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp224k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #365: Generate EC Cert Request for Curve-secp224k1 - PASSED
cert.sh: Sign Curve-secp224k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2047 -v 60 -d ../CA -i req -o Curve-secp224k1-ec.cert -f ../tests.pw 
cert.sh: #366: Sign Curve-secp224k1's EC Request - PASSED
cert.sh: Import Curve-secp224k1's EC Cert --------------------------
certutil -A -n Curve-secp224k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-secp224k1-ec.cert
cert.sh: #367: Import Curve-secp224k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp224r1 --------------------------
certutil -s "CN=Curve-secp224r1, E=Curve-secp224r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp224r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #368: Generate EC Cert Request for Curve-secp224r1 - PASSED
cert.sh: Sign Curve-secp224r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2048 -v 60 -d ../CA -i req -o Curve-secp224r1-ec.cert -f ../tests.pw 
cert.sh: #369: Sign Curve-secp224r1's EC Request - PASSED
cert.sh: Import Curve-secp224r1's EC Cert --------------------------
certutil -A -n Curve-secp224r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-secp224r1-ec.cert
cert.sh: #370: Import Curve-secp224r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp256k1 --------------------------
certutil -s "CN=Curve-secp256k1, E=Curve-secp256k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp256k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #371: Generate EC Cert Request for Curve-secp256k1 - PASSED
cert.sh: Sign Curve-secp256k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2049 -v 60 -d ../CA -i req -o Curve-secp256k1-ec.cert -f ../tests.pw 
cert.sh: #372: Sign Curve-secp256k1's EC Request - PASSED
cert.sh: Import Curve-secp256k1's EC Cert --------------------------
certutil -A -n Curve-secp256k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-secp256k1-ec.cert
cert.sh: #373: Import Curve-secp256k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp256r1 --------------------------
certutil -s "CN=Curve-secp256r1, E=Curve-secp256r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp256r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #374: Generate EC Cert Request for Curve-secp256r1 - PASSED
cert.sh: Sign Curve-secp256r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2050 -v 60 -d ../CA -i req -o Curve-secp256r1-ec.cert -f ../tests.pw 
cert.sh: #375: Sign Curve-secp256r1's EC Request - PASSED
cert.sh: Import Curve-secp256r1's EC Cert --------------------------
certutil -A -n Curve-secp256r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-secp256r1-ec.cert
cert.sh: #376: Import Curve-secp256r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp384r1 --------------------------
certutil -s "CN=Curve-secp384r1, E=Curve-secp384r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #377: Generate EC Cert Request for Curve-secp384r1 - PASSED
cert.sh: Sign Curve-secp384r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2051 -v 60 -d ../CA -i req -o Curve-secp384r1-ec.cert -f ../tests.pw 
cert.sh: #378: Sign Curve-secp384r1's EC Request - PASSED
cert.sh: Import Curve-secp384r1's EC Cert --------------------------
certutil -A -n Curve-secp384r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-secp384r1-ec.cert
cert.sh: #379: Import Curve-secp384r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp521r1 --------------------------
certutil -s "CN=Curve-secp521r1, E=Curve-secp521r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp521r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #380: Generate EC Cert Request for Curve-secp521r1 - PASSED
cert.sh: Sign Curve-secp521r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2052 -v 60 -d ../CA -i req -o Curve-secp521r1-ec.cert -f ../tests.pw 
cert.sh: #381: Sign Curve-secp521r1's EC Request - PASSED
cert.sh: Import Curve-secp521r1's EC Cert --------------------------
certutil -A -n Curve-secp521r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-secp521r1-ec.cert
cert.sh: #382: Import Curve-secp521r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect113r1 --------------------------
certutil -s "CN=Curve-sect113r1, E=Curve-sect113r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect113r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #383: Generate EC Cert Request for Curve-sect113r1 - PASSED
cert.sh: Sign Curve-sect113r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2053 -v 60 -d ../CA -i req -o Curve-sect113r1-ec.cert -f ../tests.pw 
cert.sh: #384: Sign Curve-sect113r1's EC Request - PASSED
cert.sh: Import Curve-sect113r1's EC Cert --------------------------
certutil -A -n Curve-sect113r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-sect113r1-ec.cert
cert.sh: #385: Import Curve-sect113r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect113r2 --------------------------
certutil -s "CN=Curve-sect113r2, E=Curve-sect113r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect113r2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #386: Generate EC Cert Request for Curve-sect113r2 - PASSED
cert.sh: Sign Curve-sect113r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2054 -v 60 -d ../CA -i req -o Curve-sect113r2-ec.cert -f ../tests.pw 
cert.sh: #387: Sign Curve-sect113r2's EC Request - PASSED
cert.sh: Import Curve-sect113r2's EC Cert --------------------------
certutil -A -n Curve-sect113r2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-sect113r2-ec.cert
cert.sh: #388: Import Curve-sect113r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect131r1 --------------------------
certutil -s "CN=Curve-sect131r1, E=Curve-sect131r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect131r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #389: Generate EC Cert Request for Curve-sect131r1 - PASSED
cert.sh: Sign Curve-sect131r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2055 -v 60 -d ../CA -i req -o Curve-sect131r1-ec.cert -f ../tests.pw 
cert.sh: #390: Sign Curve-sect131r1's EC Request - PASSED
cert.sh: Import Curve-sect131r1's EC Cert --------------------------
certutil -A -n Curve-sect131r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-sect131r1-ec.cert
cert.sh: #391: Import Curve-sect131r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect131r2 --------------------------
certutil -s "CN=Curve-sect131r2, E=Curve-sect131r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect131r2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #392: Generate EC Cert Request for Curve-sect131r2 - PASSED
cert.sh: Sign Curve-sect131r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2056 -v 60 -d ../CA -i req -o Curve-sect131r2-ec.cert -f ../tests.pw 
cert.sh: #393: Sign Curve-sect131r2's EC Request - PASSED
cert.sh: Import Curve-sect131r2's EC Cert --------------------------
certutil -A -n Curve-sect131r2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-sect131r2-ec.cert
cert.sh: #394: Import Curve-sect131r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect163k1 --------------------------
certutil -s "CN=Curve-sect163k1, E=Curve-sect163k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect163k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #395: Generate EC Cert Request for Curve-sect163k1 - PASSED
cert.sh: Sign Curve-sect163k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2057 -v 60 -d ../CA -i req -o Curve-sect163k1-ec.cert -f ../tests.pw 
cert.sh: #396: Sign Curve-sect163k1's EC Request - PASSED
cert.sh: Import Curve-sect163k1's EC Cert --------------------------
certutil -A -n Curve-sect163k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-sect163k1-ec.cert
cert.sh: #397: Import Curve-sect163k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect163r1 --------------------------
certutil -s "CN=Curve-sect163r1, E=Curve-sect163r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect163r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #398: Generate EC Cert Request for Curve-sect163r1 - PASSED
cert.sh: Sign Curve-sect163r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2058 -v 60 -d ../CA -i req -o Curve-sect163r1-ec.cert -f ../tests.pw 
cert.sh: #399: Sign Curve-sect163r1's EC Request - PASSED
cert.sh: Import Curve-sect163r1's EC Cert --------------------------
certutil -A -n Curve-sect163r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-sect163r1-ec.cert
cert.sh: #400: Import Curve-sect163r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect163r2 --------------------------
certutil -s "CN=Curve-sect163r2, E=Curve-sect163r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect163r2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #401: Generate EC Cert Request for Curve-sect163r2 - PASSED
cert.sh: Sign Curve-sect163r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2059 -v 60 -d ../CA -i req -o Curve-sect163r2-ec.cert -f ../tests.pw 
cert.sh: #402: Sign Curve-sect163r2's EC Request - PASSED
cert.sh: Import Curve-sect163r2's EC Cert --------------------------
certutil -A -n Curve-sect163r2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-sect163r2-ec.cert
cert.sh: #403: Import Curve-sect163r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect193r1 --------------------------
certutil -s "CN=Curve-sect193r1, E=Curve-sect193r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect193r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #404: Generate EC Cert Request for Curve-sect193r1 - PASSED
cert.sh: Sign Curve-sect193r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2060 -v 60 -d ../CA -i req -o Curve-sect193r1-ec.cert -f ../tests.pw 
cert.sh: #405: Sign Curve-sect193r1's EC Request - PASSED
cert.sh: Import Curve-sect193r1's EC Cert --------------------------
certutil -A -n Curve-sect193r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-sect193r1-ec.cert
cert.sh: #406: Import Curve-sect193r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect193r2 --------------------------
certutil -s "CN=Curve-sect193r2, E=Curve-sect193r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect193r2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #407: Generate EC Cert Request for Curve-sect193r2 - PASSED
cert.sh: Sign Curve-sect193r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2061 -v 60 -d ../CA -i req -o Curve-sect193r2-ec.cert -f ../tests.pw 
cert.sh: #408: Sign Curve-sect193r2's EC Request - PASSED
cert.sh: Import Curve-sect193r2's EC Cert --------------------------
certutil -A -n Curve-sect193r2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-sect193r2-ec.cert
cert.sh: #409: Import Curve-sect193r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect233k1 --------------------------
certutil -s "CN=Curve-sect233k1, E=Curve-sect233k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect233k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #410: Generate EC Cert Request for Curve-sect233k1 - PASSED
cert.sh: Sign Curve-sect233k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2062 -v 60 -d ../CA -i req -o Curve-sect233k1-ec.cert -f ../tests.pw 
cert.sh: #411: Sign Curve-sect233k1's EC Request - PASSED
cert.sh: Import Curve-sect233k1's EC Cert --------------------------
certutil -A -n Curve-sect233k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-sect233k1-ec.cert
cert.sh: #412: Import Curve-sect233k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect233r1 --------------------------
certutil -s "CN=Curve-sect233r1, E=Curve-sect233r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect233r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #413: Generate EC Cert Request for Curve-sect233r1 - PASSED
cert.sh: Sign Curve-sect233r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2063 -v 60 -d ../CA -i req -o Curve-sect233r1-ec.cert -f ../tests.pw 
cert.sh: #414: Sign Curve-sect233r1's EC Request - PASSED
cert.sh: Import Curve-sect233r1's EC Cert --------------------------
certutil -A -n Curve-sect233r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-sect233r1-ec.cert
cert.sh: #415: Import Curve-sect233r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect239k1 --------------------------
certutil -s "CN=Curve-sect239k1, E=Curve-sect239k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect239k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #416: Generate EC Cert Request for Curve-sect239k1 - PASSED
cert.sh: Sign Curve-sect239k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2064 -v 60 -d ../CA -i req -o Curve-sect239k1-ec.cert -f ../tests.pw 
cert.sh: #417: Sign Curve-sect239k1's EC Request - PASSED
cert.sh: Import Curve-sect239k1's EC Cert --------------------------
certutil -A -n Curve-sect239k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-sect239k1-ec.cert
cert.sh: #418: Import Curve-sect239k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect283k1 --------------------------
certutil -s "CN=Curve-sect283k1, E=Curve-sect283k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect283k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #419: Generate EC Cert Request for Curve-sect283k1 - PASSED
cert.sh: Sign Curve-sect283k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2065 -v 60 -d ../CA -i req -o Curve-sect283k1-ec.cert -f ../tests.pw 
cert.sh: #420: Sign Curve-sect283k1's EC Request - PASSED
cert.sh: Import Curve-sect283k1's EC Cert --------------------------
certutil -A -n Curve-sect283k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-sect283k1-ec.cert
cert.sh: #421: Import Curve-sect283k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect283r1 --------------------------
certutil -s "CN=Curve-sect283r1, E=Curve-sect283r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect283r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #422: Generate EC Cert Request for Curve-sect283r1 - PASSED
cert.sh: Sign Curve-sect283r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2066 -v 60 -d ../CA -i req -o Curve-sect283r1-ec.cert -f ../tests.pw 
cert.sh: #423: Sign Curve-sect283r1's EC Request - PASSED
cert.sh: Import Curve-sect283r1's EC Cert --------------------------
certutil -A -n Curve-sect283r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-sect283r1-ec.cert
cert.sh: #424: Import Curve-sect283r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect409k1 --------------------------
certutil -s "CN=Curve-sect409k1, E=Curve-sect409k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect409k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #425: Generate EC Cert Request for Curve-sect409k1 - PASSED
cert.sh: Sign Curve-sect409k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2067 -v 60 -d ../CA -i req -o Curve-sect409k1-ec.cert -f ../tests.pw 
cert.sh: #426: Sign Curve-sect409k1's EC Request - PASSED
cert.sh: Import Curve-sect409k1's EC Cert --------------------------
certutil -A -n Curve-sect409k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-sect409k1-ec.cert
cert.sh: #427: Import Curve-sect409k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect409r1 --------------------------
certutil -s "CN=Curve-sect409r1, E=Curve-sect409r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect409r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #428: Generate EC Cert Request for Curve-sect409r1 - PASSED
cert.sh: Sign Curve-sect409r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2068 -v 60 -d ../CA -i req -o Curve-sect409r1-ec.cert -f ../tests.pw 
cert.sh: #429: Sign Curve-sect409r1's EC Request - PASSED
cert.sh: Import Curve-sect409r1's EC Cert --------------------------
certutil -A -n Curve-sect409r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-sect409r1-ec.cert
cert.sh: #430: Import Curve-sect409r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect571k1 --------------------------
certutil -s "CN=Curve-sect571k1, E=Curve-sect571k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect571k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #431: Generate EC Cert Request for Curve-sect571k1 - PASSED
cert.sh: Sign Curve-sect571k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2069 -v 60 -d ../CA -i req -o Curve-sect571k1-ec.cert -f ../tests.pw 
cert.sh: #432: Sign Curve-sect571k1's EC Request - PASSED
cert.sh: Import Curve-sect571k1's EC Cert --------------------------
certutil -A -n Curve-sect571k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-sect571k1-ec.cert
cert.sh: #433: Import Curve-sect571k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect571r1 --------------------------
certutil -s "CN=Curve-sect571r1, E=Curve-sect571r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect571r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #434: Generate EC Cert Request for Curve-sect571r1 - PASSED
cert.sh: Sign Curve-sect571r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2070 -v 60 -d ../CA -i req -o Curve-sect571r1-ec.cert -f ../tests.pw 
cert.sh: #435: Sign Curve-sect571r1's EC Request - PASSED
cert.sh: Import Curve-sect571r1's EC Cert --------------------------
certutil -A -n Curve-sect571r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-sect571r1-ec.cert
cert.sh: #436: Import Curve-sect571r1's EC Cert - PASSED
cert.sh: Initializing TestExt's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cert_extensions -f ../tests.pw
cert.sh: #437: Initializing TestExt's Cert DB - PASSED
cert.sh: Loading root cert module to TestExt's Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cert_extensions

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #438: Loading root cert module to TestExt's Cert DB - PASSED
cert.sh: Import Root CA for TestExt --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cert_extensions -i ../CA/TestCA.ca.cert
cert.sh: #439: Import Root CA for TestExt - PASSED
cert.sh: Import EC Root CA for TestExt --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cert_extensions -i ../CA/TestCA-ec.ca.cert
cert.sh: #440: Import EC Root CA for TestExt - PASSED
cert.sh: Generate Cert Request for TestExt --------------------------
certutil -s "CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #441: Generate Cert Request for TestExt - PASSED
cert.sh: Sign TestExt's Request --------------------------
certutil -C -c TestCA -m 90 -v 60 -d ../CA -i req -o TestExt.cert -f ../tests.pw 
cert.sh: #442: Sign TestExt's Request - PASSED
cert.sh: Import TestExt's Cert --------------------------
certutil -A -n TestExt -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cert_extensions -f ../tests.pw -i TestExt.cert
cert.sh: #443: Import TestExt's Cert - PASSED
cert.sh SUCCESS: TestExt's Cert Created
cert.sh: Generate EC Cert Request for TestExt --------------------------
certutil -s "CN=TestExt, E=TestExt-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #444: Generate EC Cert Request for TestExt - PASSED
cert.sh: Sign TestExt's EC Request --------------------------
certutil -C -c TestCA-ec -m 90 -v 60 -d ../CA -i req -o TestExt-ec.cert -f ../tests.pw 
cert.sh: #445: Sign TestExt's EC Request - PASSED
cert.sh: Import TestExt's EC Cert --------------------------
certutil -A -n TestExt-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cert_extensions -f ../tests.pw -i TestExt-ec.cert
cert.sh: #446: Import TestExt's EC Cert - PASSED
cert.sh SUCCESS: TestExt's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestExt --------------------------
certutil -s "CN=TestExt, E=TestExt-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #447: Generate mixed EC Cert Request for TestExt - PASSED
cert.sh: Sign TestExt's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10090 -v 60 -d ../CA -i req -o TestExt-ecmixed.cert -f ../tests.pw 
cert.sh: #448: Sign TestExt's EC Request with RSA - PASSED
cert.sh: Import TestExt's mixed EC Cert --------------------------
certutil -A -n TestExt-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cert_extensions -f ../tests.pw -i TestExt-ecmixed.cert
cert.sh: #449: Import TestExt's mixed EC Cert - PASSED
cert.sh SUCCESS: TestExt's mixed EC Cert Created

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cert_extensions -S -n TestExt1 -t u,u,u -o /tmp/cert -s CN=TestExt1, E=TestExt1@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cert_extensions/test.args
certutil options:
0
1
2
3
4
5
6
10
n


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cert_extensions -L -n TestExt1
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f2:07:04
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 15:57:10 2012
            Not After : Thu Feb 28 15:57:10 2013
        Subject: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b7:54:38:56:81:d3:64:4c:bf:17:07:95:d5:a7:8f:e6:
                    81:15:22:35:11:87:06:0d:c4:5e:26:d7:0f:f0:f4:7e:
                    aa:bf:5b:37:83:84:88:46:0b:fd:4a:61:e8:06:04:ca:
                    e6:3f:08:ca:9e:f2:ce:fd:95:fe:33:be:58:45:7b:ae:
                    b2:f7:56:cd:71:b1:6f:15:2a:68:3c:2e:d6:e6:30:86:
                    91:e4:35:13:44:94:24:68:36:33:8a:90:ed:9c:e3:0d:
                    fd:3a:95:b5:1c:14:eb:db:91:2d:11:dd:7e:6a:73:0a:
                    20:91:36:44:04:f1:83:a9:93:ed:90:1a:a6:66:73:99
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Key Usage
            Usages: Digital Signature
                    Non-Repudiation
                    Key Encipherment
                    Data Encipherment
                    Key Agreement
                    Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        97:87:33:81:53:7c:ee:96:ad:ec:f0:b6:25:2b:16:a4:
        87:4d:8d:f3:d5:aa:08:3e:c8:99:82:9d:bf:26:73:47:
        e2:a2:8e:a7:80:53:25:d7:82:7d:0d:3a:c2:c2:cd:06:
        99:22:5a:cd:a9:0e:c5:18:4d:41:82:03:88:10:9f:60:
        67:3c:74:32:00:0e:34:61:cd:9a:b9:83:11:e8:93:c0:
        f4:31:b2:ca:40:ea:e6:cb:92:bc:35:39:4e:32:d5:20:
        df:4a:fa:cd:0d:ce:ca:87:90:a4:10:ac:bb:c4:f8:c0:
        cb:f6:1a:45:3c:fa:30:09:8f:9e:16:f8:7e:c4:05:76
    Fingerprint (MD5):
        82:19:18:B2:F6:9B:F7:AB:15:65:C6:F3:AA:14:7B:5F
    Fingerprint (SHA1):
        E2:A8:2B:D6:1A:40:33:06:9A:BF:1D:7A:E3:00:69:A7:72:5C:36:9C

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #450: Certificate Key Usage Extension (1) - PASSED

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cert_extensions -S -n TestExt2 -t u,u,u -o /tmp/cert -s CN=TestExt2, E=TestExt2@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cert_extensions/test.args
certutil options:
0
1
2
3
4
5
6
10
y


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cert_extensions -L -n TestExt2
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f2:07:04
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 15:57:11 2012
            Not After : Thu Feb 28 15:57:11 2013
        Subject: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c7:74:2c:24:16:c5:3d:f9:bc:65:b8:9c:dc:f3:25:96:
                    67:6d:91:a0:c1:e5:3e:2e:1f:6e:78:4e:50:2e:b9:9b:
                    9d:75:7e:62:9d:9e:5e:9f:a9:22:a8:5e:7e:7a:07:66:
                    03:eb:da:ee:61:21:18:e5:1f:d7:9c:9b:cb:8f:6e:32:
                    56:3a:84:a4:61:55:34:c5:09:37:85:25:12:6c:3f:9e:
                    a7:cd:44:7c:d9:02:61:57:fb:65:a8:5b:98:89:ef:50:
                    8b:fc:aa:f7:65:c9:ee:a5:aa:77:2e:6f:b2:f8:32:08:
                    d9:c3:fe:17:1a:02:0e:f9:92:2d:97:32:f6:82:98:ad
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Key Usage
            Critical: True
            Usages: Digital Signature
                    Non-Repudiation
                    Key Encipherment
                    Data Encipherment
                    Key Agreement
                    Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        bd:17:37:06:fc:19:f1:05:ab:99:57:a6:ee:1b:ec:5e:
        2d:19:58:2f:3f:6e:c0:e4:64:77:c5:57:b9:34:fd:82:
        7e:b6:61:0b:a6:60:6c:42:7d:a7:f0:13:6b:37:f2:0b:
        ac:a5:aa:47:f0:ee:9b:2a:55:c3:cc:fa:55:dd:42:27:
        04:33:32:eb:34:3a:9f:2a:67:15:18:4e:16:25:a4:01:
        57:b6:04:f1:10:80:21:c0:89:8f:58:9f:cb:24:21:fa:
        63:9e:37:ef:1e:0d:2e:81:cb:88:fa:51:93:8b:7a:43:
        f1:a1:68:67:8b:90:29:c3:66:8d:e9:2e:50:3a:16:fa
    Fingerprint (MD5):
        7F:C8:74:81:EE:AA:03:70:7D:82:4B:98:59:C2:BE:72
    Fingerprint (SHA1):
        50:B3:31:58:40:2C:7D:08:03:94:B4:EF:4D:63:B7:89:0F:9A:DF:8A

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #451: Certificate Key Usage Extension (2) - PASSED

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cert_extensions -S -n TestExt3 -t u,u,u -o /tmp/cert -s CN=TestExt3, E=TestExt3@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cert_extensions/test.args
certutil options:
y
-1
n


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cert_extensions -L -n TestExt3
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f2:07:05
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 15:57:11 2012
            Not After : Thu Feb 28 15:57:11 2013
        Subject: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b5:65:c0:10:15:02:40:d2:d6:74:01:9a:a4:ac:95:eb:
                    54:33:ac:b7:36:26:d2:56:c5:a2:ec:28:b6:de:8c:1d:
                    11:86:63:09:c8:43:d5:a8:66:8c:d4:06:56:50:04:21:
                    5a:09:a6:8c:9c:1e:ec:36:30:41:64:9a:c2:82:11:04:
                    9c:19:eb:25:8e:bc:13:25:23:71:52:0e:ae:ef:e8:84:
                    ac:13:56:10:08:69:aa:5c:b3:24:4b:3d:1d:f5:35:12:
                    2d:73:08:f6:12:c4:cd:8a:b1:81:c0:b2:d5:d0:2c:6a:
                    bf:82:fe:47:f2:01:68:09:3a:75:5a:32:db:4f:d0:9d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:21:87:61:26:b2:b5:42:66:a7:de:1f:de:2f:05:3f:
        cc:27:c5:41:be:1e:de:93:4e:46:ea:2d:9d:36:6d:3b:
        82:00:14:52:89:31:72:40:d5:f8:77:e8:f9:fb:9e:f5:
        d6:65:d0:0b:7f:20:42:c0:23:e0:37:07:64:2f:6c:ee:
        bf:f5:f3:9a:98:43:6f:9f:8f:83:6d:db:9d:02:20:b3:
        b5:db:6d:ac:fb:6a:0a:54:48:22:78:90:99:d0:36:73:
        b7:8f:ea:1e:9e:4c:8d:7f:48:0c:7f:12:42:86:38:8d:
        75:6d:be:61:80:ed:60:9f:87:fd:43:c6:c2:ed:df:d0
    Fingerprint (MD5):
        92:89:3D:9E:53:19:DB:90:2C:60:78:76:20:CE:AE:BA
    Fingerprint (SHA1):
        AC:B4:DF:3F:72:99:D1:11:8D:FE:00:33:C4:D5:6C:83:4F:6F:E1:88

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #452: Certificate Basic Constraints Extension (3) - PASSED

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cert_extensions -S -n TestExt4 -t u,u,u -o /tmp/cert -s CN=TestExt4, E=TestExt4@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cert_extensions/test.args
certutil options:
n
-1
y


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cert_extensions -L -n TestExt4
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f2:07:05
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 15:57:11 2012
            Not After : Thu Feb 28 15:57:11 2013
        Subject: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    be:4d:23:0c:c4:ab:be:66:0e:8d:4a:d7:59:d2:9a:84:
                    68:98:f3:59:77:16:0c:74:26:57:81:99:62:dc:c0:42:
                    34:d6:f7:01:09:0b:9f:23:f8:15:78:e3:25:2a:01:48:
                    38:76:b9:a6:26:4c:00:1e:ac:13:9d:20:9f:cd:d6:3f:
                    0c:05:93:ba:b9:f3:65:ad:3f:31:e9:db:9d:98:39:cc:
                    ff:d4:b8:ba:5e:cc:09:f7:e2:f4:03:1e:5f:bc:b3:93:
                    df:67:25:43:f4:10:3c:ff:ad:c7:b0:fd:89:ac:58:f9:
                    9b:e5:76:f8:bf:82:5b:d1:fb:b3:3b:28:9e:93:8f:ab
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is not a CA.

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        6a:7e:9b:cd:96:5b:c3:e2:e1:5a:90:d6:95:24:5b:e1:
        06:7c:df:b2:7f:2b:52:ae:86:bb:c6:f2:b4:33:31:9e:
        87:78:09:3d:69:18:23:f0:03:a6:e2:85:a1:51:45:13:
        3f:83:7d:a5:bd:86:2b:22:82:1c:d7:ce:dc:8f:80:0a:
        20:22:c4:71:3f:d4:63:57:1b:5f:7a:5c:c6:ec:ba:ef:
        56:f3:78:b3:88:58:a5:26:66:d5:8f:1c:30:83:ab:32:
        0a:22:b0:6f:3a:ee:aa:ce:f4:78:93:54:49:bc:29:22:
        3d:00:e4:f2:16:45:83:19:e1:44:b5:b1:99:c9:04:55
    Fingerprint (MD5):
        2C:4E:6A:74:0C:FE:52:F2:AF:74:7A:B5:D0:A9:BC:FB
    Fingerprint (SHA1):
        27:39:94:0A:0E:AB:1E:B1:12:8E:81:A3:B9:BF:5F:01:CA:69:B5:60

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #453: Certificate Basic Constraints Extension (4) - PASSED

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cert_extensions -S -n TestExt5 -t u,u,u -o /tmp/cert -s CN=TestExt5, E=TestExt5@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cert_extensions/test.args
certutil options:
y
12341235123


y


Generating key.  This may take a few moments...

Enter value for the authKeyID extension [y/N]?
Enter value for the key identifier fields,enter to omit:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter value for the authCertSerial field, enter to omit:
Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cert_extensions -L -n TestExt5
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f2:07:06
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 15:57:12 2012
            Not After : Thu Feb 28 15:57:12 2013
        Subject: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b4:1e:3c:2a:17:a3:7d:6d:f2:5e:4d:d1:9b:44:b3:53:
                    6c:69:68:d6:49:25:a2:41:89:64:72:52:3b:6e:b2:81:
                    c1:61:75:1c:96:1e:32:ec:8c:e1:64:12:8c:96:36:57:
                    ad:08:26:fb:8c:07:41:3e:b6:e3:90:c6:bd:d9:7a:8e:
                    86:a6:b5:d7:09:92:49:4c:46:6f:75:c0:b7:1e:1a:59:
                    5f:bd:78:3d:fb:1f:83:4c:60:7f:b1:a8:ff:37:5d:75:
                    bd:e6:a4:9a:9b:b9:14:57:0b:d3:e6:ff:9c:8c:7e:62:
                    cd:2c:85:05:14:97:58:e3:25:8f:f6:9b:11:31:11:9f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Authority Key Identifier
            Critical: True
            Key ID:
                12341235123

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        85:f8:b7:79:0b:a2:2e:c3:5b:0a:93:87:c6:5f:96:12:
        fe:6e:e2:f9:89:d5:10:a8:4f:95:57:72:eb:2a:54:a2:
        ca:f4:ac:ff:9e:22:74:7b:99:f6:09:46:b0:d6:55:f1:
        c9:23:40:44:e9:d0:3a:dc:9b:46:12:86:50:17:53:93:
        d2:4a:c9:a4:56:65:3c:e7:b3:d4:9e:f5:ee:24:71:6e:
        df:7b:c8:29:d0:27:c3:97:79:ef:dd:f2:28:47:d5:85:
        e8:ee:75:3d:f0:43:dd:94:c1:35:4f:22:4b:b0:df:56:
        69:ba:a6:af:d6:30:6d:ac:35:2c:19:7f:9d:a4:19:af
    Fingerprint (MD5):
        D1:73:17:CB:99:40:0D:23:73:87:BD:98:57:25:A2:9F
    Fingerprint (SHA1):
        B9:04:B6:56:0B:AE:93:95:87:D4:17:7F:69:19:A2:83:B6:D2:2C:C4

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #454: Certificate Authority Key Identifier Extension (5) - PASSED

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cert_extensions -S -n TestExt6 -t u,u,u -o /tmp/cert -s CN=TestExt6, E=TestExt6@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cert_extensions/test.args
certutil options:
y

3
test.com

214123
y


Generating key.  This may take a few moments...

Enter value for the authKeyID extension [y/N]?
Enter value for the key identifier fields,enter to omit:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter value for the authCertSerial field, enter to omit:
Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cert_extensions -L -n TestExt6
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f2:07:07
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 15:57:12 2012
            Not After : Thu Feb 28 15:57:12 2013
        Subject: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    af:19:a6:a9:eb:52:3f:24:f2:09:ba:6b:a8:9e:db:0d:
                    93:bf:6d:f0:0d:42:bd:15:75:55:98:64:95:fe:54:fd:
                    44:3e:44:2e:a9:90:bb:b3:28:16:38:bc:74:ec:72:bd:
                    b3:94:73:0e:52:58:ef:8f:be:c6:26:b3:71:bb:4e:8e:
                    a5:ba:6b:47:2a:4a:e3:3b:ec:69:0d:bd:c0:47:51:b9:
                    a6:eb:cc:f5:75:42:25:14:15:8e:55:8a:ba:4b:fd:14:
                    46:7e:f0:d2:b6:4e:90:16:03:9c:25:58:d0:e0:6f:d2:
                    7c:19:fe:73:dd:ce:9a:9d:cf:1d:80:0d:0d:4c:fc:d9
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Authority Key Identifier
            Critical: True
            Issuer: 
                DNS name: "test.com"
            Serial Number:
                214123

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ae:a7:a9:51:9d:c6:f3:6d:dc:98:c8:5f:0a:36:b4:8e:
        7f:f9:ee:aa:f4:4b:e8:83:ad:27:a1:4e:08:31:b8:ca:
        02:26:3c:42:ce:e2:e3:36:0d:af:48:4e:dc:a8:e0:2e:
        d2:49:b5:17:4f:4c:76:8b:ba:ff:49:0f:f0:d6:df:dd:
        6c:e4:67:5d:47:88:79:25:03:d5:29:24:d1:61:99:c7:
        41:3c:51:64:d6:49:85:fe:0e:9d:da:ef:49:a6:c0:80:
        2e:ab:d8:c2:f5:c4:f6:0a:e9:43:7a:81:f5:05:5e:ce:
        0b:9c:e2:d4:8c:0b:6e:6e:de:24:ef:31:5d:ca:21:31
    Fingerprint (MD5):
        70:0D:78:19:C3:80:CF:EF:FC:B0:DD:B9:0F:E4:97:D4
    Fingerprint (SHA1):
        A0:DE:76:6B:DB:34:E7:62:65:12:04:B6:38:F3:F2:9C:AD:E2:A6:26

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #455: Certificate Authority Key Identifier Extension (6) - PASSED

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cert_extensions -S -n TestExt7 -t u,u,u -o /tmp/cert -s CN=TestExt7, E=TestExt7@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cert_extensions/test.args
certutil options:
1
2
rfc822@name.tld
3
test.com
8
1.2.3.4
9
OID.0.2.213
10
0
10
n
n


Generating key.  This may take a few moments...

Enter the type of the distribution point name:
1 - Full Name
2 - Relative Name
Any other number to finish
Choice:  > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Select one of the following for the reason flags
0 - unused
1 - keyCompromise
2 - caCompromise
3 - affiliationChanged
4 - superseded
5 - cessationOfOperation
6 - certificateHold
Any other number to finishChoice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cert_extensions -L -n TestExt7
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f2:07:08
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 15:57:13 2012
            Not After : Thu Feb 28 15:57:13 2013
        Subject: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b8:be:4d:00:47:92:97:9d:45:51:80:8d:44:f8:82:18:
                    34:d5:ea:dc:4e:cc:32:63:77:e8:7e:8d:df:56:43:b5:
                    70:15:5e:ba:4e:f8:69:10:60:63:96:90:3b:ef:74:1b:
                    cf:10:2a:2d:19:1b:14:cd:6d:c6:f3:da:8a:8f:db:8a:
                    b8:cf:28:55:66:fa:d0:a9:e9:b6:d3:7e:53:40:36:f9:
                    15:53:83:e5:ca:df:53:06:b1:74:80:38:e8:04:b5:39:
                    e2:51:ac:88:ce:c1:a3:ea:d3:dd:d7:29:48:7e:a0:76:
                    b6:07:99:ab:9a:da:f6:d8:3d:af:84:80:63:96:a3:2b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: CRL Distribution Points
            Distribution point:
                RFC822 Name: "rfc822@name.tld"
                DNS name: "test.com"
                IP Address:
                    87:07:31:2e:32:2e:33:2e:34
                Registered ID: OID.2.955.79.73.68.46.48.46.50.46.50.49.51
                Reasons:
                    80
                    (7 least significant bits unused)

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        63:54:17:6a:a3:7e:f7:e5:02:ce:7f:be:d1:87:da:d5:
        c1:56:f9:69:52:17:e5:16:74:88:c7:1f:90:25:76:7a:
        c2:bd:24:22:44:6b:30:7a:1b:20:cc:2a:d4:48:f2:c1:
        ae:73:61:28:31:b0:b0:22:1f:b7:fe:f4:21:1f:f2:c8:
        01:8e:85:fd:38:8b:33:9f:f5:47:30:2d:08:c4:17:e1:
        1d:ea:a0:b9:f1:8d:41:58:3e:58:03:32:ff:6e:a6:b1:
        90:71:5c:b5:57:ee:1c:b6:e0:01:51:cb:af:75:65:cd:
        38:08:44:38:73:ff:4f:fe:dc:e5:70:3e:62:c2:0a:8b
    Fingerprint (MD5):
        3F:96:E5:13:87:44:03:12:95:94:4E:CF:3D:FA:EA:20
    Fingerprint (SHA1):
        B9:B4:0B:D1:83:4A:F2:8C:EF:07:C8:5B:81:FF:56:2A:BA:97:C4:99

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #456: CRL Distribution Points Extension (7) - PASSED

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cert_extensions -S -n TestExt8 -t u,u,u -o /tmp/cert -s CN=TestExt8, E=TestExt8@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cert_extensions/test.args
certutil options:
2
SN=asdfsdf
4
3
test.com
10
n
n


Generating key.  This may take a few moments...

Enter the type of the distribution point name:
1 - Full Name
2 - Relative Name
Any other number to finish
Choice:  > Enter the relative name: 

Select one of the following for the reason flags
0 - unused
1 - keyCompromise
2 - caCompromise
3 - affiliationChanged
4 - superseded
5 - cessationOfOperation
6 - certificateHold
Any other number to finishChoice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cert_extensions -L -n TestExt8
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f2:07:08
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 15:57:13 2012
            Not After : Thu Feb 28 15:57:13 2013
        Subject: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:28:64:11:b1:66:1f:f2:97:06:aa:0e:dd:ee:cc:8e:
                    0d:f6:10:53:0e:7f:77:71:b8:d8:de:2b:e2:a9:20:bc:
                    a9:9b:8b:71:08:a6:71:e4:8c:1e:cb:0d:a1:d9:90:8b:
                    f9:10:b3:f7:87:89:ed:9d:43:43:63:0b:fb:cd:f0:b5:
                    17:66:04:98:24:a0:ca:0a:ae:13:3f:f9:8d:7e:b2:08:
                    f8:56:1b:d2:bb:9e:3f:a9:24:2d:bd:ad:cd:b3:17:b5:
                    09:c4:47:5b:d3:84:03:fb:8d:2f:5a:63:b7:e2:89:ce:
                    b4:9a:40:ea:12:37:ee:e3:72:d3:7a:ed:b2:b0:55:6d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: CRL Distribution Points
            Distribution point:
                RDN: "SN=asdfsdf"
                Reasons:
                    08
                    (7 least significant bits unused)
                CRL issuer: 
                    DNS name: "test.com"

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        89:33:c3:91:ba:94:dc:78:75:6f:57:32:c5:c0:40:ca:
        2b:5f:77:3d:5a:21:bd:97:44:7a:66:3a:d9:e6:28:93:
        97:af:5a:87:46:14:2c:66:5f:93:68:79:09:fc:87:8b:
        39:87:00:f7:97:46:89:a4:19:d6:ff:09:6e:d2:0c:d3:
        9d:df:ed:54:7d:a5:95:7c:e5:68:d3:cd:3f:c4:33:9b:
        c1:c7:99:19:17:68:19:16:01:24:ca:45:51:57:b9:82:
        44:42:f0:59:2e:81:b0:dc:87:40:88:16:08:a2:4e:5e:
        c8:2f:e8:d2:02:51:a8:95:54:5b:cb:61:96:12:83:08
    Fingerprint (MD5):
        8A:68:82:39:DB:CD:A1:00:B4:89:94:EB:67:55:E6:1E
    Fingerprint (SHA1):
        D8:B5:87:40:3F:80:D0:F1:AB:78:95:DD:8E:3C:FC:00:76:F8:B2:4D

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #457: CRL Distribution Points Extension (8) - PASSED

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cert_extensions -S -n TestExt9 -t u,u,u -o /tmp/cert -s CN=TestExt9, E=TestExt9@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -5 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cert_extensions/test.args
certutil options:
0
1
2
10
n


Generating key.  This may take a few moments...

0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cert_extensions -L -n TestExt9
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f2:07:09
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 15:57:13 2012
            Not After : Thu Feb 28 15:57:13 2013
        Subject: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bb:84:23:d7:ad:c9:b0:06:a1:c0:30:a7:c3:15:45:ed:
                    31:f8:ad:e9:c8:d6:c8:28:83:de:ae:1f:aa:a9:57:4b:
                    89:2d:41:58:ea:b5:a9:7c:5b:51:36:ce:30:2b:62:09:
                    e5:db:60:f2:4d:21:27:45:e8:34:ac:e3:a1:5f:a7:db:
                    2d:7a:8c:67:8d:d1:67:3f:27:30:4d:9d:ee:59:cd:12:
                    fd:9c:da:c5:d6:c8:77:58:29:d6:cf:16:a7:86:26:e6:
                    21:63:b2:87:98:e7:cd:ae:b5:50:f5:4b:2b:3b:44:1c:
                    9d:7d:cc:5d:57:88:d2:c5:cd:13:a1:c6:32:77:33:47
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL Client,SSL Server,S/MIME>

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        38:8c:56:27:64:63:42:e5:23:4d:89:a3:77:a9:04:4f:
        bf:39:18:5e:74:46:43:a7:90:32:3c:2b:12:a6:91:17:
        be:f9:fd:48:12:d0:36:06:84:ec:96:7e:69:d3:4e:c5:
        53:b9:9d:da:bf:64:b3:0b:52:bb:7c:bd:d9:a3:b2:5e:
        bc:d1:14:b9:f0:4e:41:a4:ef:13:8e:80:88:e1:ec:8c:
        0e:8a:76:0f:e6:ac:1b:cd:d6:00:39:20:40:c6:fb:f0:
        3e:d4:e9:29:aa:27:b2:88:38:60:7f:a0:d2:e1:ba:ed:
        84:e4:d9:f8:11:ae:d6:08:70:07:ad:ae:f5:7d:5a:68
    Fingerprint (MD5):
        2B:61:7B:72:35:1A:67:40:52:E0:03:86:F0:6E:B2:20
    Fingerprint (SHA1):
        85:24:EF:D3:A7:8E:46:C1:64:4E:52:52:D3:7D:EB:B3:F7:A9:2B:E9

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #458: Certificate Type Extension (9) - PASSED

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cert_extensions -S -n TestExt10 -t u,u,u -o /tmp/cert -s CN=TestExt10, E=TestExt10@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -6 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cert_extensions/test.args
certutil options:
0
1
2
3
4
5
6
10
y


Generating key.  This may take a few moments...

0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
 > 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
 > 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
 > 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
 > 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
 > 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
 > 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
 > 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
 > Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cert_extensions -L -n TestExt10
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f2:07:0a
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain Vi
            ew,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 15:57:14 2012
            Not After : Thu Feb 28 15:57:14 2013
        Subject: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain V
            iew,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cf:4a:03:43:c5:9d:0c:ee:d4:f6:ce:95:d5:57:d8:2b:
                    2d:84:2e:29:85:45:33:07:68:66:6b:01:97:87:0d:79:
                    ff:20:44:32:ca:2e:ab:00:f7:bf:8a:1d:d3:d6:8f:37:
                    60:69:b4:5c:44:b9:77:35:48:90:55:2b:e4:d5:7e:34:
                    ac:13:c5:30:7b:4a:2b:1e:66:32:f3:7c:a7:63:09:8c:
                    48:2b:ae:2b:12:75:de:a8:d2:40:bb:f3:e3:7d:a5:81:
                    1e:75:6a:06:00:a9:5b:f0:83:38:77:21:16:6f:4b:40:
                    ad:05:b9:b3:cf:2c:ca:85:14:fd:e5:48:b5:9c:e6:99
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Extended Key Usage
            Critical: True
                TLS Web Server Authentication Certificate
                TLS Web Client Authentication Certificate
                Code Signing Certificate
                E-Mail Protection Certificate
                Time Stamping Certifcate
                OCSP Responder Certificate
                Strong Crypto Export Approved

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        28:2e:2d:1c:62:d2:c9:2d:94:e4:22:2e:2f:86:9a:99:
        17:5c:22:3e:9b:fc:ad:27:06:7d:48:4f:43:76:a1:61:
        b8:6a:44:2b:2d:b1:ea:fa:ed:11:14:7d:ab:27:3d:d0:
        32:7f:f4:b7:58:4b:87:31:4c:31:00:12:5f:25:18:47:
        63:7b:18:e7:9b:31:58:55:64:17:4f:2c:3e:84:ed:be:
        b2:8b:8e:cb:20:11:8b:5e:bc:6d:f4:24:ba:fa:9e:8b:
        58:2c:17:ad:38:eb:a7:59:1c:85:fc:cc:ed:52:60:ff:
        e0:ee:f8:e5:21:c9:85:5f:32:bf:fa:80:f8:6b:75:b7
    Fingerprint (MD5):
        7D:0E:92:E1:96:C2:AC:CB:14:04:EE:38:FC:D7:E7:7C
    Fingerprint (SHA1):
        96:CA:0C:B9:C4:B0:87:A9:A9:30:93:90:01:3B:FE:9D:19:90:FA:4A

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #459: Extended Key Usage Extension (10) - PASSED

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cert_extensions -S -n TestExt11 -t u,u,u -o /tmp/cert -s CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cert_extensions/test.args
certutil options:

1
2
3
4
5
6
10
n


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cert_extensions -L -n TestExt11
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f2:07:0a
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain Vi
            ew,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 15:57:14 2012
            Not After : Thu Feb 28 15:57:14 2013
        Subject: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain V
            iew,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ab:39:bb:f6:50:65:4f:37:a9:b7:bb:01:c1:b8:8d:b1:
                    eb:bf:ee:f8:26:04:82:5f:f0:21:0d:05:29:e9:95:bf:
                    e3:5f:98:fd:e6:92:9d:2a:fd:85:47:0f:ad:75:8d:f5:
                    aa:4a:82:d8:e4:e6:70:67:d5:1e:56:5c:f3:36:52:0d:
                    bd:8c:57:10:b7:03:08:a9:88:a7:d5:bb:ee:04:e4:b6:
                    85:86:c0:3d:e5:8a:77:af:04:ce:0c:f4:9a:ac:73:c5:
                    b7:11:db:aa:fc:5b:bc:a3:a5:d3:3b:2d:55:5d:cc:4c:
                    22:94:81:b6:ee:e8:0e:de:07:bb:e5:43:48:63:9d:37
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Key Usage
            Usages: Non-Repudiation
                    Key Encipherment
                    Data Encipherment
                    Key Agreement
                    Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        a7:75:10:05:10:13:f0:af:5c:1b:58:1f:05:b7:c0:2a:
        6c:11:80:cd:62:b6:07:63:dc:ad:20:51:88:23:76:1b:
        59:4a:c8:bb:7d:97:35:53:c9:b4:4e:1a:f9:2d:93:ac:
        27:05:f8:98:c8:9f:ad:b7:0f:f0:2b:fc:f8:dd:5b:d6:
        ab:aa:0f:b9:19:5c:de:e1:49:60:e3:b4:0b:2e:bb:6e:
        3d:7e:e6:40:67:1f:49:6c:0c:96:db:c4:d6:f5:a3:cf:
        49:f6:82:f8:c9:84:d4:e7:73:d7:2a:4d:93:48:68:a7:
        b6:87:46:54:5d:9f:9f:9a:cf:67:a9:9e:37:2a:78:24
    Fingerprint (MD5):
        B0:E4:EB:19:B9:A6:6C:0C:0E:6C:13:F3:71:CF:52:B4
    Fingerprint (SHA1):
        71:08:59:7A:98:47:97:E6:77:A7:3A:CE:39:34:08:58:92:22:39:0F

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #460: Certificate Key Usage Extension (11) - PASSED
cert.sh: Create A Password Test Cert  ==============
cert.sh: Create A Password Test Ca  --------
cert.sh: Creating a CA Certificate PasswordCA ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/dbpass
cert.sh: Creating CA Cert DB --------------------------
certutil -s "CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/dbpass -f ../tests.pw
cert.sh: #461: Creating CA Cert DB - PASSED
cert.sh: Loading root cert module to CA Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/dbpass

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #462: Loading root cert module to CA Cert DB - PASSED
cert.sh: Certificate initialized ----------
cert.sh: Creating CA Cert PasswordCA  --------------------------
certutil -s "CN=NSS Password Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCA -t CTu,CTu,CTu -v 600 -x -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/dbpass -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #463: Creating CA Cert PasswordCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n PasswordCA -r -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/dbpass -o root.cert
cert.sh: #464: Exporting Root Cert - PASSED
cert.sh: Changing password on Password Test Cert's Cert DB --------------------------
certutil -W -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/dbpass -f ../tests.pw -@ ../tests.fipspw
Password changed successfully.
cert.sh: #465: Changing password on Password Test Cert's Cert DB - PASSED
cert.sh: Generate Certificate for Password Test Cert with new password --------------------------
certutil -s "CN=Password Test Cert, E=password@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCert -c PasswordCA -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/dbpass -f ../tests.fipspw -z ../tests_noise


Generating key.  This may take a few moments...

cert.sh: #466: Generate Certificate for Password Test Cert with new password - PASSED
cert.sh SUCCESS: PASSWORD passed
cert.sh: Verify Certificate for Password Test Cert with new password --------------------------
certutil -V -n PasswordCert -u S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/dbpass -f ../tests.fipspw
certutil: certificate is valid
cert.sh: #467: Verify Certificate for Password Test Cert with new password - PASSED
cert.sh: Creating Distrusted Certificate
cert.sh: Initializing Distrusted's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/distrust -f ../tests.pw
cert.sh: #468: Initializing Distrusted's Cert DB - PASSED
cert.sh: Loading root cert module to Distrusted's Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/distrust

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #469: Loading root cert module to Distrusted's Cert DB - PASSED
cert.sh: Import Root CA for Distrusted --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/distrust -i ../CA/TestCA.ca.cert
cert.sh: #470: Import Root CA for Distrusted - PASSED
cert.sh: Import EC Root CA for Distrusted --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/distrust -i ../CA/TestCA-ec.ca.cert
cert.sh: #471: Import EC Root CA for Distrusted - PASSED
cert.sh: Generate Cert Request for Distrusted --------------------------
certutil -s "CN=Distrusted, E=Distrusted@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/distrust -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #472: Generate Cert Request for Distrusted - PASSED
cert.sh: Sign Distrusted's Request --------------------------
certutil -C -c TestCA -m 2000 -v 60 -d ../CA -i req -o Distrusted.cert -f ../tests.pw 
cert.sh: #473: Sign Distrusted's Request - PASSED
cert.sh: Import Distrusted's Cert --------------------------
certutil -A -n Distrusted -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/distrust -f ../tests.pw -i Distrusted.cert
cert.sh: #474: Import Distrusted's Cert - PASSED
cert.sh SUCCESS: Distrusted's Cert Created
cert.sh: Generate EC Cert Request for Distrusted --------------------------
certutil -s "CN=Distrusted, E=Distrusted-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/distrust -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #475: Generate EC Cert Request for Distrusted - PASSED
cert.sh: Sign Distrusted's EC Request --------------------------
certutil -C -c TestCA-ec -m 2000 -v 60 -d ../CA -i req -o Distrusted-ec.cert -f ../tests.pw 
cert.sh: #476: Sign Distrusted's EC Request - PASSED
cert.sh: Import Distrusted's EC Cert --------------------------
certutil -A -n Distrusted-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/distrust -f ../tests.pw -i Distrusted-ec.cert
cert.sh: #477: Import Distrusted's EC Cert - PASSED
cert.sh SUCCESS: Distrusted's EC Cert Created
cert.sh: Generate mixed EC Cert Request for Distrusted --------------------------
certutil -s "CN=Distrusted, E=Distrusted-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/distrust -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #478: Generate mixed EC Cert Request for Distrusted - PASSED
cert.sh: Sign Distrusted's EC Request with RSA --------------------------
certutil -C -c TestCA -m 12000 -v 60 -d ../CA -i req -o Distrusted-ecmixed.cert -f ../tests.pw 
cert.sh: #479: Sign Distrusted's EC Request with RSA - PASSED
cert.sh: Import Distrusted's mixed EC Cert --------------------------
certutil -A -n Distrusted-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/distrust -f ../tests.pw -i Distrusted-ecmixed.cert
cert.sh: #480: Import Distrusted's mixed EC Cert - PASSED
cert.sh SUCCESS: Distrusted's mixed EC Cert Created
cert.sh: Mark CERT as unstrusted --------------------------
certutil -M -n Distrusted -t p,p,p -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/distrust -f ../tests.pw
cert.sh: #481: Mark CERT as unstrusted - PASSED
cert.sh: Creating Distrusted Intermediate
cert.sh: Creating a CA Certificate DistrustedCA ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/CA
cert.sh: Creating CA Cert DistrustedCA  --------------------------
certutil -s "CN=DistrustedCA, E=DistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n DistrustedCA -t ,, -v 600 -c TestCA -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2010


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #482: Creating CA Cert DistrustedCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n DistrustedCA -r -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/CA -o root.cert
cert.sh: #483: Exporting Root Cert - PASSED
cert.sh: Import Distrusted Intermediate --------------------------
certutil -A -n DistrustedCA -t p,p,p -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/distrust -i ../CA/DistrustedCA.ca.cert
cert.sh: #484: Import Distrusted Intermediate - PASSED
cert.sh: Generate Cert Request for Leaf Chained to Distrusted CA --------------------------
certutil -s "CN=LeafChainedToDistrustedCA, E=LeafChainedToDistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/distrust -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #485: Generate Cert Request for Leaf Chained to Distrusted CA - PASSED
cp: `./req' and `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/CA/req' are the same file
cert.sh: Sign LeafChainedToDistrustedCA's Request --------------------------
certutil -C -c DistrustedCA -m 100 -v 60 -d ../CA -i req -o LeafChainedToDistrustedCA.cert -f ../tests.pw
cert.sh: #486: Sign LeafChainedToDistrustedCA's Request - PASSED
cert.sh: Import LeafChainedToDistrustedCA's Cert  -t u,u,u --------------------------
certutil -A -n LeafChainedToDistrustedCA -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/distrust -f ../tests.pw -i LeafChainedToDistrustedCA.cert
cert.sh: #487: Import LeafChainedToDistrustedCA's Cert  -t u,u,u - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Server --------------------------
certutil -V -n LeafChainedToDistrustedCA -u V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user.
cert.sh: #488: Verify LeafChainedToDistrustedCA Cert for SSL Server - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Client --------------------------
certutil -V -n LeafChainedToDistrustedCA -u C -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user.
cert.sh: #489: Verify LeafChainedToDistrustedCA Cert for SSL Client - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for Email signer --------------------------
certutil -V -n LeafChainedToDistrustedCA -u S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user.
cert.sh: #490: Verify LeafChainedToDistrustedCA Cert for Email signer - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for Email recipient --------------------------
certutil -V -n LeafChainedToDistrustedCA -u R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user.
cert.sh: #491: Verify LeafChainedToDistrustedCA Cert for Email recipient - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for OCSP responder --------------------------
certutil -V -n LeafChainedToDistrustedCA -u O -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/distrust -f ../tests.pw
certutil: certificate is invalid: Certificate type not approved for application.
cert.sh: #492: Verify LeafChainedToDistrustedCA Cert for OCSP responder - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for Object Signer --------------------------
certutil -V -n LeafChainedToDistrustedCA -u J -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/distrust -f ../tests.pw
certutil: certificate is invalid: Certificate type not approved for application.
cert.sh: #493: Verify LeafChainedToDistrustedCA Cert for Object Signer - PASSED
cert.sh: Verify Distrusted Cert for SSL Server --------------------------
certutil -V -n Distrusted -u V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #494: Verify Distrusted Cert for SSL Server - PASSED
cert.sh: Verify Distrusted Cert for SSL Client --------------------------
certutil -V -n Distrusted -u C -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #495: Verify Distrusted Cert for SSL Client - PASSED
cert.sh: Verify Distrusted Cert for Email signer --------------------------
certutil -V -n Distrusted -u S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #496: Verify Distrusted Cert for Email signer - PASSED
cert.sh: Verify Distrusted Cert for Email recipient --------------------------
certutil -V -n Distrusted -u R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #497: Verify Distrusted Cert for Email recipient - PASSED
cert.sh: Verify Distrusted Cert for OCSP responder --------------------------
certutil -V -n Distrusted -u O -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/distrust -f ../tests.pw
certutil: certificate is invalid: Certificate type not approved for application.
cert.sh: #498: Verify Distrusted Cert for OCSP responder - PASSED
cert.sh: Verify Distrusted Cert for Object Signer --------------------------
certutil -V -n Distrusted -u J -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #499: Verify Distrusted Cert for Object Signer - PASSED
cert.sh: OCSP response creation selftest
cert.sh: perform selftest --------------------------
ocspresp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/serverCA serverCA chain-1-serverCA -f ../tests.pw
cert.sh: #500: perform selftest - PASSED
cert.sh: Creating Client CA Issued Certificates Range 40 - 52 ===
cert.sh: Generate Cert Request for TestUser40 --------------------------
certutil -s "CN=TestUser40, E=TestUser40@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #501: Generate Cert Request for TestUser40 - PASSED
cert.sh: Sign TestUser40's Request --------------------------
certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o TestUser40.cert -f ../tests.pw 
cert.sh: #502: Sign TestUser40's Request - PASSED
cert.sh: Import TestUser40's Cert --------------------------
certutil -A -n TestUser40 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser40.cert
cert.sh: #503: Import TestUser40's Cert - PASSED
cert.sh SUCCESS: TestUser40's Cert Created
cert.sh: Generate EC Cert Request for TestUser40 --------------------------
certutil -s "CN=TestUser40, E=TestUser40-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #504: Generate EC Cert Request for TestUser40 - PASSED
cert.sh: Sign TestUser40's EC Request --------------------------
certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o TestUser40-ec.cert -f ../tests.pw 
cert.sh: #505: Sign TestUser40's EC Request - PASSED
cert.sh: Import TestUser40's EC Cert --------------------------
certutil -A -n TestUser40-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser40-ec.cert
cert.sh: #506: Import TestUser40's EC Cert - PASSED
cert.sh SUCCESS: TestUser40's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser40 --------------------------
certutil -s "CN=TestUser40, E=TestUser40-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #507: Generate mixed EC Cert Request for TestUser40 - PASSED
cert.sh: Sign TestUser40's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o TestUser40-ecmixed.cert -f ../tests.pw 
cert.sh: #508: Sign TestUser40's EC Request with RSA - PASSED
cert.sh: Import TestUser40's mixed EC Cert --------------------------
certutil -A -n TestUser40-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser40-ecmixed.cert
cert.sh: #509: Import TestUser40's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser40's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser41 --------------------------
certutil -s "CN=TestUser41, E=TestUser41@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #510: Generate Cert Request for TestUser41 - PASSED
cert.sh: Sign TestUser41's Request --------------------------
certutil -C -c TestCA -m 41 -v 60 -d ../CA -i req -o TestUser41.cert -f ../tests.pw 
cert.sh: #511: Sign TestUser41's Request - PASSED
cert.sh: Import TestUser41's Cert --------------------------
certutil -A -n TestUser41 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser41.cert
cert.sh: #512: Import TestUser41's Cert - PASSED
cert.sh SUCCESS: TestUser41's Cert Created
cert.sh: Generate EC Cert Request for TestUser41 --------------------------
certutil -s "CN=TestUser41, E=TestUser41-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #513: Generate EC Cert Request for TestUser41 - PASSED
cert.sh: Sign TestUser41's EC Request --------------------------
certutil -C -c TestCA-ec -m 41 -v 60 -d ../CA -i req -o TestUser41-ec.cert -f ../tests.pw 
cert.sh: #514: Sign TestUser41's EC Request - PASSED
cert.sh: Import TestUser41's EC Cert --------------------------
certutil -A -n TestUser41-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser41-ec.cert
cert.sh: #515: Import TestUser41's EC Cert - PASSED
cert.sh SUCCESS: TestUser41's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser41 --------------------------
certutil -s "CN=TestUser41, E=TestUser41-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #516: Generate mixed EC Cert Request for TestUser41 - PASSED
cert.sh: Sign TestUser41's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10041 -v 60 -d ../CA -i req -o TestUser41-ecmixed.cert -f ../tests.pw 
cert.sh: #517: Sign TestUser41's EC Request with RSA - PASSED
cert.sh: Import TestUser41's mixed EC Cert --------------------------
certutil -A -n TestUser41-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser41-ecmixed.cert
cert.sh: #518: Import TestUser41's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser41's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser42 --------------------------
certutil -s "CN=TestUser42, E=TestUser42@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #519: Generate Cert Request for TestUser42 - PASSED
cert.sh: Sign TestUser42's Request --------------------------
certutil -C -c TestCA -m 42 -v 60 -d ../CA -i req -o TestUser42.cert -f ../tests.pw 
cert.sh: #520: Sign TestUser42's Request - PASSED
cert.sh: Import TestUser42's Cert --------------------------
certutil -A -n TestUser42 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser42.cert
cert.sh: #521: Import TestUser42's Cert - PASSED
cert.sh SUCCESS: TestUser42's Cert Created
cert.sh: Generate EC Cert Request for TestUser42 --------------------------
certutil -s "CN=TestUser42, E=TestUser42-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #522: Generate EC Cert Request for TestUser42 - PASSED
cert.sh: Sign TestUser42's EC Request --------------------------
certutil -C -c TestCA-ec -m 42 -v 60 -d ../CA -i req -o TestUser42-ec.cert -f ../tests.pw 
cert.sh: #523: Sign TestUser42's EC Request - PASSED
cert.sh: Import TestUser42's EC Cert --------------------------
certutil -A -n TestUser42-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser42-ec.cert
cert.sh: #524: Import TestUser42's EC Cert - PASSED
cert.sh SUCCESS: TestUser42's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser42 --------------------------
certutil -s "CN=TestUser42, E=TestUser42-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #525: Generate mixed EC Cert Request for TestUser42 - PASSED
cert.sh: Sign TestUser42's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10042 -v 60 -d ../CA -i req -o TestUser42-ecmixed.cert -f ../tests.pw 
cert.sh: #526: Sign TestUser42's EC Request with RSA - PASSED
cert.sh: Import TestUser42's mixed EC Cert --------------------------
certutil -A -n TestUser42-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser42-ecmixed.cert
cert.sh: #527: Import TestUser42's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser42's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser43 --------------------------
certutil -s "CN=TestUser43, E=TestUser43@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #528: Generate Cert Request for TestUser43 - PASSED
cert.sh: Sign TestUser43's Request --------------------------
certutil -C -c TestCA -m 43 -v 60 -d ../CA -i req -o TestUser43.cert -f ../tests.pw 
cert.sh: #529: Sign TestUser43's Request - PASSED
cert.sh: Import TestUser43's Cert --------------------------
certutil -A -n TestUser43 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser43.cert
cert.sh: #530: Import TestUser43's Cert - PASSED
cert.sh SUCCESS: TestUser43's Cert Created
cert.sh: Generate EC Cert Request for TestUser43 --------------------------
certutil -s "CN=TestUser43, E=TestUser43-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #531: Generate EC Cert Request for TestUser43 - PASSED
cert.sh: Sign TestUser43's EC Request --------------------------
certutil -C -c TestCA-ec -m 43 -v 60 -d ../CA -i req -o TestUser43-ec.cert -f ../tests.pw 
cert.sh: #532: Sign TestUser43's EC Request - PASSED
cert.sh: Import TestUser43's EC Cert --------------------------
certutil -A -n TestUser43-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser43-ec.cert
cert.sh: #533: Import TestUser43's EC Cert - PASSED
cert.sh SUCCESS: TestUser43's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser43 --------------------------
certutil -s "CN=TestUser43, E=TestUser43-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #534: Generate mixed EC Cert Request for TestUser43 - PASSED
cert.sh: Sign TestUser43's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10043 -v 60 -d ../CA -i req -o TestUser43-ecmixed.cert -f ../tests.pw 
cert.sh: #535: Sign TestUser43's EC Request with RSA - PASSED
cert.sh: Import TestUser43's mixed EC Cert --------------------------
certutil -A -n TestUser43-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser43-ecmixed.cert
cert.sh: #536: Import TestUser43's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser43's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser44 --------------------------
certutil -s "CN=TestUser44, E=TestUser44@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #537: Generate Cert Request for TestUser44 - PASSED
cert.sh: Sign TestUser44's Request --------------------------
certutil -C -c TestCA -m 44 -v 60 -d ../CA -i req -o TestUser44.cert -f ../tests.pw 
cert.sh: #538: Sign TestUser44's Request - PASSED
cert.sh: Import TestUser44's Cert --------------------------
certutil -A -n TestUser44 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser44.cert
cert.sh: #539: Import TestUser44's Cert - PASSED
cert.sh SUCCESS: TestUser44's Cert Created
cert.sh: Generate EC Cert Request for TestUser44 --------------------------
certutil -s "CN=TestUser44, E=TestUser44-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #540: Generate EC Cert Request for TestUser44 - PASSED
cert.sh: Sign TestUser44's EC Request --------------------------
certutil -C -c TestCA-ec -m 44 -v 60 -d ../CA -i req -o TestUser44-ec.cert -f ../tests.pw 
cert.sh: #541: Sign TestUser44's EC Request - PASSED
cert.sh: Import TestUser44's EC Cert --------------------------
certutil -A -n TestUser44-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser44-ec.cert
cert.sh: #542: Import TestUser44's EC Cert - PASSED
cert.sh SUCCESS: TestUser44's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser44 --------------------------
certutil -s "CN=TestUser44, E=TestUser44-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #543: Generate mixed EC Cert Request for TestUser44 - PASSED
cert.sh: Sign TestUser44's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10044 -v 60 -d ../CA -i req -o TestUser44-ecmixed.cert -f ../tests.pw 
cert.sh: #544: Sign TestUser44's EC Request with RSA - PASSED
cert.sh: Import TestUser44's mixed EC Cert --------------------------
certutil -A -n TestUser44-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser44-ecmixed.cert
cert.sh: #545: Import TestUser44's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser44's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser45 --------------------------
certutil -s "CN=TestUser45, E=TestUser45@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #546: Generate Cert Request for TestUser45 - PASSED
cert.sh: Sign TestUser45's Request --------------------------
certutil -C -c TestCA -m 45 -v 60 -d ../CA -i req -o TestUser45.cert -f ../tests.pw 
cert.sh: #547: Sign TestUser45's Request - PASSED
cert.sh: Import TestUser45's Cert --------------------------
certutil -A -n TestUser45 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser45.cert
cert.sh: #548: Import TestUser45's Cert - PASSED
cert.sh SUCCESS: TestUser45's Cert Created
cert.sh: Generate EC Cert Request for TestUser45 --------------------------
certutil -s "CN=TestUser45, E=TestUser45-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #549: Generate EC Cert Request for TestUser45 - PASSED
cert.sh: Sign TestUser45's EC Request --------------------------
certutil -C -c TestCA-ec -m 45 -v 60 -d ../CA -i req -o TestUser45-ec.cert -f ../tests.pw 
cert.sh: #550: Sign TestUser45's EC Request - PASSED
cert.sh: Import TestUser45's EC Cert --------------------------
certutil -A -n TestUser45-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser45-ec.cert
cert.sh: #551: Import TestUser45's EC Cert - PASSED
cert.sh SUCCESS: TestUser45's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser45 --------------------------
certutil -s "CN=TestUser45, E=TestUser45-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #552: Generate mixed EC Cert Request for TestUser45 - PASSED
cert.sh: Sign TestUser45's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10045 -v 60 -d ../CA -i req -o TestUser45-ecmixed.cert -f ../tests.pw 
cert.sh: #553: Sign TestUser45's EC Request with RSA - PASSED
cert.sh: Import TestUser45's mixed EC Cert --------------------------
certutil -A -n TestUser45-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser45-ecmixed.cert
cert.sh: #554: Import TestUser45's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser45's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser46 --------------------------
certutil -s "CN=TestUser46, E=TestUser46@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #555: Generate Cert Request for TestUser46 - PASSED
cert.sh: Sign TestUser46's Request --------------------------
certutil -C -c TestCA -m 46 -v 60 -d ../CA -i req -o TestUser46.cert -f ../tests.pw 
cert.sh: #556: Sign TestUser46's Request - PASSED
cert.sh: Import TestUser46's Cert --------------------------
certutil -A -n TestUser46 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser46.cert
cert.sh: #557: Import TestUser46's Cert - PASSED
cert.sh SUCCESS: TestUser46's Cert Created
cert.sh: Generate EC Cert Request for TestUser46 --------------------------
certutil -s "CN=TestUser46, E=TestUser46-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #558: Generate EC Cert Request for TestUser46 - PASSED
cert.sh: Sign TestUser46's EC Request --------------------------
certutil -C -c TestCA-ec -m 46 -v 60 -d ../CA -i req -o TestUser46-ec.cert -f ../tests.pw 
cert.sh: #559: Sign TestUser46's EC Request - PASSED
cert.sh: Import TestUser46's EC Cert --------------------------
certutil -A -n TestUser46-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser46-ec.cert
cert.sh: #560: Import TestUser46's EC Cert - PASSED
cert.sh SUCCESS: TestUser46's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser46 --------------------------
certutil -s "CN=TestUser46, E=TestUser46-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #561: Generate mixed EC Cert Request for TestUser46 - PASSED
cert.sh: Sign TestUser46's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10046 -v 60 -d ../CA -i req -o TestUser46-ecmixed.cert -f ../tests.pw 
cert.sh: #562: Sign TestUser46's EC Request with RSA - PASSED
cert.sh: Import TestUser46's mixed EC Cert --------------------------
certutil -A -n TestUser46-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser46-ecmixed.cert
cert.sh: #563: Import TestUser46's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser46's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser47 --------------------------
certutil -s "CN=TestUser47, E=TestUser47@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #564: Generate Cert Request for TestUser47 - PASSED
cert.sh: Sign TestUser47's Request --------------------------
certutil -C -c TestCA -m 47 -v 60 -d ../CA -i req -o TestUser47.cert -f ../tests.pw 
cert.sh: #565: Sign TestUser47's Request - PASSED
cert.sh: Import TestUser47's Cert --------------------------
certutil -A -n TestUser47 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser47.cert
cert.sh: #566: Import TestUser47's Cert - PASSED
cert.sh SUCCESS: TestUser47's Cert Created
cert.sh: Generate EC Cert Request for TestUser47 --------------------------
certutil -s "CN=TestUser47, E=TestUser47-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #567: Generate EC Cert Request for TestUser47 - PASSED
cert.sh: Sign TestUser47's EC Request --------------------------
certutil -C -c TestCA-ec -m 47 -v 60 -d ../CA -i req -o TestUser47-ec.cert -f ../tests.pw 
cert.sh: #568: Sign TestUser47's EC Request - PASSED
cert.sh: Import TestUser47's EC Cert --------------------------
certutil -A -n TestUser47-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser47-ec.cert
cert.sh: #569: Import TestUser47's EC Cert - PASSED
cert.sh SUCCESS: TestUser47's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser47 --------------------------
certutil -s "CN=TestUser47, E=TestUser47-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #570: Generate mixed EC Cert Request for TestUser47 - PASSED
cert.sh: Sign TestUser47's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10047 -v 60 -d ../CA -i req -o TestUser47-ecmixed.cert -f ../tests.pw 
cert.sh: #571: Sign TestUser47's EC Request with RSA - PASSED
cert.sh: Import TestUser47's mixed EC Cert --------------------------
certutil -A -n TestUser47-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser47-ecmixed.cert
cert.sh: #572: Import TestUser47's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser47's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser48 --------------------------
certutil -s "CN=TestUser48, E=TestUser48@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #573: Generate Cert Request for TestUser48 - PASSED
cert.sh: Sign TestUser48's Request --------------------------
certutil -C -c TestCA -m 48 -v 60 -d ../CA -i req -o TestUser48.cert -f ../tests.pw 
cert.sh: #574: Sign TestUser48's Request - PASSED
cert.sh: Import TestUser48's Cert --------------------------
certutil -A -n TestUser48 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser48.cert
cert.sh: #575: Import TestUser48's Cert - PASSED
cert.sh SUCCESS: TestUser48's Cert Created
cert.sh: Generate EC Cert Request for TestUser48 --------------------------
certutil -s "CN=TestUser48, E=TestUser48-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #576: Generate EC Cert Request for TestUser48 - PASSED
cert.sh: Sign TestUser48's EC Request --------------------------
certutil -C -c TestCA-ec -m 48 -v 60 -d ../CA -i req -o TestUser48-ec.cert -f ../tests.pw 
cert.sh: #577: Sign TestUser48's EC Request - PASSED
cert.sh: Import TestUser48's EC Cert --------------------------
certutil -A -n TestUser48-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser48-ec.cert
cert.sh: #578: Import TestUser48's EC Cert - PASSED
cert.sh SUCCESS: TestUser48's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser48 --------------------------
certutil -s "CN=TestUser48, E=TestUser48-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #579: Generate mixed EC Cert Request for TestUser48 - PASSED
cert.sh: Sign TestUser48's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10048 -v 60 -d ../CA -i req -o TestUser48-ecmixed.cert -f ../tests.pw 
cert.sh: #580: Sign TestUser48's EC Request with RSA - PASSED
cert.sh: Import TestUser48's mixed EC Cert --------------------------
certutil -A -n TestUser48-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser48-ecmixed.cert
cert.sh: #581: Import TestUser48's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser48's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser49 --------------------------
certutil -s "CN=TestUser49, E=TestUser49@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #582: Generate Cert Request for TestUser49 - PASSED
cert.sh: Sign TestUser49's Request --------------------------
certutil -C -c TestCA -m 49 -v 60 -d ../CA -i req -o TestUser49.cert -f ../tests.pw 
cert.sh: #583: Sign TestUser49's Request - PASSED
cert.sh: Import TestUser49's Cert --------------------------
certutil -A -n TestUser49 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser49.cert
cert.sh: #584: Import TestUser49's Cert - PASSED
cert.sh SUCCESS: TestUser49's Cert Created
cert.sh: Generate EC Cert Request for TestUser49 --------------------------
certutil -s "CN=TestUser49, E=TestUser49-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #585: Generate EC Cert Request for TestUser49 - PASSED
cert.sh: Sign TestUser49's EC Request --------------------------
certutil -C -c TestCA-ec -m 49 -v 60 -d ../CA -i req -o TestUser49-ec.cert -f ../tests.pw 
cert.sh: #586: Sign TestUser49's EC Request - PASSED
cert.sh: Import TestUser49's EC Cert --------------------------
certutil -A -n TestUser49-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser49-ec.cert
cert.sh: #587: Import TestUser49's EC Cert - PASSED
cert.sh SUCCESS: TestUser49's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser49 --------------------------
certutil -s "CN=TestUser49, E=TestUser49-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #588: Generate mixed EC Cert Request for TestUser49 - PASSED
cert.sh: Sign TestUser49's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10049 -v 60 -d ../CA -i req -o TestUser49-ecmixed.cert -f ../tests.pw 
cert.sh: #589: Sign TestUser49's EC Request with RSA - PASSED
cert.sh: Import TestUser49's mixed EC Cert --------------------------
certutil -A -n TestUser49-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser49-ecmixed.cert
cert.sh: #590: Import TestUser49's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser49's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser50 --------------------------
certutil -s "CN=TestUser50, E=TestUser50@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #591: Generate Cert Request for TestUser50 - PASSED
cert.sh: Sign TestUser50's Request --------------------------
certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o TestUser50.cert -f ../tests.pw 
cert.sh: #592: Sign TestUser50's Request - PASSED
cert.sh: Import TestUser50's Cert --------------------------
certutil -A -n TestUser50 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser50.cert
cert.sh: #593: Import TestUser50's Cert - PASSED
cert.sh SUCCESS: TestUser50's Cert Created
cert.sh: Generate EC Cert Request for TestUser50 --------------------------
certutil -s "CN=TestUser50, E=TestUser50-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #594: Generate EC Cert Request for TestUser50 - PASSED
cert.sh: Sign TestUser50's EC Request --------------------------
certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o TestUser50-ec.cert -f ../tests.pw 
cert.sh: #595: Sign TestUser50's EC Request - PASSED
cert.sh: Import TestUser50's EC Cert --------------------------
certutil -A -n TestUser50-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser50-ec.cert
cert.sh: #596: Import TestUser50's EC Cert - PASSED
cert.sh SUCCESS: TestUser50's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser50 --------------------------
certutil -s "CN=TestUser50, E=TestUser50-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #597: Generate mixed EC Cert Request for TestUser50 - PASSED
cert.sh: Sign TestUser50's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o TestUser50-ecmixed.cert -f ../tests.pw 
cert.sh: #598: Sign TestUser50's EC Request with RSA - PASSED
cert.sh: Import TestUser50's mixed EC Cert --------------------------
certutil -A -n TestUser50-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser50-ecmixed.cert
cert.sh: #599: Import TestUser50's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser50's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser51 --------------------------
certutil -s "CN=TestUser51, E=TestUser51@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #600: Generate Cert Request for TestUser51 - PASSED
cert.sh: Sign TestUser51's Request --------------------------
certutil -C -c TestCA -m 51 -v 60 -d ../CA -i req -o TestUser51.cert -f ../tests.pw 
cert.sh: #601: Sign TestUser51's Request - PASSED
cert.sh: Import TestUser51's Cert --------------------------
certutil -A -n TestUser51 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser51.cert
cert.sh: #602: Import TestUser51's Cert - PASSED
cert.sh SUCCESS: TestUser51's Cert Created
cert.sh: Generate EC Cert Request for TestUser51 --------------------------
certutil -s "CN=TestUser51, E=TestUser51-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #603: Generate EC Cert Request for TestUser51 - PASSED
cert.sh: Sign TestUser51's EC Request --------------------------
certutil -C -c TestCA-ec -m 51 -v 60 -d ../CA -i req -o TestUser51-ec.cert -f ../tests.pw 
cert.sh: #604: Sign TestUser51's EC Request - PASSED
cert.sh: Import TestUser51's EC Cert --------------------------
certutil -A -n TestUser51-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser51-ec.cert
cert.sh: #605: Import TestUser51's EC Cert - PASSED
cert.sh SUCCESS: TestUser51's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser51 --------------------------
certutil -s "CN=TestUser51, E=TestUser51-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #606: Generate mixed EC Cert Request for TestUser51 - PASSED
cert.sh: Sign TestUser51's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10051 -v 60 -d ../CA -i req -o TestUser51-ecmixed.cert -f ../tests.pw 
cert.sh: #607: Sign TestUser51's EC Request with RSA - PASSED
cert.sh: Import TestUser51's mixed EC Cert --------------------------
certutil -A -n TestUser51-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser51-ecmixed.cert
cert.sh: #608: Import TestUser51's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser51's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser52 --------------------------
certutil -s "CN=TestUser52, E=TestUser52@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #609: Generate Cert Request for TestUser52 - PASSED
cert.sh: Sign TestUser52's Request --------------------------
certutil -C -c TestCA -m 52 -v 60 -d ../CA -i req -o TestUser52.cert -f ../tests.pw 
cert.sh: #610: Sign TestUser52's Request - PASSED
cert.sh: Import TestUser52's Cert --------------------------
certutil -A -n TestUser52 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser52.cert
cert.sh: #611: Import TestUser52's Cert - PASSED
cert.sh SUCCESS: TestUser52's Cert Created
cert.sh: Generate EC Cert Request for TestUser52 --------------------------
certutil -s "CN=TestUser52, E=TestUser52-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #612: Generate EC Cert Request for TestUser52 - PASSED
cert.sh: Sign TestUser52's EC Request --------------------------
certutil -C -c TestCA-ec -m 52 -v 60 -d ../CA -i req -o TestUser52-ec.cert -f ../tests.pw 
cert.sh: #613: Sign TestUser52's EC Request - PASSED
cert.sh: Import TestUser52's EC Cert --------------------------
certutil -A -n TestUser52-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser52-ec.cert
cert.sh: #614: Import TestUser52's EC Cert - PASSED
cert.sh SUCCESS: TestUser52's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser52 --------------------------
certutil -s "CN=TestUser52, E=TestUser52-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #615: Generate mixed EC Cert Request for TestUser52 - PASSED
cert.sh: Sign TestUser52's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10052 -v 60 -d ../CA -i req -o TestUser52-ecmixed.cert -f ../tests.pw 
cert.sh: #616: Sign TestUser52's EC Request with RSA - PASSED
cert.sh: Import TestUser52's mixed EC Cert --------------------------
certutil -A -n TestUser52-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser52-ecmixed.cert
cert.sh: #617: Import TestUser52's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser52's mixed EC Cert Created
cert.sh: Creating CA CRL =====================================
cert.sh: Generating CRL for range 40-42 TestCA authority --------------------------
crlutil -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/CA -G -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or
cert.sh: #618: Generating CRL for range 40-42 TestCA authority - PASSED
cert.sh: Generating CRL (ECC) for range 40-42 TestCA-ec authority --------------------------
crlutil -q -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/CA -G -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or-ec
cert.sh: #619: Generating CRL (ECC) for range 40-42 TestCA-ec authority - PASSED
cert.sh: Modifying CA CRL by adding one more cert ============
cert.sh: Modify CRL by adding one more cert --------------------------
crlutil -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or1 -i ../server/root.crl_40-42_or
cert.sh: #620: Modify CRL by adding one more cert - PASSED
cert.sh: Modify CRL (ECC) by adding one more cert --------------------------
crlutil -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or1-ec -i ../server/root.crl_40-42_or-ec
cert.sh: #621: Modify CRL (ECC) by adding one more cert - PASSED
cert.sh: Modifying CA CRL by removing one cert ===============
cert.sh: Modify CRL by removing one cert --------------------------
crlutil -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1
cert.sh: #622: Modify CRL by removing one cert - PASSED
cert.sh: Modify CRL (ECC) by removing one cert --------------------------
crlutil -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42-ec -i ../server/root.crl_40-42_or1-ec
cert.sh: #623: Modify CRL (ECC) by removing one cert - PASSED
cert.sh: Creating CA CRL for groups 1 and 2  ===============
cert.sh: Creating CRL for groups 1 and 2 --------------------------
crlutil -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_43-48 -i ../server/root.crl_40-42
cert.sh: #624: Creating CRL for groups 1 and 2 - PASSED
cert.sh: Creating CRL (ECC) for groups 1 and 2 --------------------------
crlutil -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_43-48-ec -i ../server/root.crl_40-42-ec
cert.sh: #625: Creating CRL (ECC) for groups 1 and 2 - PASSED
cert.sh: Creating CA CRL for groups 1, 2 and 3  ===============
cert.sh: Creating CRL for groups 1, 2 and 3 --------------------------
crlutil -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_49-52 -i ../server/root.crl_43-48
cert.sh: #626: Creating CRL for groups 1, 2 and 3 - PASSED
cert.sh: Creating CRL (ECC) for groups 1, 2 and 3 --------------------------
crlutil -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_49-52-ec -i ../server/root.crl_43-48-ec
cert.sh: #627: Creating CRL (ECC) for groups 1, 2 and 3 - PASSED
cert.sh: Importing Server CA Issued CRL for certs  trough 52
cert.sh: Importing CRL for groups 1 --------------------------
crlutil -q -D -n TestCA -f ../tests.pw -d ../server
crlutil: could not find TestCA's CRL: No matching CRL was found.
crlutil: could not find the issuer TestCA's CRL: No matching CRL was found.
cert.sh: #628: Importing CRL for groups 1 - PASSED
cert.sh: Importing CRL for groups 1 --------------------------
crlutil -q -I -i ../server/root.crl_40-42 -n TestCA -f ../tests.pw -d ../server
cert.sh: #629: Importing CRL for groups 1 - PASSED
cert.sh: Importing CRL (ECC) for groups 1 --------------------------
crlutil -q -D -n TestCA-ec -f ../tests.pw -d ../server
crlutil: could not find TestCA-ec's CRL: No matching CRL was found.
crlutil: could not find the issuer TestCA-ec's CRL: No matching CRL was found.
cert.sh: #630: Importing CRL (ECC) for groups 1 - PASSED
cert.sh: Importing CRL (ECC) for groups 1 --------------------------
crlutil -q -I -i ../server/root.crl_40-42-ec -n TestCA-ec -f ../tests.pw -d ../server
cert.sh: #631: Importing CRL (ECC) for groups 1 - PASSED
cert.sh SUCCESS: SSL CRL prep passed
cert.sh cert.sh: finished cert.sh
TIMESTAMP cert END: Wed Nov 28 10:57:34 EST 2012
Running tests for dbtests
TIMESTAMP dbtests BEGIN: Wed Nov 28 10:57:34 EST 2012
dbtests.sh: CERT and Key DB Tests ===============================

---------------------------------------------------------------
| test opening the database read/write in a nonexisting directory
---------------------------------------------------------------
certutil: function failed: The certificate/key database is in an old, unsupported format.
dbtests.sh: #632: Certutil didn't work in a nonexisting dir 255 - PASSED
dbdir selected is ./non_existent_dir

ERROR: Directory "./non_existent_dir" does not exist.
dbtest: function failed: The certificate/key database is in an old, unsupported format.
dbtests.sh: #633: Dbtest readonly didn't work in a nonexisting dir 46 - PASSED

---------------------------------------------------------------
| test force opening the database in a nonexisting directory
---------------------------------------------------------------
dbdir selected is ./non_existent_dir

ERROR: Directory "./non_existent_dir" does not exist.
dbtests.sh: #634: Dbtest force succeeded in a nonexisting dir 0 - PASSED

---------------------------------------------------------------
| test opening the database readonly in an empty directory
---------------------------------------------------------------
tstclnt: unable to open cert database: The certificate/key database is in an old, unsupported format.
dbtests.sh: #635: Tstclnt didn't work in an empty dir 1 - PASSED
dbdir selected is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/emptydir

database checked is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/emptydir/secmod.db
ERROR: File "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/emptydir/secmod.db" does not exist.
database checked is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/emptydir/cert8.db
ERROR: File "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/emptydir/cert8.db" does not exist.
database checked is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/emptydir/key3.db
ERROR: File "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/emptydir/key3.db" does not exist.
dbtest: function failed: The certificate/key database is in an old, unsupported format.
dbtests.sh: #636: Dbtest readonly didn't work in an empty dir 46 - PASSED
dbdir selected is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/emptydir

dbtests.sh: #637: Dbtest logout after empty DB Init has key - PASSED
dbdir selected is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/emptydir

dbtests.sh: #638: Dbtest password DB Init maintains needlogin state - PASSED
certutil: could not find certificate named "xxxx": security library: bad database.
dbtests.sh: #639: Certutil didn't work in an empty dir 255 - PASSED

---------------------------------------------------------------
| test force opening the database  readonly in a empty directory
---------------------------------------------------------------
dbdir selected is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/emptydir

database checked is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/emptydir/secmod.db
ERROR: File "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/emptydir/secmod.db" does not exist.
database checked is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/emptydir/cert8.db
ERROR: File "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/emptydir/cert8.db" does not exist.
database checked is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/emptydir/key3.db
ERROR: File "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/emptydir/key3.db" does not exist.
dbtests.sh: #640: Dbtest force readonly succeeded in an empty dir 0 - PASSED

---------------------------------------------------------------
| test opening the database r/w in a readonly directory
---------------------------------------------------------------
dbdir selected is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/ronlydir

ERROR: Directory "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/ronlydir" is not writeable.
database checked is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/ronlydir/secmod.db
ERROR: File "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/ronlydir/secmod.db" is not writeable.
database checked is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/ronlydir/cert8.db
ERROR: File "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/ronlydir/cert8.db" is not writeable.
database checked is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/ronlydir/key3.db
ERROR: File "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/ronlydir/key3.db" is not writeable.
dbtest: function failed: The certificate/key database is in an old, unsupported format.
dbtests.sh: #641: Dbtest r/w didn't work in an readonly dir 46 - PASSED
certutil: could not find certificate named "TestUser": security library: bad database.
dbtests.sh: #642: Certutil didn't work in an readonly dir 255 - PASSED

---------------------------------------------------------------
| test opening the database ronly in a readonly directory
---------------------------------------------------------------
dbdir selected is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/ronlydir

database checked is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/ronlydir/secmod.db
database checked is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/ronlydir/cert8.db
database checked is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/ronlydir/key3.db
dbtests.sh: #643: Dbtest readonly succeeded in a readonly dir 0 - PASSED

---------------------------------------------------------------
| test force opening the database  r/w in a readonly directory
---------------------------------------------------------------
dbdir selected is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/ronlydir

ERROR: Directory "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/ronlydir" is not writeable.
database checked is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/ronlydir/secmod.db
ERROR: File "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/ronlydir/secmod.db" is not writeable.
database checked is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/ronlydir/cert8.db
ERROR: File "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/ronlydir/cert8.db" is not writeable.
database checked is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/ronlydir/key3.db
ERROR: File "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/ronlydir/key3.db" is not writeable.
dbtests.sh: #644: Dbtest force succeeded in a readonly dir 0 - PASSED

---------------------------------------------------------------
| ls -l /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/ronlydir
---------------------------------------------------------------
dr-xr-xr-x. 2 tinderbox tinderbox   4096 Nov 28 10:57 /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/ronlydir
-r--------. 1 tinderbox tinderbox 131072 Nov 28 10:57 /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/ronlydir/cert8.db
-r--------. 1 tinderbox tinderbox  49152 Nov 28 10:57 /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/ronlydir/key3.db
-r--r-----. 1 tinderbox tinderbox    394 Nov 28 10:57 /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/ronlydir/req
-r--------. 1 tinderbox tinderbox  16384 Nov 28 10:57 /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/ronlydir/secmod.db
-r--r-----. 1 tinderbox tinderbox    609 Nov 28 10:57 /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/ronlydir/TestUser.cert
-r--r-----. 1 tinderbox tinderbox    579 Nov 28 10:57 /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/ronlydir/TestUser-ec.cert
-r--r-----. 1 tinderbox tinderbox    576 Nov 28 10:57 /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/ronlydir/TestUser-ecmixed.cert

---------------------------------------------------------------
| test creating a new cert with a conflicting nickname
---------------------------------------------------------------
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/conflictdir
certutil: could not add certificate to token or database: Error adding certificate to database.
dbtests.sh: #645: Nicknane conflict test, could not import conflict nickname 255 - PASSED

---------------------------------------------------------------
| test importing an old cert to a conflicting nickname
---------------------------------------------------------------
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 40 (0x28)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:57 2012
            Not After : Tue Nov 28 15:56:57 2017
        Subject: "CN=Bob,E=Bob@bogus.com,O=BOGUS NSS,L=Mountain View,ST=Calif
            ornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ca:86:ad:c4:c8:43:aa:4e:99:60:ca:f8:d6:71:4e:1e:
                    d8:4c:43:01:be:b4:9d:ca:d6:14:b0:c3:08:1c:f0:91:
                    7a:8f:56:05:59:99:fd:8a:aa:fb:07:b9:ef:46:7d:21:
                    19:50:5d:47:74:bc:13:67:3e:45:d3:99:e4:95:4b:31:
                    5b:5b:e4:b7:4a:76:df:ae:bc:c9:dc:19:48:2f:60:66:
                    e6:40:a8:b7:57:f1:61:ea:f8:b1:41:ec:98:73:3b:e0:
                    ad:26:0e:11:94:93:13:c4:7f:f4:13:a1:6c:15:31:fc:
                    03:aa:fd:78:0b:da:e0:d3:b6:2a:52:e9:6d:21:cb:b1
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        6e:4d:31:1f:cc:57:26:92:37:2e:02:80:e2:84:c8:12:
        53:d0:83:92:84:c5:02:c6:af:9c:24:0f:f7:8f:b3:88:
        62:a2:8b:44:2f:82:72:b2:4e:8f:8d:b3:e8:e2:3f:36:
        0d:bb:00:c9:22:33:09:03:1a:ce:8e:a9:cd:cd:1e:a0:
        47:3b:31:bf:1c:cc:e5:4c:12:a3:de:ac:8a:19:9f:7b:
        6c:32:94:6b:c7:c8:03:b6:7b:9c:17:bc:d1:f3:20:5a:
        2b:03:97:da:13:16:0b:f6:00:9b:ab:97:ff:8d:81:64:
        62:8e:20:b4:0d:6c:54:14:b4:ea:7d:b4:30:27:86:9c
    Fingerprint (MD5):
        E3:CF:DE:35:FC:06:49:B5:16:23:AC:D6:21:0E:06:CA
    Fingerprint (SHA1):
        81:CC:5B:CF:6B:D8:E2:10:ED:B1:FB:7C:41:FD:D9:93:97:29:24:6F

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

dbtests.sh: #646: Nicknane conflict test-setting nickname conflict was correctly rejected - PASSED
TIMESTAMP dbtests END: Wed Nov 28 10:57:34 EST 2012
Running tests for tools
TIMESTAMP tools BEGIN: Wed Nov 28 10:57:34 EST 2012
tools.sh: Tools Tests with ECC ===============================
tools.sh: Exporting Alice's email cert & key - default ciphers
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #647: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                49:2e:a8:fe:1c:91:1f:77:15:4c:f2:02:de:ee:94:f1
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #648: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #649: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's email EC cert & key---------------
pk12util -o Alice-ec.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \
         -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #650: Exporting Alice's email EC cert & key (pk12util -o)  - PASSED
tools.sh: Importing Alice's email EC cert & key --------------
pk12util -i Alice-ec.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #651: Importing Alice's email EC cert & key (pk12util -i)  - PASSED
tools.sh: Listing Alice's pk12 EC file -----------------
pk12util -l Alice-ec.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice-ec

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                70:26:57:10:44:c0:d5:ae:8f:00:97:b1:80:7c:2f:f3
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: X9.62 ECDSA signature with SHA-1
        Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ
            ia,C=US"
        Validity:
            Not Before: Wed Nov 28 15:56:51 2012
            Not After : Tue Nov 28 15:56:51 2062
        Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor
            nia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: X9.62 elliptic curve public key
                Args:
                    06:05:2b:81:04:00:23
            EC Public Key:
                PublicValue:
                    04:00:07:4e:a1:16:c3:4a:cd:8b:16:57:9e:e4:a2:f2:
                    31:f1:fa:59:c1:7f:bc:6c:22:68:c4:ee:6f:27:aa:81:
                    df:95:fd:4f:5d:fa:2f:cd:f0:55:eb:2f:8c:d2:04:0c:
                    64:1c:90:e8:24:90:df:bd:ac:28:f2:ba:82:ec:ae:63:
                    d2:0c:b9:00:51:8c:25:3a:54:d5:e2:36:35:7d:3e:19:
                    66:f0:0e:60:9e:d5:89:b4:ef:ef:f0:5a:a8:de:0d:e3:
                    1d:dc:da:a4:46:5d:08:68:ce:f3:da:df:2c:8d:87:bb:
                    c4:b0:f8:8a:01:9e:29:b2:45:ba:a0:10:46:d8:3e:f1:
                    76:fc:9c:8e:3b
                Curve: SECG elliptic curve secp521r1 (aka NIST P-521)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: X9.62 ECDSA signature with SHA-1
    Signature:
        30:81:88:02:42:00:c1:73:6f:d0:bc:1e:0d:1c:00:e8:
        f2:f4:6f:ad:d0:f6:82:c1:49:08:f4:a3:28:8a:da:a4:
        48:b0:39:f4:a5:37:02:d3:76:90:ce:9f:e6:c2:bb:42:
        ab:cc:8e:24:b2:ed:97:5d:49:93:1d:ca:7c:03:7e:b3:
        1d:a1:fd:c3:23:dd:f9:02:42:01:8e:4d:8c:3c:39:4d:
        80:4e:be:dd:13:e4:64:51:d2:ac:39:8b:38:db:7e:f9:
        67:56:96:1c:46:0f:6a:5f:8d:3d:d4:80:41:d9:84:39:
        04:d3:ac:c7:e0:6e:5b:0b:66:cf:0f:87:2c:8e:9a:48:
        73:09:9f:e2:83:4e:33:00:c0:73:79
    Fingerprint (MD5):
        DB:38:33:3A:9E:15:07:96:B0:8A:3C:04:DD:91:82:39
    Fingerprint (SHA1):
        A2:D9:85:5B:91:CE:23:41:1B:6F:54:65:41:A0:C6:DE:68:80:5A:0D

    Friendly Name: TestCA-ec

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: X9.62 ECDSA signature with SHA-1
        Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ
            ia,C=US"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice-ec@bogus.com,O=BOGUS NSS,L=Mountain View,S
            T=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: X9.62 elliptic curve public key
                Args:
                    06:05:2b:81:04:00:22
            EC Public Key:
                PublicValue:
                    04:d1:06:9d:29:29:f0:ca:c6:be:05:80:03:3c:12:c3:
                    cf:90:d3:2e:4f:4a:06:b6:9b:15:33:1c:2a:f6:92:28:
                    02:49:86:fd:cf:e3:46:9b:fb:ef:58:93:15:0c:35:5a:
                    3b:08:70:fd:72:a7:1a:1c:8c:08:77:d8:33:46:42:0c:
                    05:c4:c3:e7:a6:bb:e8:1e:d3:ef:26:77:41:73:79:57:
                    ba:94:c6:0b:f2:42:03:69:3d:1b:23:97:a2:86:21:82:
                    c4
                Curve: SECG elliptic curve secp384r1 (aka NIST P-384)
    Signature Algorithm: X9.62 ECDSA signature with SHA-1
    Signature:
        30:81:87:02:42:01:b0:e4:6d:ca:34:d2:44:47:85:fd:
        5e:fe:ef:0f:a5:a3:e9:13:35:46:79:8f:12:5b:50:97:
        78:c0:3c:75:0f:d5:e8:0e:94:c8:cb:31:ee:7e:c1:92:
        13:7a:27:72:ff:d3:70:5a:55:94:b3:d8:59:2d:76:e1:
        79:8b:d3:b8:76:74:1f:02:41:17:5a:76:fd:15:0b:72:
        ec:8f:3a:9e:d6:81:71:08:41:b8:8b:a5:be:74:44:47:
        27:1f:3a:d6:40:f8:fc:fd:9a:90:2e:b6:37:77:71:1f:
        57:f2:db:cb:99:a0:7a:a8:9e:ad:0a:55:18:99:75:84:
        53:35:c4:c9:3f:c8:f3:90:90:8c
    Fingerprint (MD5):
        A0:64:11:01:F6:F1:08:BA:B2:3C:6C:5F:97:37:D5:AE
    Fingerprint (SHA1):
        B6:30:66:A3:6F:1F:5A:29:80:75:D9:89:47:8F:73:63:78:B2:4E:44

    Friendly Name: Alice-ec

tools.sh: #652: Listing Alice's pk12 EC file (pk12util -l)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c RC2-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #653: Exporting with [RC2-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC
        Parameters:
            Salt:
                29:fe:bd:a1:b9:7c:a2:78:2b:7c:1a:9f:ea:b9:a8:67
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #654: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #655: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c RC2-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #656: Exporting with [RC2-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC
        Parameters:
            Salt:
                5f:4d:8c:60:50:75:e9:17:81:3d:33:70:bd:af:5d:08
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #657: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #658: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c RC2-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #659: Exporting with [RC2-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC
        Parameters:
            Salt:
                6a:90:41:47:f6:de:d9:a6:a3:5e:48:e9:59:9b:75:b7
            Iteration Count: 2000 (0x7d0)
tools.sh: #660: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #661: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #662: Exporting with [DES-EDE3-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                09:da:a1:57:a2:8e:89:50:64:70:1c:64:03:9b:2c:1d
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #663: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #664: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #665: Exporting with [DES-EDE3-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                8a:48:26:17:6d:6f:78:52:c7:d2:1b:12:a8:26:48:9a
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #666: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #667: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #668: Exporting with [DES-EDE3-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                a9:00:cf:5c:5d:72:6d:29:75:21:06:1d:a5:4f:f4:51
            Iteration Count: 2000 (0x7d0)
tools.sh: #669: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #670: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #671: Exporting with [AES-128-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        3e:07:d3:0b:3a:ae:03:53:e8:14:d6:cd:c6:7a:10:56
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-128-CBC
                Args:
                    04:10:7e:c5:60:ee:c2:f7:4d:54:c7:b6:06:2a:59:e7:
                    db:10
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #672: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #673: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #674: Exporting with [AES-128-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        f4:eb:5f:7a:1f:5a:98:eb:3c:34:0d:fd:65:94:e3:d7
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-128-CBC
                Args:
                    04:10:83:46:1a:6c:2c:b9:ff:de:80:7c:e5:68:f1:e9:
                    d0:50
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #675: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #676: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #677: Exporting with [AES-128-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        26:eb:1f:80:ec:9b:ee:e9:66:0b:50:9c:69:96:44:83
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-128-CBC
                Args:
                    04:10:4a:0b:58:df:7c:10:45:96:02:9f:14:14:15:77:
                    58:b8
tools.sh: #678: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #679: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #680: Exporting with [AES-192-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        a3:fb:d3:26:f3:8a:50:89:e0:a1:68:1f:57:96:97:e0
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-192-CBC
                Args:
                    04:10:38:c2:9d:be:9d:2e:53:49:77:f2:57:8b:b5:fd:
                    d1:cb
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #681: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #682: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #683: Exporting with [AES-192-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        06:f9:8b:eb:27:9f:78:57:54:3e:ff:17:6f:34:38:a5
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-192-CBC
                Args:
                    04:10:c1:62:60:f8:f6:e9:80:da:00:a6:00:8a:b6:f2:
                    d1:c9
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #684: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #685: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #686: Exporting with [AES-192-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        d0:2c:39:b7:4c:33:55:21:a3:f8:bd:0f:c5:27:b1:df
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-192-CBC
                Args:
                    04:10:ee:39:29:42:8f:75:39:e6:76:15:ea:21:74:bd:
                    2f:24
tools.sh: #687: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #688: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #689: Exporting with [AES-256-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        8e:de:93:b6:74:84:93:ce:6a:23:ba:1e:f8:81:36:fa
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-256-CBC
                Args:
                    04:10:dd:9b:20:d0:50:6b:6f:72:39:3a:0e:0a:e4:d4:
                    3e:54
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #690: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #691: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #692: Exporting with [AES-256-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        6c:69:25:17:1f:a0:c7:3d:d0:f1:54:32:ac:5a:29:56
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-256-CBC
                Args:
                    04:10:81:8a:38:23:4e:82:b9:d5:0d:c6:03:5e:2d:9a:
                    22:73
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #693: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #694: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #695: Exporting with [AES-256-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        21:50:db:f3:65:e2:7a:f6:d8:0a:9e:b1:89:e4:08:ca
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-256-CBC
                Args:
                    04:10:59:1b:2a:cf:c2:9d:d0:15:a7:71:68:58:e2:0d:
                    7b:8f
tools.sh: #696: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #697: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #698: Exporting with [CAMELLIA-128-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        ab:46:05:3d:56:ef:33:ed:7b:b4:57:32:7e:c2:a3:71
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-128-CBC
                Args:
                    04:10:61:0c:2f:d8:30:d4:8a:57:9d:89:67:46:1d:72:
                    e6:5f
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #699: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #700: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #701: Exporting with [CAMELLIA-128-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        68:c2:c0:0c:af:f0:28:40:0d:1b:90:6a:28:64:8c:3e
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-128-CBC
                Args:
                    04:10:c7:64:15:e5:cf:bf:ff:69:70:da:1f:6d:a1:c3:
                    15:d9
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #702: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #703: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #704: Exporting with [CAMELLIA-128-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        6b:b8:c8:81:ca:28:b7:d4:97:40:9b:50:b4:25:66:3b
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-128-CBC
                Args:
                    04:10:58:d0:9f:f8:da:b8:b5:82:3c:31:3e:37:24:39:
                    20:e2
tools.sh: #705: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #706: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #707: Exporting with [CAMELLIA-192-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        07:38:e3:0d:f9:f4:91:24:e5:1a:fc:bf:83:59:bc:b9
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-192-CBC
                Args:
                    04:10:9d:a0:51:27:89:93:b6:03:5d:0d:fc:4d:af:c6:
                    b3:81
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #708: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #709: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #710: Exporting with [CAMELLIA-192-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        cf:64:fe:df:74:b2:63:93:68:58:3b:38:29:92:57:e2
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-192-CBC
                Args:
                    04:10:98:98:70:33:c6:b8:27:25:94:e2:44:61:6b:30:
                    3b:68
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #711: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #712: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #713: Exporting with [CAMELLIA-192-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        49:e6:05:5f:14:84:e8:a9:4a:3a:03:6d:03:33:b0:25
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-192-CBC
                Args:
                    04:10:2f:99:f0:28:b2:8b:f5:68:c8:46:d9:52:6e:fe:
                    d5:39
tools.sh: #714: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #715: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #716: Exporting with [CAMELLIA-256-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        2e:18:cd:cb:a3:48:0d:66:69:bb:10:ac:a6:27:2d:cd
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-256-CBC
                Args:
                    04:10:7e:e8:44:99:78:c9:20:3c:a9:a7:a0:52:14:02:
                    dc:96
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #717: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #718: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #719: Exporting with [CAMELLIA-256-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        29:d4:45:7a:1d:60:15:c3:13:4a:69:4c:d6:1e:d5:9c
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-256-CBC
                Args:
                    04:10:62:2b:5c:be:62:61:c1:1e:1b:05:e5:ea:c6:0f:
                    c1:d3
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #720: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #721: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #722: Exporting with [CAMELLIA-256-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        6b:9d:78:a8:1b:a8:8e:d3:82:0e:ec:86:49:b1:8e:67
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-256-CBC
                Args:
                    04:10:b4:52:4b:ab:05:9f:14:ab:cf:42:fb:3e:0b:90:
                    8f:b9
tools.sh: #723: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #724: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #725: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
        Parameters:
            Salt:
                1e:14:8f:5d:0e:1d:22:c6:65:4f:69:7d:bf:e5:00:30
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #726: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #727: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #728: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
        Parameters:
            Salt:
                3d:57:92:e5:01:96:82:df:50:e7:0c:84:c4:94:6c:71
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #729: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #730: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #731: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
        Parameters:
            Salt:
                f9:53:c3:2f:8f:c5:14:42:a8:2b:74:8f:69:d5:25:5e
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #732: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #733: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #734: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
        Parameters:
            Salt:
                7d:dd:45:37:28:31:a9:24:39:ac:30:f1:25:b4:e8:b7
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #735: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #736: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #737: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
        Parameters:
            Salt:
                3f:6b:d0:4a:58:1e:a8:bd:21:aa:64:3b:f5:19:26:b4
            Iteration Count: 2000 (0x7d0)
tools.sh: #738: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #739: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #740: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
        Parameters:
            Salt:
                b4:3c:a9:b9:a6:90:53:c7:e7:d5:fa:4e:e8:10:c9:24
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #741: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #742: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #743: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
        Parameters:
            Salt:
                ee:4d:4d:83:f1:9f:ef:ac:d8:00:15:b9:d4:5b:51:15
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #744: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #745: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #746: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
        Parameters:
            Salt:
                9b:5d:e7:2b:88:dd:29:50:46:5b:26:bb:70:82:cc:96
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #747: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #748: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #749: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
        Parameters:
            Salt:
                8b:26:d4:1e:cd:02:af:e6:69:07:0c:49:fc:71:2c:e2
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #750: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #751: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #752: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
        Parameters:
            Salt:
                48:3b:fd:bd:71:00:64:3a:81:48:1e:19:2a:d6:d9:7d
            Iteration Count: 2000 (0x7d0)
tools.sh: #753: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #754: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #755: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
        Parameters:
            Salt:
                95:2f:69:13:fc:d7:ef:9e:ae:d3:d5:4d:4d:7a:f4:69
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #756: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #757: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #758: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
        Parameters:
            Salt:
                1d:60:f8:48:6c:3f:6e:51:cc:22:8d:e4:1b:c3:76:48
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #759: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #760: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #761: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
        Parameters:
            Salt:
                c7:aa:49:01:3f:7a:d2:d8:aa:1d:e5:8b:22:ee:04:12
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #762: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #763: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #764: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
        Parameters:
            Salt:
                9b:58:3d:38:a8:ac:9f:77:3a:b9:61:f6:e5:44:7d:3f
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #765: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #766: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #767: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
        Parameters:
            Salt:
                c6:00:53:9f:d2:ef:c2:e3:7b:3f:65:3e:58:4e:57:72
            Iteration Count: 2000 (0x7d0)
tools.sh: #768: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #769: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #770: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                b8:8f:e3:05:f1:c1:da:94:e7:ff:00:0e:9e:f6:a8:1d
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #771: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #772: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #773: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                9c:4e:62:04:f3:1d:b1:1a:40:ee:d9:2f:63:4c:18:1f
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #774: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #775: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #776: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                70:2e:00:b4:f8:49:ba:6d:9f:4b:59:43:b5:5d:f2:52
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #777: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #778: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #779: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                f6:71:9b:40:85:72:41:65:d3:54:7a:36:c5:2e:d4:82
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #780: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #781: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [default:null]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #782: Exporting with [default:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                55:0b:0f:f2:fc:ce:17:2b:29:04:43:13:44:5b:a9:77
            Iteration Count: 2000 (0x7d0)
tools.sh: #783: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #784: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #785: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                e8:db:a2:22:85:a8:4c:cb:ea:38:a1:db:bb:02:08:0a
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #786: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #787: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #788: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                6a:a1:b5:fb:4f:67:c9:74:13:4d:ec:90:c0:82:ff:6e
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #789: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #790: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #791: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                96:01:8b:67:43:7a:df:c6:2c:72:17:d7:27:23:ac:86
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #792: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #793: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #794: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                40:22:b7:2a:fb:56:7b:29:a8:35:04:fc:d3:91:db:d9
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #795: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #796: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #797: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                b9:b2:a3:8f:37:e0:aa:d3:3b:58:cc:7b:fd:04:77:81
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #798: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #799: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #800: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                c6:59:09:9a:19:b2:34:6c:66:8d:cb:a8:64:38:10:1a
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #801: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #802: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #803: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                8f:70:08:f1:28:84:6f:e2:02:98:66:b1:2e:8b:3d:a8
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #804: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #805: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #806: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                85:d8:12:a0:c8:13:c8:dd:e9:df:c8:64:55:99:a2:b2
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #807: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #808: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #809: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                d6:49:21:f2:8e:09:8f:00:18:e2:ae:ec:55:30:f9:43
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #810: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #811: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #812: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                6f:e0:99:a0:b0:01:87:dc:50:4e:51:82:ab:bc:63:40
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #813: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #814: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c null
pk12util: Algorithm: "null": security library: invalid algorithm.
tools.sh: #815: Exporting with [null:default] (pk12util -o)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #816: Exporting with [default:null] (pk12util -o)  - PASSED
tools.sh: Create objsign cert -------------------------------
signtool -G "objectsigner" -d ../tools/signdir -p "nss"

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit the browser before continuing this operation. Enter 
"y" to continue, or anything else to abort: 

Enter certificate information.  All fields are optional. Acceptable
characters are numbers, letters, spaces, and apostrophes.
certificate common name: organization: organization unit: state or province: country (must be exactly 2 characters): username: email address: generated public/private key pair
certificate request generated
certificate has been signed
certificate "objsigner" added to database
Exported certificate to x509.raw and x509.cacert.
tools.sh: #817: Create objsign cert (signtool -G)  - PASSED
tools.sh: Signing a jar of files ----------------------------
signtool -Z nojs.jar -d ../tools/signdir -p "nss" -k objsigner \
         ../tools/html
Generating ../tools/html/META-INF/manifest.mf file..
--> signjs.html
adding ../tools/html/signjs.html to nojs.jar...(deflated 28%)
--> sign.html
adding ../tools/html/sign.html to nojs.jar...(deflated 26%)
Generating zigbert.sf file..
adding ../tools/html/META-INF/manifest.mf to nojs.jar...(deflated 30%)
adding ../tools/html/META-INF/zigbert.sf to nojs.jar...(deflated 36%)
adding ../tools/html/META-INF/zigbert.rsa to nojs.jar...(deflated 32%)
tree "../tools/html" signed successfully
tools.sh: #818: Signing a jar of files (signtool -Z)  - PASSED
tools.sh: Listing signed files in jar ----------------------
signtool -v nojs.jar -d ../tools/signdir -p nss -k objsigner
archive "nojs.jar" has passed crypto verification.
found a MF master manifest file: META-INF/manifest.mf
found a SF signature manifest file: META-INF/zigbert.sf
  md5 digest on global metainfo: match
  sha digest on global metainfo: match
found a RSA signature file: META-INF/zigbert.rsa

          status   path
    ------------   -------------------
        verified   signjs.html
        verified   sign.html
tools.sh: #819: Listing signed files in jar (signtool -v)  - PASSED
tools.sh: Show who signed jar ------------------------------
signtool -w nojs.jar -d ../tools/signdir

Signer information:

nickname: objsigner
subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org
issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org
tools.sh: #820: Show who signed jar (signtool -w)  - PASSED
tools.sh: Signing a xpi of files ----------------------------
signtool -Z nojs.xpi -X -d ../tools/signdir -p "nss" -k objsigner \
         ../tools/html
Generating ../tools/html/META-INF/manifest.mf file..
--> signjs.html
--> sign.html
Generating zigbert.sf file..
Creating XPI Compatible Archive 
adding ../tools/html/META-INF/zigbert.rsa to nojs.xpi...(deflated 32%)
--> signjs.html
adding ../tools/html/signjs.html to nojs.xpi...(deflated 28%)
--> sign.html
adding ../tools/html/sign.html to nojs.xpi...(deflated 26%)
adding ../tools/html/META-INF/manifest.mf to nojs.xpi...(deflated 30%)
adding ../tools/html/META-INF/zigbert.sf to nojs.xpi...(deflated 36%)
tree "../tools/html" signed successfully
tools.sh: #821: Signing a xpi of files (signtool -Z -X)  - PASSED
tools.sh: Listing signed files in xpi ----------------------
signtool -v nojs.xpi -d ../tools/signdir -p nss -k objsigner
archive "nojs.xpi" has passed crypto verification.
found a RSA signature file: META-INF/zigbert.rsa
found a MF master manifest file: META-INF/manifest.mf
found a SF signature manifest file: META-INF/zigbert.sf
  md5 digest on global metainfo: match
  sha digest on global metainfo: match

          status   path
    ------------   -------------------
        verified   signjs.html
        verified   sign.html
tools.sh: #822: Listing signed files in xpi (signtool -v)  - PASSED
tools.sh: Show who signed xpi ------------------------------
signtool -w nojs.xpi -d ../tools/signdir

Signer information:

nickname: objsigner
subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org
issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org
tools.sh: #823: Show who signed xpi (signtool -w)  - PASSED
TIMESTAMP tools END: Wed Nov 28 10:57:42 EST 2012
Running tests for fips
TIMESTAMP fips BEGIN: Wed Nov 28 10:57:42 EST 2012
fips.sh: FIPS 140 Compliance Tests ===============================
fips.sh: Verify this module is in FIPS mode  -----------------
modutil -dbdir ../fips -list

Listing of PKCS #11 Modules
-----------------------------------------------------------
  1. NSS Internal FIPS PKCS #11 Module
 slots: 1 slot attached
status: loaded

 slot: NSS FIPS 140-2 User Private Key Services
token: NSS FIPS 140-2 Certificate DB

  2. RootCerts
library name: /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so
 slots: 1 slot attached
status: loaded

 slot: NSS Builtin Objects
token: Builtin Object Token
-----------------------------------------------------------
FIPS mode enabled.
fips.sh: #824: Verify this module is in FIPS mode (modutil -chkfips true) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

FIPS_PUB_140_Test_Certificate                                Cu,Cu,Cu
fips.sh: #825: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: List the FIPS module keys -------------------------
certutil -d ../fips -K -f ../tests.fipspw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
< 0> dsa      530572cc3086b9ab5d1dc21f8130d15307813a06   NSS FIPS 140-2 Certificate DB:FIPS_PUB_140_Test_Certificate
fips.sh: #826: List the FIPS module keys (certutil -K) . - PASSED
fips.sh: Attempt to list FIPS module keys with incorrect password
certutil -d ../fips -K -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests.fipsbadpw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
Incorrect password/PIN entered.
certutil: could not authenticate to token NSS FIPS 140-2 Certificate DB.: The security password entered is incorrect.
fips.sh: #827: Attempt to list FIPS module keys with incorrect password (certutil -K) . - PASSED
certutil -K returned 255
fips.sh: Validate the certificate --------------------------
certutil -d ../fips -V -n FIPS_PUB_140_Test_Certificate -u SR -e -f ../tests.fipspw
certutil: certificate is valid
fips.sh: #828: Validate the certificate (certutil -V -e) . - PASSED
fips.sh: Export the certificate and key as a PKCS#12 file --
pk12util -d ../fips -o fips140.p12 -n FIPS_PUB_140_Test_Certificate -w ../tests.fipsp12pw -k ../tests.fipspw
pk12util: PKCS12 EXPORT SUCCESSFUL
fips.sh: #829: Export the certificate and key as a PKCS#12 file (pk12util -o) . - PASSED
fips.sh: Export the certificate as a DER-encoded file ------
certutil -d ../fips -L -n FIPS_PUB_140_Test_Certificate -r -o fips140.crt
fips.sh: #830: Export the certificate as a DER (certutil -L -r) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

FIPS_PUB_140_Test_Certificate                                Cu,Cu,Cu
fips.sh: #831: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: Delete the certificate and key from the FIPS module
certutil -d ../fips -F -n FIPS_PUB_140_Test_Certificate -f ../tests.fipspw
fips.sh: #832: Delete the certificate and key from the FIPS module (certutil -F) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI
fips.sh: #833: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: List the FIPS module keys.
certutil -d ../fips -K -f ../tests.fipspw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
certutil: no keys found
fips.sh: #834: List the FIPS module keys (certutil -K) . - PASSED
fips.sh: Import the certificate and key from the PKCS#12 file
pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw
pk12util: PKCS12 IMPORT SUCCESSFUL
fips.sh: #835: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

FIPS_PUB_140_Test_Certificate                                u,u,u
fips.sh: #836: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: List the FIPS module keys --------------------------
certutil -d ../fips -K -f ../tests.fipspw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
< 0> dsa      530572cc3086b9ab5d1dc21f8130d15307813a06   FIPS_PUB_140_Test_Certificate
fips.sh: #837: List the FIPS module keys (certutil -K) . - PASSED
fips.sh: Delete the certificate from the FIPS module
certutil -d ../fips -D -n FIPS_PUB_140_Test_Certificate
fips.sh: #838: Delete the certificate from the FIPS module (certutil -D) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI
fips.sh: #839: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: Import the certificate and key from the PKCS#12 file
pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw
pk12util: PKCS12 IMPORT SUCCESSFUL
fips.sh: #840: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

FIPS_PUB_140_Test_Certificate                                u,u,u
fips.sh: #841: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: List the FIPS module keys --------------------------
certutil -d ../fips -K -f ../tests.fipspw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
< 0> dsa      530572cc3086b9ab5d1dc21f8130d15307813a06   FIPS_PUB_140_Test_Certificate
fips.sh: #842: List the FIPS module keys (certutil -K) . - PASSED
fips.sh: Run PK11MODE in FIPSMODE  -----------------
pk11mode -d ../fips -p fips- -f ../tests.fipspw
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
**** Total number of TESTS ran in FIPS MODE is 106. ****
**** ALL TESTS PASSED ****
fips.sh: #843: Run PK11MODE in FIPS mode (pk11mode) . - PASSED
fips.sh: Run PK11MODE in Non FIPSMODE  -----------------
pk11mode -d ../fips -p nonfips- -f ../tests.fipspw -n
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
**** Total number of TESTS ran in NON FIPS MODE is 104. ****
**** ALL TESTS PASSED ****
fips.sh: #844: Run PK11MODE in Non FIPS mode (pk11mode -n) . - PASSED
mkdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libcertdb.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libcerthi.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libcrmf.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libcryptohi.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libdbm.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libfreebl3.chk /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libfreebl3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libfreebl.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libjar.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnspr4.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnspr4.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnss3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnss.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssb.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckfw.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssdbm3.chk /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssdbm3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssdbm.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssdev.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnsspki.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnsssysinit.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnsssysinit.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssutil3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssutil.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkcs12.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkcs7.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixparams.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixpki.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixresults.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixstore.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixtop.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixutil.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libplc4.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libplc4.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libplds4.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libplds4.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsmime3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsmime.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsoftokn3.chk /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsoftokn3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsoftokn.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsqlite3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsqlite.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libssl3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libssl.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/fips/mangle
fips.sh: Detect mangled softoken--------------------------
mangling /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/fips/mangle/libsoftokn3.so
mangle -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/fips/mangle/libsoftokn3.so -o -8 -b 5
Changing byte 0x0004e9cd (321997): from 5f (95) to 7f (127)
LD_LIBRARY_PATH=/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/fips/mangle dbtest -r -d ../fips
fips.sh: #845: Init NSS with a corrupted library (dbtest -r) . - PASSED
fips.sh done
TIMESTAMP fips END: Wed Nov 28 10:58:03 EST 2012
Running tests for sdr
TIMESTAMP sdr BEGIN: Wed Nov 28 10:58:03 EST 2012
sdr.sh: SDR Tests ===============================
sdr.sh: Creating an SDR key/SDR Encrypt - Value 1
sdrtest -d . -o /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests.v1.10869 -t "Test1"
sdr.sh: #846: Creating SDR Key/Encrypt - Value 1  - PASSED
sdr.sh: SDR Encrypt - Value 2
sdrtest -d . -o /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests.v2.10869 -t "The quick brown fox jumped over the lazy dog"
sdr.sh: #847: Encrypt - Value 2  - PASSED
sdr.sh: SDR Encrypt - Value 3
sdrtest -d . -o /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests.v3.10869 -t "1234567"
sdr.sh: #848: Encrypt - Value 3  - PASSED
sdr.sh: SDR Decrypt - Value 1
sdrtest -d . -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests.v1.10869 -t "Test1"
sdr.sh: #849: Decrypt - Value 1  - PASSED
sdr.sh: SDR Decrypt - Value 2
sdrtest -d . -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests.v2.10869 -t "The quick brown fox jumped over the lazy dog"
sdr.sh: #850: Decrypt - Value 2  - PASSED
sdr.sh: SDR Decrypt - Value 3
sdrtest -d . -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests.v3.10869 -t "1234567"
sdr.sh: #851: Decrypt - Value 3  - PASSED
TIMESTAMP sdr END: Wed Nov 28 10:58:03 EST 2012
Running tests for crmf
TIMESTAMP crmf BEGIN: Wed Nov 28 10:58:03 EST 2012
crmf.sh: CRMF/CMMF Tests ===============================
crmf.sh: CRMF/CMMF Tests ------------------------------
crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss crmf decode

crmftest v1.0
Generating CRMF request
Decoding CRMF request
crmftest: Processing cert request 0
crmftest: Processing cert request 1
Exiting successfully!!!

crmf.sh: #852: CRMF test . - PASSED
crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss cmmf

crmftest v1.0
Doing CMMF Stuff
Exiting successfully!!!

crmf.sh: #853: CMMF test . - PASSED
TIMESTAMP crmf END: Wed Nov 28 10:58:04 EST 2012
Running tests for smime
TIMESTAMP smime BEGIN: Wed Nov 28 10:58:04 EST 2012
smime.sh: S/MIME Tests with ECC ===============================
smime.sh: Signing Detached Message {SHA1} ------------------
cmsutil -S -T -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA1
smime.sh: #854: Create Detached Signature Alice (SHA1) . - PASSED
cmsutil -D -i alice.dsig.SHA1 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #855: Verifying Alice's Detached Signature (SHA1) . - PASSED
smime.sh: Signing Attached Message (SHA1) ------------------
cmsutil -S -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA1
smime.sh: #856: Create Attached Signature Alice (SHA1) . - PASSED
cmsutil -D -i alice.sig.SHA1 -d ../bobdir -o alice.data.SHA1
smime.sh: #857: Decode Alice's Attached Signature (SHA1) . - PASSED
diff alice.txt alice.data.SHA1
smime.sh: #858: Compare Attached Signed Data and Original (SHA1) . - PASSED
smime.sh: Signing Detached Message ECDSA w/ {SHA1} ------------------
cmsutil -S -T -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA1
smime.sh: #859: Create Detached Signature Alice (ECDSA w/ SHA1) . - PASSED
cmsutil -D -i alice-ec.dsig.SHA1 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #860: Verifying Alice's Detached Signature (ECDSA w/ SHA1) . - PASSED
smime.sh: Signing Attached Message (ECDSA w/ SHA1) ------------------
cmsutil -S -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA1
smime.sh: #861: Create Attached Signature Alice (ECDSA w/ SHA1) . - PASSED
cmsutil -D -i alice-ec.sig.SHA1 -d ../bobdir -o alice-ec.data.SHA1
smime.sh: #862: Decode Alice's Attached Signature (ECDSA w/ SHA1) . - PASSED
diff alice.txt alice-ec.data.SHA1
smime.sh: #863: Compare Attached Signed Data and Original (ECDSA w/ SHA1) . - PASSED
smime.sh: Signing Detached Message {SHA256} ------------------
cmsutil -S -T -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA256
smime.sh: #864: Create Detached Signature Alice (SHA256) . - PASSED
cmsutil -D -i alice.dsig.SHA256 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #865: Verifying Alice's Detached Signature (SHA256) . - PASSED
smime.sh: Signing Attached Message (SHA256) ------------------
cmsutil -S -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA256
smime.sh: #866: Create Attached Signature Alice (SHA256) . - PASSED
cmsutil -D -i alice.sig.SHA256 -d ../bobdir -o alice.data.SHA256
smime.sh: #867: Decode Alice's Attached Signature (SHA256) . - PASSED
diff alice.txt alice.data.SHA256
smime.sh: #868: Compare Attached Signed Data and Original (SHA256) . - PASSED
smime.sh: Signing Detached Message ECDSA w/ {SHA256} ------------------
cmsutil -S -T -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA256
smime.sh: #869: Create Detached Signature Alice (ECDSA w/ SHA256) . - PASSED
cmsutil -D -i alice-ec.dsig.SHA256 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #870: Verifying Alice's Detached Signature (ECDSA w/ SHA256) . - PASSED
smime.sh: Signing Attached Message (ECDSA w/ SHA256) ------------------
cmsutil -S -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA256
smime.sh: #871: Create Attached Signature Alice (ECDSA w/ SHA256) . - PASSED
cmsutil -D -i alice-ec.sig.SHA256 -d ../bobdir -o alice-ec.data.SHA256
smime.sh: #872: Decode Alice's Attached Signature (ECDSA w/ SHA256) . - PASSED
diff alice.txt alice-ec.data.SHA256
smime.sh: #873: Compare Attached Signed Data and Original (ECDSA w/ SHA256) . - PASSED
smime.sh: Signing Detached Message {SHA384} ------------------
cmsutil -S -T -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA384
smime.sh: #874: Create Detached Signature Alice (SHA384) . - PASSED
cmsutil -D -i alice.dsig.SHA384 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #875: Verifying Alice's Detached Signature (SHA384) . - PASSED
smime.sh: Signing Attached Message (SHA384) ------------------
cmsutil -S -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA384
smime.sh: #876: Create Attached Signature Alice (SHA384) . - PASSED
cmsutil -D -i alice.sig.SHA384 -d ../bobdir -o alice.data.SHA384
smime.sh: #877: Decode Alice's Attached Signature (SHA384) . - PASSED
diff alice.txt alice.data.SHA384
smime.sh: #878: Compare Attached Signed Data and Original (SHA384) . - PASSED
smime.sh: Signing Detached Message ECDSA w/ {SHA384} ------------------
cmsutil -S -T -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA384
smime.sh: #879: Create Detached Signature Alice (ECDSA w/ SHA384) . - PASSED
cmsutil -D -i alice-ec.dsig.SHA384 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #880: Verifying Alice's Detached Signature (ECDSA w/ SHA384) . - PASSED
smime.sh: Signing Attached Message (ECDSA w/ SHA384) ------------------
cmsutil -S -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA384
smime.sh: #881: Create Attached Signature Alice (ECDSA w/ SHA384) . - PASSED
cmsutil -D -i alice-ec.sig.SHA384 -d ../bobdir -o alice-ec.data.SHA384
smime.sh: #882: Decode Alice's Attached Signature (ECDSA w/ SHA384) . - PASSED
diff alice.txt alice-ec.data.SHA384
smime.sh: #883: Compare Attached Signed Data and Original (ECDSA w/ SHA384) . - PASSED
smime.sh: Signing Detached Message {SHA512} ------------------
cmsutil -S -T -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA512
smime.sh: #884: Create Detached Signature Alice (SHA512) . - PASSED
cmsutil -D -i alice.dsig.SHA512 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #885: Verifying Alice's Detached Signature (SHA512) . - PASSED
smime.sh: Signing Attached Message (SHA512) ------------------
cmsutil -S -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA512
smime.sh: #886: Create Attached Signature Alice (SHA512) . - PASSED
cmsutil -D -i alice.sig.SHA512 -d ../bobdir -o alice.data.SHA512
smime.sh: #887: Decode Alice's Attached Signature (SHA512) . - PASSED
diff alice.txt alice.data.SHA512
smime.sh: #888: Compare Attached Signed Data and Original (SHA512) . - PASSED
smime.sh: Signing Detached Message ECDSA w/ {SHA512} ------------------
cmsutil -S -T -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA512
smime.sh: #889: Create Detached Signature Alice (ECDSA w/ SHA512) . - PASSED
cmsutil -D -i alice-ec.dsig.SHA512 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #890: Verifying Alice's Detached Signature (ECDSA w/ SHA512) . - PASSED
smime.sh: Signing Attached Message (ECDSA w/ SHA512) ------------------
cmsutil -S -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA512
smime.sh: #891: Create Attached Signature Alice (ECDSA w/ SHA512) . - PASSED
cmsutil -D -i alice-ec.sig.SHA512 -d ../bobdir -o alice-ec.data.SHA512
smime.sh: #892: Decode Alice's Attached Signature (ECDSA w/ SHA512) . - PASSED
diff alice.txt alice-ec.data.SHA512
smime.sh: #893: Compare Attached Signed Data and Original (ECDSA w/ SHA512) . - PASSED
smime.sh: Enveloped Data Tests ------------------------------
cmsutil -E -r bob@bogus.com -i alice.txt -d ../alicedir -p nss \
        -o alice.env
smime.sh: #894: Create Enveloped Data Alice . - PASSED
cmsutil -D -i alice.env -d ../bobdir -p nss -o alice.data1
smime.sh: #895: Decode Enveloped Data Alice . - PASSED
diff alice.txt alice.data1
smime.sh: #896: Compare Decoded Enveloped Data and Original . - PASSED
smime.sh: Testing multiple recipients ------------------------------
cmsutil -E -i alice.txt -d ../alicedir -o alicecc.env \
        -r bob@bogus.com,dave@bogus.com
smime.sh: #897: Create Multiple Recipients Enveloped Data Alice . - PASSED
smime.sh: Testing multiple email addrs ------------------------------
cmsutil -E -i alice.txt -d ../alicedir -o aliceve.env \
        -r eve@bogus.net
smime.sh: #898: Encrypt to a Multiple Email cert . - PASSED
cmsutil -D -i alicecc.env -d ../bobdir -p nss -o alice.data2
smime.sh: #899: Decode Multiple Recipients Enveloped Data Alice by Bob . - PASSED
cmsutil -D -i alicecc.env -d ../dave -p nss -o alice.data3
smime.sh: #900: Decode Multiple Recipients Enveloped Data Alice by Dave . - PASSED
cmsutil -D -i aliceve.env -d ../eve -p nss -o alice.data4
smime.sh: #901: Decrypt with a Multiple Email cert . - PASSED
smime.sh: #902: Compare Decoded Mult. Recipients Enveloped Data Alice/Bob . - PASSED
smime.sh: #903: Compare Decoded Mult. Recipients Enveloped Data Alice/Dave . - PASSED
smime.sh: #904: Compare Decoded with Multiple Email cert . - PASSED
smime.sh: Sending CERTS-ONLY Message ------------------------------
cmsutil -O -r "Alice,bob@bogus.com,dave@bogus.com" \
        -d ../alicedir > co.der
smime.sh: #905: Create Certs-Only Alice . - PASSED
cmsutil -D -i co.der -d ../bobdir
smime.sh: #906: Verify Certs-Only by CA . - PASSED
smime.sh: Encrypted-Data Message ---------------------------------
cmsutil -C -i alice.txt -e alicehello.env -d ../alicedir \
        -r "bob@bogus.com" > alice.enc
smime.sh: #907: Create Encrypted-Data . - PASSED
cmsutil -D -i alice.enc -d ../bobdir -e alicehello.env -p nss \
        -o alice.data2
smime.sh: #908: Decode Encrypted-Data . - PASSED
smime.sh: #909: Compare Decoded and Original Data . - PASSED
smime.sh: p7 util Data Tests ------------------------------
p7env -d ../alicedir -r Alice -i alice.txt -o alice_p7.env
smime.sh: #910: Creating envelope for user Alice . - PASSED
p7content -d ../alicedir -i alice.env -o alice_p7.data
smime.sh: #911: Verifying file delivered to user Alice . - PASSED
diff alice.txt alice_p7.data.sed
smime.sh: #912: Compare Decoded Enveloped Data and Original . - PASSED
p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e
smime.sh: #913: Signing file for user Alice . - PASSED
p7verify -d ../alicedir -c alice.txt -s alice.sig
Signature is valid.
smime.sh: #914: Verifying file delivered to user Alice . - PASSED
TIMESTAMP smime END: Wed Nov 28 10:58:06 EST 2012
Running tests for ssl
TIMESTAMP ssl BEGIN: Wed Nov 28 10:58:06 EST 2012
ssl.sh: SSL tests ===============================
ssl.sh: CRL SSL Client Tests   - with ECC ===============================
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 10:58:06 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:06 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 28977 >/dev/null 2>/dev/null
selfserv with PID 28977 found at Wed Nov 28 10:58:06 EST 2012
selfserv with PID 28977 started at Wed Nov 28 10:58:06 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #915: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28977 at Wed Nov 28 10:58:06 EST 2012
kill -USR1 28977
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 28977 killed at Wed Nov 28 10:58:06 EST 2012
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 10:58:06 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:06 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 29033 >/dev/null 2>/dev/null
selfserv with PID 29033 found at Wed Nov 28 10:58:06 EST 2012
selfserv with PID 29033 started at Wed Nov 28 10:58:06 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #916: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 29033 at Wed Nov 28 10:58:06 EST 2012
kill -USR1 29033
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 29033 killed at Wed Nov 28 10:58:06 EST 2012
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 10:58:06 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:06 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 29089 >/dev/null 2>/dev/null
selfserv with PID 29089 found at Wed Nov 28 10:58:06 EST 2012
selfserv with PID 29089 started at Wed Nov 28 10:58:06 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #917: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 29089 at Wed Nov 28 10:58:06 EST 2012
kill -USR1 29089
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 29089 killed at Wed Nov 28 10:58:06 EST 2012
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Wed Nov 28 10:58:06 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:06 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 29157 >/dev/null 2>/dev/null
selfserv with PID 29157 found at Wed Nov 28 10:58:06 EST 2012
selfserv with PID 29157 started at Wed Nov 28 10:58:06 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #918: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 29157 at Wed Nov 28 10:58:07 EST 2012
kill -USR1 29157
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 29157 killed at Wed Nov 28 10:58:07 EST 2012
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Wed Nov 28 10:58:07 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:07 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 29213 >/dev/null 2>/dev/null
selfserv with PID 29213 found at Wed Nov 28 10:58:07 EST 2012
selfserv with PID 29213 started at Wed Nov 28 10:58:07 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #919: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 29213 at Wed Nov 28 10:58:07 EST 2012
kill -USR1 29213
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 29213 killed at Wed Nov 28 10:58:07 EST 2012
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Wed Nov 28 10:58:07 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:07 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 29269 >/dev/null 2>/dev/null
selfserv with PID 29269 found at Wed Nov 28 10:58:07 EST 2012
selfserv with PID 29269 started at Wed Nov 28 10:58:07 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #920: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 29269 at Wed Nov 28 10:58:07 EST 2012
kill -USR1 29269
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 29269 killed at Wed Nov 28 10:58:07 EST 2012
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Wed Nov 28 10:58:07 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:07 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 29337 >/dev/null 2>/dev/null
selfserv with PID 29337 found at Wed Nov 28 10:58:07 EST 2012
selfserv with PID 29337 started at Wed Nov 28 10:58:07 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #921: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 29337 at Wed Nov 28 10:58:07 EST 2012
kill -USR1 29337
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 29337 killed at Wed Nov 28 10:58:07 EST 2012
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Wed Nov 28 10:58:07 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:07 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 29393 >/dev/null 2>/dev/null
selfserv with PID 29393 found at Wed Nov 28 10:58:07 EST 2012
selfserv with PID 29393 started at Wed Nov 28 10:58:07 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #922: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 29393 at Wed Nov 28 10:58:07 EST 2012
kill -USR1 29393
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 29393 killed at Wed Nov 28 10:58:07 EST 2012
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Wed Nov 28 10:58:07 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:07 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 29449 >/dev/null 2>/dev/null
selfserv with PID 29449 found at Wed Nov 28 10:58:07 EST 2012
selfserv with PID 29449 started at Wed Nov 28 10:58:07 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #923: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 29449 at Wed Nov 28 10:58:08 EST 2012
kill -USR1 29449
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 29449 killed at Wed Nov 28 10:58:08 EST 2012
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 10:58:08 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 29517 >/dev/null 2>/dev/null
selfserv with PID 29517 found at Wed Nov 28 10:58:08 EST 2012
selfserv with PID 29517 started at Wed Nov 28 10:58:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #924: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 29517 at Wed Nov 28 10:58:08 EST 2012
kill -USR1 29517
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 29517 killed at Wed Nov 28 10:58:08 EST 2012
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 10:58:08 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 29573 >/dev/null 2>/dev/null
selfserv with PID 29573 found at Wed Nov 28 10:58:08 EST 2012
selfserv with PID 29573 started at Wed Nov 28 10:58:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #925: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 29573 at Wed Nov 28 10:58:08 EST 2012
kill -USR1 29573
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 29573 killed at Wed Nov 28 10:58:08 EST 2012
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 10:58:08 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 29629 >/dev/null 2>/dev/null
selfserv with PID 29629 found at Wed Nov 28 10:58:08 EST 2012
selfserv with PID 29629 started at Wed Nov 28 10:58:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #926: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 29629 at Wed Nov 28 10:58:08 EST 2012
kill -USR1 29629
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 29629 killed at Wed Nov 28 10:58:08 EST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Wed Nov 28 10:58:08 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 29697 >/dev/null 2>/dev/null
selfserv with PID 29697 found at Wed Nov 28 10:58:08 EST 2012
selfserv with PID 29697 started at Wed Nov 28 10:58:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #927: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 29697 at Wed Nov 28 10:58:08 EST 2012
kill -USR1 29697
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 29697 killed at Wed Nov 28 10:58:08 EST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Wed Nov 28 10:58:08 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 29753 >/dev/null 2>/dev/null
selfserv with PID 29753 found at Wed Nov 28 10:58:08 EST 2012
selfserv with PID 29753 started at Wed Nov 28 10:58:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #928: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 29753 at Wed Nov 28 10:58:08 EST 2012
kill -USR1 29753
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 29753 killed at Wed Nov 28 10:58:08 EST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Wed Nov 28 10:58:08 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 29809 >/dev/null 2>/dev/null
selfserv with PID 29809 found at Wed Nov 28 10:58:08 EST 2012
selfserv with PID 29809 started at Wed Nov 28 10:58:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #929: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 29809 at Wed Nov 28 10:58:08 EST 2012
kill -USR1 29809
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 29809 killed at Wed Nov 28 10:58:08 EST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Wed Nov 28 10:58:09 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:09 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 29877 >/dev/null 2>/dev/null
selfserv with PID 29877 found at Wed Nov 28 10:58:09 EST 2012
selfserv with PID 29877 started at Wed Nov 28 10:58:09 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #930: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 29877 at Wed Nov 28 10:58:09 EST 2012
kill -USR1 29877
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 29877 killed at Wed Nov 28 10:58:09 EST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Wed Nov 28 10:58:09 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:09 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 29933 >/dev/null 2>/dev/null
selfserv with PID 29933 found at Wed Nov 28 10:58:09 EST 2012
selfserv with PID 29933 started at Wed Nov 28 10:58:09 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #931: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 29933 at Wed Nov 28 10:58:09 EST 2012
kill -USR1 29933
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 29933 killed at Wed Nov 28 10:58:09 EST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Wed Nov 28 10:58:09 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:09 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 29989 >/dev/null 2>/dev/null
selfserv with PID 29989 found at Wed Nov 28 10:58:09 EST 2012
selfserv with PID 29989 started at Wed Nov 28 10:58:09 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #932: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 29989 at Wed Nov 28 10:58:09 EST 2012
kill -USR1 29989
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 29989 killed at Wed Nov 28 10:58:09 EST 2012
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 10:58:09 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:09 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 30057 >/dev/null 2>/dev/null
selfserv with PID 30057 found at Wed Nov 28 10:58:09 EST 2012
selfserv with PID 30057 started at Wed Nov 28 10:58:09 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #933: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30057 at Wed Nov 28 10:58:09 EST 2012
kill -USR1 30057
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 30057 killed at Wed Nov 28 10:58:09 EST 2012
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 10:58:09 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:09 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 30113 >/dev/null 2>/dev/null
selfserv with PID 30113 found at Wed Nov 28 10:58:09 EST 2012
selfserv with PID 30113 started at Wed Nov 28 10:58:09 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #934: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30113 at Wed Nov 28 10:58:09 EST 2012
kill -USR1 30113
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 30113 killed at Wed Nov 28 10:58:09 EST 2012
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 10:58:09 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:09 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 30169 >/dev/null 2>/dev/null
selfserv with PID 30169 found at Wed Nov 28 10:58:09 EST 2012
selfserv with PID 30169 started at Wed Nov 28 10:58:09 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #935: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30169 at Wed Nov 28 10:58:10 EST 2012
kill -USR1 30169
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 30169 killed at Wed Nov 28 10:58:10 EST 2012
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Wed Nov 28 10:58:10 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:10 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 30237 >/dev/null 2>/dev/null
selfserv with PID 30237 found at Wed Nov 28 10:58:10 EST 2012
selfserv with PID 30237 started at Wed Nov 28 10:58:10 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #936: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30237 at Wed Nov 28 10:58:10 EST 2012
kill -USR1 30237
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 30237 killed at Wed Nov 28 10:58:10 EST 2012
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Wed Nov 28 10:58:10 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:10 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 30293 >/dev/null 2>/dev/null
selfserv with PID 30293 found at Wed Nov 28 10:58:10 EST 2012
selfserv with PID 30293 started at Wed Nov 28 10:58:10 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #937: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30293 at Wed Nov 28 10:58:10 EST 2012
kill -USR1 30293
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 30293 killed at Wed Nov 28 10:58:10 EST 2012
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Wed Nov 28 10:58:10 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:10 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 30349 >/dev/null 2>/dev/null
selfserv with PID 30349 found at Wed Nov 28 10:58:10 EST 2012
selfserv with PID 30349 started at Wed Nov 28 10:58:10 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #938: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30349 at Wed Nov 28 10:58:10 EST 2012
kill -USR1 30349
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 30349 killed at Wed Nov 28 10:58:10 EST 2012
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Wed Nov 28 10:58:10 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:10 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 30417 >/dev/null 2>/dev/null
selfserv with PID 30417 found at Wed Nov 28 10:58:10 EST 2012
selfserv with PID 30417 started at Wed Nov 28 10:58:10 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #939: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 30417 at Wed Nov 28 10:58:10 EST 2012
kill -USR1 30417
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 30417 killed at Wed Nov 28 10:58:10 EST 2012
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Wed Nov 28 10:58:10 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:10 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 30473 >/dev/null 2>/dev/null
selfserv with PID 30473 found at Wed Nov 28 10:58:10 EST 2012
selfserv with PID 30473 started at Wed Nov 28 10:58:10 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #940: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30473 at Wed Nov 28 10:58:10 EST 2012
kill -USR1 30473
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 30473 killed at Wed Nov 28 10:58:10 EST 2012
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Wed Nov 28 10:58:10 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:10 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 30529 >/dev/null 2>/dev/null
selfserv with PID 30529 found at Wed Nov 28 10:58:10 EST 2012
selfserv with PID 30529 started at Wed Nov 28 10:58:10 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #941: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 30529 at Wed Nov 28 10:58:11 EST 2012
kill -USR1 30529
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 30529 killed at Wed Nov 28 10:58:11 EST 2012
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 10:58:11 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:11 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 30597 >/dev/null 2>/dev/null
selfserv with PID 30597 found at Wed Nov 28 10:58:11 EST 2012
selfserv with PID 30597 started at Wed Nov 28 10:58:11 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #942: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 30597 at Wed Nov 28 10:58:11 EST 2012
kill -USR1 30597
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 30597 killed at Wed Nov 28 10:58:11 EST 2012
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 10:58:11 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:11 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 30653 >/dev/null 2>/dev/null
selfserv with PID 30653 found at Wed Nov 28 10:58:11 EST 2012
selfserv with PID 30653 started at Wed Nov 28 10:58:11 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #943: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 30653 at Wed Nov 28 10:58:11 EST 2012
kill -USR1 30653
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 30653 killed at Wed Nov 28 10:58:11 EST 2012
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 10:58:11 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:11 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 30709 >/dev/null 2>/dev/null
selfserv with PID 30709 found at Wed Nov 28 10:58:11 EST 2012
selfserv with PID 30709 started at Wed Nov 28 10:58:11 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #944: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 30709 at Wed Nov 28 10:58:11 EST 2012
kill -USR1 30709
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 30709 killed at Wed Nov 28 10:58:11 EST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Wed Nov 28 10:58:11 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:11 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 30777 >/dev/null 2>/dev/null
selfserv with PID 30777 found at Wed Nov 28 10:58:11 EST 2012
selfserv with PID 30777 started at Wed Nov 28 10:58:11 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #945: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 30777 at Wed Nov 28 10:58:11 EST 2012
kill -USR1 30777
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 30777 killed at Wed Nov 28 10:58:11 EST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Wed Nov 28 10:58:11 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:11 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 30833 >/dev/null 2>/dev/null
selfserv with PID 30833 found at Wed Nov 28 10:58:11 EST 2012
selfserv with PID 30833 started at Wed Nov 28 10:58:11 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #946: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 30833 at Wed Nov 28 10:58:11 EST 2012
kill -USR1 30833
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 30833 killed at Wed Nov 28 10:58:11 EST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Wed Nov 28 10:58:11 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:11 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 30889 >/dev/null 2>/dev/null
selfserv with PID 30889 found at Wed Nov 28 10:58:11 EST 2012
selfserv with PID 30889 started at Wed Nov 28 10:58:11 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #947: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 30889 at Wed Nov 28 10:58:12 EST 2012
kill -USR1 30889
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 30889 killed at Wed Nov 28 10:58:12 EST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Wed Nov 28 10:58:12 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:12 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 30957 >/dev/null 2>/dev/null
selfserv with PID 30957 found at Wed Nov 28 10:58:12 EST 2012
selfserv with PID 30957 started at Wed Nov 28 10:58:12 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #948: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 30957 at Wed Nov 28 10:58:12 EST 2012
kill -USR1 30957
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 30957 killed at Wed Nov 28 10:58:12 EST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Wed Nov 28 10:58:12 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:12 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 31013 >/dev/null 2>/dev/null
selfserv with PID 31013 found at Wed Nov 28 10:58:12 EST 2012
selfserv with PID 31013 started at Wed Nov 28 10:58:12 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #949: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31013 at Wed Nov 28 10:58:12 EST 2012
kill -USR1 31013
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 31013 killed at Wed Nov 28 10:58:12 EST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Wed Nov 28 10:58:12 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:12 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 31069 >/dev/null 2>/dev/null
selfserv with PID 31069 found at Wed Nov 28 10:58:12 EST 2012
selfserv with PID 31069 started at Wed Nov 28 10:58:12 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #950: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 31069 at Wed Nov 28 10:58:12 EST 2012
kill -USR1 31069
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 31069 killed at Wed Nov 28 10:58:12 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 10:58:12 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:12 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 31137 >/dev/null 2>/dev/null
selfserv with PID 31137 found at Wed Nov 28 10:58:12 EST 2012
selfserv with PID 31137 started at Wed Nov 28 10:58:12 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #951: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31137 at Wed Nov 28 10:58:12 EST 2012
kill -USR1 31137
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 31137 killed at Wed Nov 28 10:58:12 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 10:58:12 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:12 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 31193 >/dev/null 2>/dev/null
selfserv with PID 31193 found at Wed Nov 28 10:58:12 EST 2012
selfserv with PID 31193 started at Wed Nov 28 10:58:12 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #952: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31193 at Wed Nov 28 10:58:12 EST 2012
kill -USR1 31193
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 31193 killed at Wed Nov 28 10:58:12 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 10:58:12 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:12 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 31249 >/dev/null 2>/dev/null
selfserv with PID 31249 found at Wed Nov 28 10:58:12 EST 2012
selfserv with PID 31249 started at Wed Nov 28 10:58:12 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #953: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31249 at Wed Nov 28 10:58:13 EST 2012
kill -USR1 31249
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 31249 killed at Wed Nov 28 10:58:13 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 10:58:13 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:13 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 31317 >/dev/null 2>/dev/null
selfserv with PID 31317 found at Wed Nov 28 10:58:13 EST 2012
selfserv with PID 31317 started at Wed Nov 28 10:58:13 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #954: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31317 at Wed Nov 28 10:58:13 EST 2012
kill -USR1 31317
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 31317 killed at Wed Nov 28 10:58:13 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 10:58:13 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:13 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 31373 >/dev/null 2>/dev/null
selfserv with PID 31373 found at Wed Nov 28 10:58:13 EST 2012
selfserv with PID 31373 started at Wed Nov 28 10:58:13 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #955: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31373 at Wed Nov 28 10:58:13 EST 2012
kill -USR1 31373
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 31373 killed at Wed Nov 28 10:58:13 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 10:58:13 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:13 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 31429 >/dev/null 2>/dev/null
selfserv with PID 31429 found at Wed Nov 28 10:58:13 EST 2012
selfserv with PID 31429 started at Wed Nov 28 10:58:13 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #956: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31429 at Wed Nov 28 10:58:13 EST 2012
kill -USR1 31429
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 31429 killed at Wed Nov 28 10:58:13 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 10:58:13 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:13 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 31497 >/dev/null 2>/dev/null
selfserv with PID 31497 found at Wed Nov 28 10:58:13 EST 2012
selfserv with PID 31497 started at Wed Nov 28 10:58:13 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #957: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 31497 at Wed Nov 28 10:58:13 EST 2012
kill -USR1 31497
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 31497 killed at Wed Nov 28 10:58:13 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 10:58:13 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:13 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 31553 >/dev/null 2>/dev/null
selfserv with PID 31553 found at Wed Nov 28 10:58:13 EST 2012
selfserv with PID 31553 started at Wed Nov 28 10:58:13 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #958: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31553 at Wed Nov 28 10:58:13 EST 2012
kill -USR1 31553
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 31553 killed at Wed Nov 28 10:58:13 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 10:58:13 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:13 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 31609 >/dev/null 2>/dev/null
selfserv with PID 31609 found at Wed Nov 28 10:58:13 EST 2012
selfserv with PID 31609 started at Wed Nov 28 10:58:13 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #959: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 31609 at Wed Nov 28 10:58:14 EST 2012
kill -USR1 31609
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 31609 killed at Wed Nov 28 10:58:14 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 10:58:14 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:14 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 31677 >/dev/null 2>/dev/null
selfserv with PID 31677 found at Wed Nov 28 10:58:14 EST 2012
selfserv with PID 31677 started at Wed Nov 28 10:58:14 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #960: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 31677 at Wed Nov 28 10:58:14 EST 2012
kill -USR1 31677
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 31677 killed at Wed Nov 28 10:58:14 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 10:58:14 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:14 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 31733 >/dev/null 2>/dev/null
selfserv with PID 31733 found at Wed Nov 28 10:58:14 EST 2012
selfserv with PID 31733 started at Wed Nov 28 10:58:14 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #961: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 31733 at Wed Nov 28 10:58:14 EST 2012
kill -USR1 31733
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 31733 killed at Wed Nov 28 10:58:14 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 10:58:14 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:14 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 31789 >/dev/null 2>/dev/null
selfserv with PID 31789 found at Wed Nov 28 10:58:14 EST 2012
selfserv with PID 31789 started at Wed Nov 28 10:58:14 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #962: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 31789 at Wed Nov 28 10:58:14 EST 2012
kill -USR1 31789
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 31789 killed at Wed Nov 28 10:58:14 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 10:58:14 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:14 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 31857 >/dev/null 2>/dev/null
selfserv with PID 31857 found at Wed Nov 28 10:58:14 EST 2012
selfserv with PID 31857 started at Wed Nov 28 10:58:14 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #963: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 31857 at Wed Nov 28 10:58:14 EST 2012
kill -USR1 31857
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 31857 killed at Wed Nov 28 10:58:14 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 10:58:14 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:14 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 31913 >/dev/null 2>/dev/null
selfserv with PID 31913 found at Wed Nov 28 10:58:14 EST 2012
selfserv with PID 31913 started at Wed Nov 28 10:58:14 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #964: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 31913 at Wed Nov 28 10:58:14 EST 2012
kill -USR1 31913
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 31913 killed at Wed Nov 28 10:58:14 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 10:58:14 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:14 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 31969 >/dev/null 2>/dev/null
selfserv with PID 31969 found at Wed Nov 28 10:58:14 EST 2012
selfserv with PID 31969 started at Wed Nov 28 10:58:14 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #965: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 31969 at Wed Nov 28 10:58:15 EST 2012
kill -USR1 31969
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 31969 killed at Wed Nov 28 10:58:15 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 10:58:15 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:15 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 32037 >/dev/null 2>/dev/null
selfserv with PID 32037 found at Wed Nov 28 10:58:15 EST 2012
selfserv with PID 32037 started at Wed Nov 28 10:58:15 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #966: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 32037 at Wed Nov 28 10:58:15 EST 2012
kill -USR1 32037
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 32037 killed at Wed Nov 28 10:58:15 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 10:58:15 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:15 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 32093 >/dev/null 2>/dev/null
selfserv with PID 32093 found at Wed Nov 28 10:58:15 EST 2012
selfserv with PID 32093 started at Wed Nov 28 10:58:15 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #967: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32093 at Wed Nov 28 10:58:15 EST 2012
kill -USR1 32093
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 32093 killed at Wed Nov 28 10:58:15 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 10:58:15 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:15 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 32149 >/dev/null 2>/dev/null
selfserv with PID 32149 found at Wed Nov 28 10:58:15 EST 2012
selfserv with PID 32149 started at Wed Nov 28 10:58:15 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #968: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 32149 at Wed Nov 28 10:58:15 EST 2012
kill -USR1 32149
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 32149 killed at Wed Nov 28 10:58:15 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 10:58:15 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:15 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 32217 >/dev/null 2>/dev/null
selfserv with PID 32217 found at Wed Nov 28 10:58:15 EST 2012
selfserv with PID 32217 started at Wed Nov 28 10:58:15 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #969: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32217 at Wed Nov 28 10:58:15 EST 2012
kill -USR1 32217
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 32217 killed at Wed Nov 28 10:58:15 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 10:58:15 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:15 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 32273 >/dev/null 2>/dev/null
selfserv with PID 32273 found at Wed Nov 28 10:58:15 EST 2012
selfserv with PID 32273 started at Wed Nov 28 10:58:15 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #970: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32273 at Wed Nov 28 10:58:15 EST 2012
kill -USR1 32273
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 32273 killed at Wed Nov 28 10:58:15 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 10:58:15 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:15 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 32329 >/dev/null 2>/dev/null
selfserv with PID 32329 found at Wed Nov 28 10:58:15 EST 2012
selfserv with PID 32329 started at Wed Nov 28 10:58:15 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #971: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32329 at Wed Nov 28 10:58:16 EST 2012
kill -USR1 32329
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 32329 killed at Wed Nov 28 10:58:16 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 10:58:16 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:16 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 32397 >/dev/null 2>/dev/null
selfserv with PID 32397 found at Wed Nov 28 10:58:16 EST 2012
selfserv with PID 32397 started at Wed Nov 28 10:58:16 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #972: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32397 at Wed Nov 28 10:58:16 EST 2012
kill -USR1 32397
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 32397 killed at Wed Nov 28 10:58:16 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 10:58:16 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:16 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 32453 >/dev/null 2>/dev/null
selfserv with PID 32453 found at Wed Nov 28 10:58:16 EST 2012
selfserv with PID 32453 started at Wed Nov 28 10:58:16 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #973: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32453 at Wed Nov 28 10:58:16 EST 2012
kill -USR1 32453
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 32453 killed at Wed Nov 28 10:58:16 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 10:58:16 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:16 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 32509 >/dev/null 2>/dev/null
selfserv with PID 32509 found at Wed Nov 28 10:58:16 EST 2012
selfserv with PID 32509 started at Wed Nov 28 10:58:16 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #974: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32509 at Wed Nov 28 10:58:16 EST 2012
kill -USR1 32509
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 32509 killed at Wed Nov 28 10:58:16 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 10:58:16 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:16 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 32577 >/dev/null 2>/dev/null
selfserv with PID 32577 found at Wed Nov 28 10:58:16 EST 2012
selfserv with PID 32577 started at Wed Nov 28 10:58:16 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #975: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 32577 at Wed Nov 28 10:58:16 EST 2012
kill -USR1 32577
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 32577 killed at Wed Nov 28 10:58:16 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 10:58:16 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:16 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 32633 >/dev/null 2>/dev/null
selfserv with PID 32633 found at Wed Nov 28 10:58:16 EST 2012
selfserv with PID 32633 started at Wed Nov 28 10:58:16 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #976: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32633 at Wed Nov 28 10:58:16 EST 2012
kill -USR1 32633
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 32633 killed at Wed Nov 28 10:58:16 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 10:58:16 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:16 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 32689 >/dev/null 2>/dev/null
selfserv with PID 32689 found at Wed Nov 28 10:58:16 EST 2012
selfserv with PID 32689 started at Wed Nov 28 10:58:17 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #977: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 32689 at Wed Nov 28 10:58:17 EST 2012
kill -USR1 32689
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 32689 killed at Wed Nov 28 10:58:17 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 10:58:17 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:17 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 32757 >/dev/null 2>/dev/null
selfserv with PID 32757 found at Wed Nov 28 10:58:17 EST 2012
selfserv with PID 32757 started at Wed Nov 28 10:58:17 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #978: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 32757 at Wed Nov 28 10:58:17 EST 2012
kill -USR1 32757
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 32757 killed at Wed Nov 28 10:58:17 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 10:58:17 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:17 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 350 >/dev/null 2>/dev/null
selfserv with PID 350 found at Wed Nov 28 10:58:17 EST 2012
selfserv with PID 350 started at Wed Nov 28 10:58:17 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #979: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 350 at Wed Nov 28 10:58:17 EST 2012
kill -USR1 350
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 350 killed at Wed Nov 28 10:58:17 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 10:58:17 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:17 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 406 >/dev/null 2>/dev/null
selfserv with PID 406 found at Wed Nov 28 10:58:17 EST 2012
selfserv with PID 406 started at Wed Nov 28 10:58:17 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #980: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 406 at Wed Nov 28 10:58:17 EST 2012
kill -USR1 406
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 406 killed at Wed Nov 28 10:58:17 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 10:58:17 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:17 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 480 >/dev/null 2>/dev/null
selfserv with PID 480 found at Wed Nov 28 10:58:17 EST 2012
selfserv with PID 480 started at Wed Nov 28 10:58:17 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #981: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 480 at Wed Nov 28 10:58:17 EST 2012
kill -USR1 480
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 480 killed at Wed Nov 28 10:58:17 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 10:58:17 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:17 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 552 >/dev/null 2>/dev/null
selfserv with PID 552 found at Wed Nov 28 10:58:17 EST 2012
selfserv with PID 552 started at Wed Nov 28 10:58:17 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #982: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 552 at Wed Nov 28 10:58:17 EST 2012
kill -USR1 552
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 552 killed at Wed Nov 28 10:58:17 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 10:58:18 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:18 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 621 >/dev/null 2>/dev/null
selfserv with PID 621 found at Wed Nov 28 10:58:18 EST 2012
selfserv with PID 621 started at Wed Nov 28 10:58:18 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #983: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 621 at Wed Nov 28 10:58:18 EST 2012
kill -USR1 621
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 621 killed at Wed Nov 28 10:58:18 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 10:58:18 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:18 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 705 >/dev/null 2>/dev/null
selfserv with PID 705 found at Wed Nov 28 10:58:18 EST 2012
selfserv with PID 705 started at Wed Nov 28 10:58:18 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #984: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 705 at Wed Nov 28 10:58:18 EST 2012
kill -USR1 705
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 705 killed at Wed Nov 28 10:58:18 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 10:58:18 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:18 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 762 >/dev/null 2>/dev/null
selfserv with PID 762 found at Wed Nov 28 10:58:18 EST 2012
selfserv with PID 762 started at Wed Nov 28 10:58:18 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #985: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 762 at Wed Nov 28 10:58:18 EST 2012
kill -USR1 762
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 762 killed at Wed Nov 28 10:58:18 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 10:58:18 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:18 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 827 >/dev/null 2>/dev/null
selfserv with PID 827 found at Wed Nov 28 10:58:18 EST 2012
selfserv with PID 827 started at Wed Nov 28 10:58:18 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #986: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 827 at Wed Nov 28 10:58:18 EST 2012
kill -USR1 827
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 827 killed at Wed Nov 28 10:58:18 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 10:58:18 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:18 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 912 >/dev/null 2>/dev/null
selfserv with PID 912 found at Wed Nov 28 10:58:18 EST 2012
selfserv with PID 912 started at Wed Nov 28 10:58:18 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #987: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 912 at Wed Nov 28 10:58:18 EST 2012
kill -USR1 912
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 912 killed at Wed Nov 28 10:58:18 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 10:58:18 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:18 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 999 >/dev/null 2>/dev/null
selfserv with PID 999 found at Wed Nov 28 10:58:18 EST 2012
selfserv with PID 999 started at Wed Nov 28 10:58:18 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #988: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 999 at Wed Nov 28 10:58:18 EST 2012
kill -USR1 999
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 999 killed at Wed Nov 28 10:58:18 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 10:58:19 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:19 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 1055 >/dev/null 2>/dev/null
selfserv with PID 1055 found at Wed Nov 28 10:58:19 EST 2012
selfserv with PID 1055 started at Wed Nov 28 10:58:19 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #989: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1055 at Wed Nov 28 10:58:19 EST 2012
kill -USR1 1055
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 1055 killed at Wed Nov 28 10:58:19 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 10:58:19 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:19 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 1123 >/dev/null 2>/dev/null
selfserv with PID 1123 found at Wed Nov 28 10:58:19 EST 2012
selfserv with PID 1123 started at Wed Nov 28 10:58:19 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #990: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1123 at Wed Nov 28 10:58:19 EST 2012
kill -USR1 1123
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 1123 killed at Wed Nov 28 10:58:19 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 10:58:19 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:19 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 1179 >/dev/null 2>/dev/null
selfserv with PID 1179 found at Wed Nov 28 10:58:19 EST 2012
selfserv with PID 1179 started at Wed Nov 28 10:58:19 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #991: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1179 at Wed Nov 28 10:58:19 EST 2012
kill -USR1 1179
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 1179 killed at Wed Nov 28 10:58:19 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 10:58:19 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:19 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 1235 >/dev/null 2>/dev/null
selfserv with PID 1235 found at Wed Nov 28 10:58:19 EST 2012
selfserv with PID 1235 started at Wed Nov 28 10:58:19 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #992: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1235 at Wed Nov 28 10:58:19 EST 2012
kill -USR1 1235
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 1235 killed at Wed Nov 28 10:58:19 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 10:58:19 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:19 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 1303 >/dev/null 2>/dev/null
selfserv with PID 1303 found at Wed Nov 28 10:58:19 EST 2012
selfserv with PID 1303 started at Wed Nov 28 10:58:19 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #993: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1303 at Wed Nov 28 10:58:19 EST 2012
kill -USR1 1303
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 1303 killed at Wed Nov 28 10:58:19 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 10:58:19 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:19 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 1359 >/dev/null 2>/dev/null
selfserv with PID 1359 found at Wed Nov 28 10:58:19 EST 2012
selfserv with PID 1359 started at Wed Nov 28 10:58:19 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #994: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1359 at Wed Nov 28 10:58:19 EST 2012
kill -USR1 1359
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 1359 killed at Wed Nov 28 10:58:19 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 10:58:19 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:20 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 1415 >/dev/null 2>/dev/null
selfserv with PID 1415 found at Wed Nov 28 10:58:20 EST 2012
selfserv with PID 1415 started at Wed Nov 28 10:58:20 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #995: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1415 at Wed Nov 28 10:58:20 EST 2012
kill -USR1 1415
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 1415 killed at Wed Nov 28 10:58:20 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 10:58:20 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:20 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 1483 >/dev/null 2>/dev/null
selfserv with PID 1483 found at Wed Nov 28 10:58:20 EST 2012
selfserv with PID 1483 started at Wed Nov 28 10:58:20 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #996: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1483 at Wed Nov 28 10:58:20 EST 2012
kill -USR1 1483
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 1483 killed at Wed Nov 28 10:58:20 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 10:58:20 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:20 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 1539 >/dev/null 2>/dev/null
selfserv with PID 1539 found at Wed Nov 28 10:58:20 EST 2012
selfserv with PID 1539 started at Wed Nov 28 10:58:20 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #997: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1539 at Wed Nov 28 10:58:20 EST 2012
kill -USR1 1539
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 1539 killed at Wed Nov 28 10:58:20 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 10:58:20 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:20 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 1595 >/dev/null 2>/dev/null
selfserv with PID 1595 found at Wed Nov 28 10:58:20 EST 2012
selfserv with PID 1595 started at Wed Nov 28 10:58:20 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #998: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1595 at Wed Nov 28 10:58:20 EST 2012
kill -USR1 1595
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 1595 killed at Wed Nov 28 10:58:20 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 10:58:20 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:20 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 1663 >/dev/null 2>/dev/null
selfserv with PID 1663 found at Wed Nov 28 10:58:20 EST 2012
selfserv with PID 1663 started at Wed Nov 28 10:58:20 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #999: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1663 at Wed Nov 28 10:58:20 EST 2012
kill -USR1 1663
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 1663 killed at Wed Nov 28 10:58:20 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 10:58:20 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:20 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 1719 >/dev/null 2>/dev/null
selfserv with PID 1719 found at Wed Nov 28 10:58:20 EST 2012
selfserv with PID 1719 started at Wed Nov 28 10:58:20 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1000: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1719 at Wed Nov 28 10:58:20 EST 2012
kill -USR1 1719
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 1719 killed at Wed Nov 28 10:58:20 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 10:58:21 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:21 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 1775 >/dev/null 2>/dev/null
selfserv with PID 1775 found at Wed Nov 28 10:58:21 EST 2012
selfserv with PID 1775 started at Wed Nov 28 10:58:21 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1001: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1775 at Wed Nov 28 10:58:21 EST 2012
kill -USR1 1775
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 1775 killed at Wed Nov 28 10:58:21 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 10:58:21 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:21 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 1844 >/dev/null 2>/dev/null
selfserv with PID 1844 found at Wed Nov 28 10:58:21 EST 2012
selfserv with PID 1844 started at Wed Nov 28 10:58:21 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1002: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1844 at Wed Nov 28 10:58:21 EST 2012
kill -USR1 1844
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 1844 killed at Wed Nov 28 10:58:21 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 10:58:21 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:21 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 1900 >/dev/null 2>/dev/null
selfserv with PID 1900 found at Wed Nov 28 10:58:21 EST 2012
selfserv with PID 1900 started at Wed Nov 28 10:58:21 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1003: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1900 at Wed Nov 28 10:58:21 EST 2012
kill -USR1 1900
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 1900 killed at Wed Nov 28 10:58:21 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 10:58:21 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:21 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 1956 >/dev/null 2>/dev/null
selfserv with PID 1956 found at Wed Nov 28 10:58:21 EST 2012
selfserv with PID 1956 started at Wed Nov 28 10:58:21 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1004: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1956 at Wed Nov 28 10:58:21 EST 2012
kill -USR1 1956
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 1956 killed at Wed Nov 28 10:58:21 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 10:58:21 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:21 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 2033 >/dev/null 2>/dev/null
selfserv with PID 2033 found at Wed Nov 28 10:58:21 EST 2012
selfserv with PID 2033 started at Wed Nov 28 10:58:21 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1005: TLS Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2033 at Wed Nov 28 10:58:21 EST 2012
kill -USR1 2033
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 2033 killed at Wed Nov 28 10:58:21 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 10:58:21 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:21 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 2089 >/dev/null 2>/dev/null
selfserv with PID 2089 found at Wed Nov 28 10:58:21 EST 2012
selfserv with PID 2089 started at Wed Nov 28 10:58:21 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1006: TLS Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2089 at Wed Nov 28 10:58:21 EST 2012
kill -USR1 2089
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 2089 killed at Wed Nov 28 10:58:21 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 10:58:21 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:22 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 2145 >/dev/null 2>/dev/null
selfserv with PID 2145 found at Wed Nov 28 10:58:22 EST 2012
selfserv with PID 2145 started at Wed Nov 28 10:58:22 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1007: TLS Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2145 at Wed Nov 28 10:58:22 EST 2012
kill -USR1 2145
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 2145 killed at Wed Nov 28 10:58:22 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 10:58:22 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:22 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 2214 >/dev/null 2>/dev/null
selfserv with PID 2214 found at Wed Nov 28 10:58:22 EST 2012
selfserv with PID 2214 started at Wed Nov 28 10:58:22 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #1008: TLS Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 2214 at Wed Nov 28 10:58:22 EST 2012
kill -USR1 2214
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 2214 killed at Wed Nov 28 10:58:22 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 10:58:22 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:22 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 2270 >/dev/null 2>/dev/null
selfserv with PID 2270 found at Wed Nov 28 10:58:22 EST 2012
selfserv with PID 2270 started at Wed Nov 28 10:58:22 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1009: TLS Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2270 at Wed Nov 28 10:58:22 EST 2012
kill -USR1 2270
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 2270 killed at Wed Nov 28 10:58:22 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 10:58:22 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:22 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 2327 >/dev/null 2>/dev/null
selfserv with PID 2327 found at Wed Nov 28 10:58:22 EST 2012
selfserv with PID 2327 started at Wed Nov 28 10:58:22 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #1010: TLS Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 2327 at Wed Nov 28 10:58:22 EST 2012
kill -USR1 2327
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 2327 killed at Wed Nov 28 10:58:22 EST 2012
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 10:58:22 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:22 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 2395 >/dev/null 2>/dev/null
selfserv with PID 2395 found at Wed Nov 28 10:58:22 EST 2012
selfserv with PID 2395 started at Wed Nov 28 10:58:22 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1011: TLS Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 2395 at Wed Nov 28 10:58:22 EST 2012
kill -USR1 2395
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 2395 killed at Wed Nov 28 10:58:22 EST 2012
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 10:58:22 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:22 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 2451 >/dev/null 2>/dev/null
selfserv with PID 2451 found at Wed Nov 28 10:58:22 EST 2012
selfserv with PID 2451 started at Wed Nov 28 10:58:22 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1012: TLS Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 2451 at Wed Nov 28 10:58:23 EST 2012
kill -USR1 2451
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 2451 killed at Wed Nov 28 10:58:23 EST 2012
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 10:58:23 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:23 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 2507 >/dev/null 2>/dev/null
selfserv with PID 2507 found at Wed Nov 28 10:58:23 EST 2012
selfserv with PID 2507 started at Wed Nov 28 10:58:23 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1013: TLS Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 2507 at Wed Nov 28 10:58:23 EST 2012
kill -USR1 2507
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 2507 killed at Wed Nov 28 10:58:23 EST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 10:58:23 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:23 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 2575 >/dev/null 2>/dev/null
selfserv with PID 2575 found at Wed Nov 28 10:58:23 EST 2012
selfserv with PID 2575 started at Wed Nov 28 10:58:23 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #1014: TLS Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 2575 at Wed Nov 28 10:58:23 EST 2012
kill -USR1 2575
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 2575 killed at Wed Nov 28 10:58:23 EST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 10:58:23 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:23 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 2631 >/dev/null 2>/dev/null
selfserv with PID 2631 found at Wed Nov 28 10:58:23 EST 2012
selfserv with PID 2631 started at Wed Nov 28 10:58:23 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1015: TLS Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2631 at Wed Nov 28 10:58:23 EST 2012
kill -USR1 2631
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 2631 killed at Wed Nov 28 10:58:23 EST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 10:58:23 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:23 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 2687 >/dev/null 2>/dev/null
selfserv with PID 2687 found at Wed Nov 28 10:58:23 EST 2012
selfserv with PID 2687 started at Wed Nov 28 10:58:23 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #1016: TLS Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 2687 at Wed Nov 28 10:58:23 EST 2012
kill -USR1 2687
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 2687 killed at Wed Nov 28 10:58:23 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 10:58:23 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:23 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 2755 >/dev/null 2>/dev/null
selfserv with PID 2755 found at Wed Nov 28 10:58:23 EST 2012
selfserv with PID 2755 started at Wed Nov 28 10:58:23 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1017: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2755 at Wed Nov 28 10:58:24 EST 2012
kill -USR1 2755
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 2755 killed at Wed Nov 28 10:58:24 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 10:58:24 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:24 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 2811 >/dev/null 2>/dev/null
selfserv with PID 2811 found at Wed Nov 28 10:58:24 EST 2012
selfserv with PID 2811 started at Wed Nov 28 10:58:24 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1018: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2811 at Wed Nov 28 10:58:24 EST 2012
kill -USR1 2811
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 2811 killed at Wed Nov 28 10:58:24 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 10:58:24 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:24 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 2867 >/dev/null 2>/dev/null
selfserv with PID 2867 found at Wed Nov 28 10:58:24 EST 2012
selfserv with PID 2867 started at Wed Nov 28 10:58:24 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1019: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2867 at Wed Nov 28 10:58:24 EST 2012
kill -USR1 2867
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 2867 killed at Wed Nov 28 10:58:24 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 10:58:24 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:24 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 2935 >/dev/null 2>/dev/null
selfserv with PID 2935 found at Wed Nov 28 10:58:24 EST 2012
selfserv with PID 2935 started at Wed Nov 28 10:58:24 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #1020: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 2935 at Wed Nov 28 10:58:24 EST 2012
kill -USR1 2935
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 2935 killed at Wed Nov 28 10:58:24 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 10:58:24 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:24 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 2991 >/dev/null 2>/dev/null
selfserv with PID 2991 found at Wed Nov 28 10:58:24 EST 2012
selfserv with PID 2991 started at Wed Nov 28 10:58:24 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1021: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2991 at Wed Nov 28 10:58:24 EST 2012
kill -USR1 2991
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 2991 killed at Wed Nov 28 10:58:24 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 10:58:24 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:24 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 3049 >/dev/null 2>/dev/null
selfserv with PID 3049 found at Wed Nov 28 10:58:24 EST 2012
selfserv with PID 3049 started at Wed Nov 28 10:58:24 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #1022: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 3049 at Wed Nov 28 10:58:24 EST 2012
kill -USR1 3049
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 3049 killed at Wed Nov 28 10:58:24 EST 2012
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 10:58:24 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:24 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 3117 >/dev/null 2>/dev/null
selfserv with PID 3117 found at Wed Nov 28 10:58:24 EST 2012
selfserv with PID 3117 started at Wed Nov 28 10:58:24 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1023: SSL3 Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 3117 at Wed Nov 28 10:58:25 EST 2012
kill -USR1 3117
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 3117 killed at Wed Nov 28 10:58:25 EST 2012
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 10:58:25 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:25 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 3173 >/dev/null 2>/dev/null
selfserv with PID 3173 found at Wed Nov 28 10:58:25 EST 2012
selfserv with PID 3173 started at Wed Nov 28 10:58:25 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1024: SSL3 Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 3173 at Wed Nov 28 10:58:25 EST 2012
kill -USR1 3173
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 3173 killed at Wed Nov 28 10:58:25 EST 2012
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 10:58:25 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:25 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 3230 >/dev/null 2>/dev/null
selfserv with PID 3230 found at Wed Nov 28 10:58:25 EST 2012
selfserv with PID 3230 started at Wed Nov 28 10:58:25 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1025: SSL3 Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 3230 at Wed Nov 28 10:58:25 EST 2012
kill -USR1 3230
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 3230 killed at Wed Nov 28 10:58:25 EST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 10:58:25 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:25 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 3298 >/dev/null 2>/dev/null
selfserv with PID 3298 found at Wed Nov 28 10:58:25 EST 2012
selfserv with PID 3298 started at Wed Nov 28 10:58:25 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #1026: SSL3 Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 3298 at Wed Nov 28 10:58:25 EST 2012
kill -USR1 3298
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 3298 killed at Wed Nov 28 10:58:25 EST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 10:58:25 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:25 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 3354 >/dev/null 2>/dev/null
selfserv with PID 3354 found at Wed Nov 28 10:58:25 EST 2012
selfserv with PID 3354 started at Wed Nov 28 10:58:25 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1027: SSL3 Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3354 at Wed Nov 28 10:58:25 EST 2012
kill -USR1 3354
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 3354 killed at Wed Nov 28 10:58:25 EST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 10:58:25 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:25 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 3410 >/dev/null 2>/dev/null
selfserv with PID 3410 found at Wed Nov 28 10:58:25 EST 2012
selfserv with PID 3410 started at Wed Nov 28 10:58:25 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #1028: SSL3 Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 3410 at Wed Nov 28 10:58:25 EST 2012
kill -USR1 3410
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 3410 killed at Wed Nov 28 10:58:25 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 10:58:26 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:26 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 3478 >/dev/null 2>/dev/null
selfserv with PID 3478 found at Wed Nov 28 10:58:26 EST 2012
selfserv with PID 3478 started at Wed Nov 28 10:58:26 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1029: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3478 at Wed Nov 28 10:58:26 EST 2012
kill -USR1 3478
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 3478 killed at Wed Nov 28 10:58:26 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 10:58:26 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:26 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 3534 >/dev/null 2>/dev/null
selfserv with PID 3534 found at Wed Nov 28 10:58:26 EST 2012
selfserv with PID 3534 started at Wed Nov 28 10:58:26 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1030: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3534 at Wed Nov 28 10:58:26 EST 2012
kill -USR1 3534
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 3534 killed at Wed Nov 28 10:58:26 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 10:58:26 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:26 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 3590 >/dev/null 2>/dev/null
selfserv with PID 3590 found at Wed Nov 28 10:58:26 EST 2012
selfserv with PID 3590 started at Wed Nov 28 10:58:26 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1031: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3590 at Wed Nov 28 10:58:26 EST 2012
kill -USR1 3590
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 3590 killed at Wed Nov 28 10:58:26 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 10:58:26 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:26 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 3658 >/dev/null 2>/dev/null
selfserv with PID 3658 found at Wed Nov 28 10:58:26 EST 2012
selfserv with PID 3658 started at Wed Nov 28 10:58:26 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1032: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3658 at Wed Nov 28 10:58:26 EST 2012
kill -USR1 3658
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 3658 killed at Wed Nov 28 10:58:26 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 10:58:26 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:26 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 3714 >/dev/null 2>/dev/null
selfserv with PID 3714 found at Wed Nov 28 10:58:26 EST 2012
selfserv with PID 3714 started at Wed Nov 28 10:58:26 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1033: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3714 at Wed Nov 28 10:58:26 EST 2012
kill -USR1 3714
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 3714 killed at Wed Nov 28 10:58:26 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 10:58:27 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:27 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 3770 >/dev/null 2>/dev/null
selfserv with PID 3770 found at Wed Nov 28 10:58:27 EST 2012
selfserv with PID 3770 started at Wed Nov 28 10:58:27 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1034: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3770 at Wed Nov 28 10:58:27 EST 2012
kill -USR1 3770
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 3770 killed at Wed Nov 28 10:58:27 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 10:58:27 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:27 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 3838 >/dev/null 2>/dev/null
selfserv with PID 3838 found at Wed Nov 28 10:58:27 EST 2012
selfserv with PID 3838 started at Wed Nov 28 10:58:27 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1035: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3838 at Wed Nov 28 10:58:27 EST 2012
kill -USR1 3838
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 3838 killed at Wed Nov 28 10:58:27 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 10:58:27 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:27 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 3894 >/dev/null 2>/dev/null
selfserv with PID 3894 found at Wed Nov 28 10:58:27 EST 2012
selfserv with PID 3894 started at Wed Nov 28 10:58:27 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1036: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3894 at Wed Nov 28 10:58:27 EST 2012
kill -USR1 3894
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 3894 killed at Wed Nov 28 10:58:27 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 10:58:27 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:27 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 3950 >/dev/null 2>/dev/null
selfserv with PID 3950 found at Wed Nov 28 10:58:27 EST 2012
selfserv with PID 3950 started at Wed Nov 28 10:58:27 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1037: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3950 at Wed Nov 28 10:58:27 EST 2012
kill -USR1 3950
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 3950 killed at Wed Nov 28 10:58:27 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 10:58:27 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:27 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 4018 >/dev/null 2>/dev/null
selfserv with PID 4018 found at Wed Nov 28 10:58:27 EST 2012
selfserv with PID 4018 started at Wed Nov 28 10:58:27 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1038: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 4018 at Wed Nov 28 10:58:27 EST 2012
kill -USR1 4018
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 4018 killed at Wed Nov 28 10:58:27 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 10:58:27 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:27 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 4074 >/dev/null 2>/dev/null
selfserv with PID 4074 found at Wed Nov 28 10:58:27 EST 2012
selfserv with PID 4074 started at Wed Nov 28 10:58:27 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1039: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4074 at Wed Nov 28 10:58:28 EST 2012
kill -USR1 4074
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 4074 killed at Wed Nov 28 10:58:28 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 10:58:28 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:28 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 4130 >/dev/null 2>/dev/null
selfserv with PID 4130 found at Wed Nov 28 10:58:28 EST 2012
selfserv with PID 4130 started at Wed Nov 28 10:58:28 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1040: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 4130 at Wed Nov 28 10:58:28 EST 2012
kill -USR1 4130
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 4130 killed at Wed Nov 28 10:58:28 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 10:58:28 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:28 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 4198 >/dev/null 2>/dev/null
selfserv with PID 4198 found at Wed Nov 28 10:58:28 EST 2012
selfserv with PID 4198 started at Wed Nov 28 10:58:28 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1041: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4198 at Wed Nov 28 10:58:28 EST 2012
kill -USR1 4198
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 4198 killed at Wed Nov 28 10:58:28 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 10:58:28 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:28 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 4254 >/dev/null 2>/dev/null
selfserv with PID 4254 found at Wed Nov 28 10:58:28 EST 2012
selfserv with PID 4254 started at Wed Nov 28 10:58:28 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1042: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4254 at Wed Nov 28 10:58:28 EST 2012
kill -USR1 4254
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 4254 killed at Wed Nov 28 10:58:28 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 10:58:28 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:28 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 4310 >/dev/null 2>/dev/null
selfserv with PID 4310 found at Wed Nov 28 10:58:28 EST 2012
selfserv with PID 4310 started at Wed Nov 28 10:58:28 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1043: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4310 at Wed Nov 28 10:58:28 EST 2012
kill -USR1 4310
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 4310 killed at Wed Nov 28 10:58:28 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 10:58:28 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:28 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 4378 >/dev/null 2>/dev/null
selfserv with PID 4378 found at Wed Nov 28 10:58:28 EST 2012
selfserv with PID 4378 started at Wed Nov 28 10:58:28 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1044: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 4378 at Wed Nov 28 10:58:28 EST 2012
kill -USR1 4378
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 4378 killed at Wed Nov 28 10:58:28 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 10:58:29 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:29 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 4434 >/dev/null 2>/dev/null
selfserv with PID 4434 found at Wed Nov 28 10:58:29 EST 2012
selfserv with PID 4434 started at Wed Nov 28 10:58:29 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1045: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4434 at Wed Nov 28 10:58:29 EST 2012
kill -USR1 4434
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 4434 killed at Wed Nov 28 10:58:29 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 10:58:29 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:29 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 4490 >/dev/null 2>/dev/null
selfserv with PID 4490 found at Wed Nov 28 10:58:29 EST 2012
selfserv with PID 4490 started at Wed Nov 28 10:58:29 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1046: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 4490 at Wed Nov 28 10:58:29 EST 2012
kill -USR1 4490
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 4490 killed at Wed Nov 28 10:58:29 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 10:58:29 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:29 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 4558 >/dev/null 2>/dev/null
selfserv with PID 4558 found at Wed Nov 28 10:58:29 EST 2012
selfserv with PID 4558 started at Wed Nov 28 10:58:29 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1047: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 4558 at Wed Nov 28 10:58:29 EST 2012
kill -USR1 4558
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 4558 killed at Wed Nov 28 10:58:29 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 10:58:29 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:29 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 4614 >/dev/null 2>/dev/null
selfserv with PID 4614 found at Wed Nov 28 10:58:29 EST 2012
selfserv with PID 4614 started at Wed Nov 28 10:58:29 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1048: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 4614 at Wed Nov 28 10:58:29 EST 2012
kill -USR1 4614
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 4614 killed at Wed Nov 28 10:58:29 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 10:58:29 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:29 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 4670 >/dev/null 2>/dev/null
selfserv with PID 4670 found at Wed Nov 28 10:58:29 EST 2012
selfserv with PID 4670 started at Wed Nov 28 10:58:29 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1049: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 4670 at Wed Nov 28 10:58:29 EST 2012
kill -USR1 4670
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 4670 killed at Wed Nov 28 10:58:29 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 10:58:29 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:29 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 4738 >/dev/null 2>/dev/null
selfserv with PID 4738 found at Wed Nov 28 10:58:29 EST 2012
selfserv with PID 4738 started at Wed Nov 28 10:58:29 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1050: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 4738 at Wed Nov 28 10:58:30 EST 2012
kill -USR1 4738
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 4738 killed at Wed Nov 28 10:58:30 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 10:58:30 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:30 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 4794 >/dev/null 2>/dev/null
selfserv with PID 4794 found at Wed Nov 28 10:58:30 EST 2012
selfserv with PID 4794 started at Wed Nov 28 10:58:30 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1051: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4794 at Wed Nov 28 10:58:30 EST 2012
kill -USR1 4794
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 4794 killed at Wed Nov 28 10:58:30 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 10:58:30 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:30 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 4851 >/dev/null 2>/dev/null
selfserv with PID 4851 found at Wed Nov 28 10:58:30 EST 2012
selfserv with PID 4851 started at Wed Nov 28 10:58:30 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1052: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 4851 at Wed Nov 28 10:58:30 EST 2012
kill -USR1 4851
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 4851 killed at Wed Nov 28 10:58:30 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 10:58:30 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:30 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 4919 >/dev/null 2>/dev/null
selfserv with PID 4919 found at Wed Nov 28 10:58:30 EST 2012
selfserv with PID 4919 started at Wed Nov 28 10:58:30 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1053: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4919 at Wed Nov 28 10:58:30 EST 2012
kill -USR1 4919
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 4919 killed at Wed Nov 28 10:58:30 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 10:58:30 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:30 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 4975 >/dev/null 2>/dev/null
selfserv with PID 4975 found at Wed Nov 28 10:58:30 EST 2012
selfserv with PID 4975 started at Wed Nov 28 10:58:30 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1054: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4975 at Wed Nov 28 10:58:30 EST 2012
kill -USR1 4975
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 4975 killed at Wed Nov 28 10:58:30 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 10:58:30 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:30 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 5031 >/dev/null 2>/dev/null
selfserv with PID 5031 found at Wed Nov 28 10:58:30 EST 2012
selfserv with PID 5031 started at Wed Nov 28 10:58:30 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1055: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 5031 at Wed Nov 28 10:58:31 EST 2012
kill -USR1 5031
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 5031 killed at Wed Nov 28 10:58:31 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 10:58:31 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:31 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 5099 >/dev/null 2>/dev/null
selfserv with PID 5099 found at Wed Nov 28 10:58:31 EST 2012
selfserv with PID 5099 started at Wed Nov 28 10:58:31 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1056: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 5099 at Wed Nov 28 10:58:31 EST 2012
kill -USR1 5099
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 5099 killed at Wed Nov 28 10:58:31 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 10:58:31 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:31 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 5155 >/dev/null 2>/dev/null
selfserv with PID 5155 found at Wed Nov 28 10:58:31 EST 2012
selfserv with PID 5155 started at Wed Nov 28 10:58:31 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1057: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 5155 at Wed Nov 28 10:58:31 EST 2012
kill -USR1 5155
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 5155 killed at Wed Nov 28 10:58:31 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 10:58:31 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:31 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 5211 >/dev/null 2>/dev/null
selfserv with PID 5211 found at Wed Nov 28 10:58:31 EST 2012
selfserv with PID 5211 started at Wed Nov 28 10:58:31 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1058: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 5211 at Wed Nov 28 10:58:31 EST 2012
kill -USR1 5211
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 5211 killed at Wed Nov 28 10:58:31 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 10:58:31 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:31 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 5279 >/dev/null 2>/dev/null
selfserv with PID 5279 found at Wed Nov 28 10:58:31 EST 2012
selfserv with PID 5279 started at Wed Nov 28 10:58:31 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1059: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 5279 at Wed Nov 28 10:58:31 EST 2012
kill -USR1 5279
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 5279 killed at Wed Nov 28 10:58:31 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 10:58:31 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:31 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 5335 >/dev/null 2>/dev/null
selfserv with PID 5335 found at Wed Nov 28 10:58:31 EST 2012
selfserv with PID 5335 started at Wed Nov 28 10:58:31 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1060: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 5335 at Wed Nov 28 10:58:31 EST 2012
kill -USR1 5335
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 5335 killed at Wed Nov 28 10:58:31 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 10:58:31 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:31 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 5391 >/dev/null 2>/dev/null
selfserv with PID 5391 found at Wed Nov 28 10:58:31 EST 2012
selfserv with PID 5391 started at Wed Nov 28 10:58:32 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1061: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 5391 at Wed Nov 28 10:58:32 EST 2012
kill -USR1 5391
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 5391 killed at Wed Nov 28 10:58:32 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 10:58:32 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:32 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 5459 >/dev/null 2>/dev/null
selfserv with PID 5459 found at Wed Nov 28 10:58:32 EST 2012
selfserv with PID 5459 started at Wed Nov 28 10:58:32 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1062: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 5459 at Wed Nov 28 10:58:32 EST 2012
kill -USR1 5459
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 5459 killed at Wed Nov 28 10:58:32 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 10:58:32 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:32 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 5515 >/dev/null 2>/dev/null
selfserv with PID 5515 found at Wed Nov 28 10:58:32 EST 2012
selfserv with PID 5515 started at Wed Nov 28 10:58:32 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1063: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 5515 at Wed Nov 28 10:58:32 EST 2012
kill -USR1 5515
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 5515 killed at Wed Nov 28 10:58:32 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 10:58:32 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:32 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 5571 >/dev/null 2>/dev/null
selfserv with PID 5571 found at Wed Nov 28 10:58:32 EST 2012
selfserv with PID 5571 started at Wed Nov 28 10:58:32 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1064: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 5571 at Wed Nov 28 10:58:32 EST 2012
kill -USR1 5571
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 5571 killed at Wed Nov 28 10:58:32 EST 2012
ssl.sh: Cache CRL SSL Client Tests   - with ECC ===============================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/authin.tl.tmp
0
selfserv starting at Wed Nov 28 10:58:32 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:32 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 5634 >/dev/null 2>/dev/null
selfserv with PID 5634 found at Wed Nov 28 10:58:32 EST 2012
selfserv with PID 5634 started at Wed Nov 28 10:58:32 EST 2012
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 5634 >/dev/null 2>/dev/null
selfserv with PID 5634 found at Wed Nov 28 10:58:32 EST 2012
ssl.sh: #1065: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5634 >/dev/null 2>/dev/null
selfserv with PID 5634 found at Wed Nov 28 10:58:33 EST 2012
ssl.sh: #1066: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 5634 >/dev/null 2>/dev/null
selfserv with PID 5634 found at Wed Nov 28 10:58:33 EST 2012
ssl.sh: #1067: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser43   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5634 >/dev/null 2>/dev/null
selfserv with PID 5634 found at Wed Nov 28 10:58:33 EST 2012
ssl.sh: #1068: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser44   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5634 >/dev/null 2>/dev/null
selfserv with PID 5634 found at Wed Nov 28 10:58:33 EST 2012
ssl.sh: #1069: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser45   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5634 >/dev/null 2>/dev/null
selfserv with PID 5634 found at Wed Nov 28 10:58:33 EST 2012
ssl.sh: #1070: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser46   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5634 >/dev/null 2>/dev/null
selfserv with PID 5634 found at Wed Nov 28 10:58:33 EST 2012
ssl.sh: #1071: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser47   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5634 >/dev/null 2>/dev/null
selfserv with PID 5634 found at Wed Nov 28 10:58:33 EST 2012
ssl.sh: #1072: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser48   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5634 >/dev/null 2>/dev/null
selfserv with PID 5634 found at Wed Nov 28 10:58:33 EST 2012
ssl.sh: #1073: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser49   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5634 >/dev/null 2>/dev/null
selfserv with PID 5634 found at Wed Nov 28 10:58:33 EST 2012
ssl.sh: #1074: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser50   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5634 >/dev/null 2>/dev/null
selfserv with PID 5634 found at Wed Nov 28 10:58:33 EST 2012
ssl.sh: #1075: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser51   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5634 >/dev/null 2>/dev/null
selfserv with PID 5634 found at Wed Nov 28 10:58:33 EST 2012
ssl.sh: #1076: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser52   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5634 >/dev/null 2>/dev/null
selfserv with PID 5634 found at Wed Nov 28 10:58:33 EST 2012
ssl.sh: #1077: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/server/root.crl_43-48

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 151 bytes
tstclnt: Writing 151 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5634 >/dev/null 2>/dev/null
selfserv with PID 5634 found at Wed Nov 28 10:58:33 EST 2012
================= CRL Reloaded =============
ssl.sh: #1078: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 5634 >/dev/null 2>/dev/null
selfserv with PID 5634 found at Wed Nov 28 10:58:33 EST 2012
ssl.sh: #1079: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5634 >/dev/null 2>/dev/null
selfserv with PID 5634 found at Wed Nov 28 10:58:34 EST 2012
ssl.sh: #1080: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 5634 >/dev/null 2>/dev/null
selfserv with PID 5634 found at Wed Nov 28 10:58:34 EST 2012
ssl.sh: #1081: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser43   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 5634 >/dev/null 2>/dev/null
selfserv with PID 5634 found at Wed Nov 28 10:58:34 EST 2012
ssl.sh: #1082: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser44   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 5634 >/dev/null 2>/dev/null
selfserv with PID 5634 found at Wed Nov 28 10:58:34 EST 2012
ssl.sh: #1083: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser45   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 5634 >/dev/null 2>/dev/null
selfserv with PID 5634 found at Wed Nov 28 10:58:34 EST 2012
ssl.sh: #1084: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser46   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5634 >/dev/null 2>/dev/null
selfserv with PID 5634 found at Wed Nov 28 10:58:34 EST 2012
ssl.sh: #1085: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser47   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 5634 >/dev/null 2>/dev/null
selfserv with PID 5634 found at Wed Nov 28 10:58:34 EST 2012
ssl.sh: #1086: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser48   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 5634 >/dev/null 2>/dev/null
selfserv with PID 5634 found at Wed Nov 28 10:58:34 EST 2012
ssl.sh: #1087: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser49   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5634 >/dev/null 2>/dev/null
selfserv with PID 5634 found at Wed Nov 28 10:58:34 EST 2012
ssl.sh: #1088: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser50   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5634 >/dev/null 2>/dev/null
selfserv with PID 5634 found at Wed Nov 28 10:58:34 EST 2012
ssl.sh: #1089: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser51   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5634 >/dev/null 2>/dev/null
selfserv with PID 5634 found at Wed Nov 28 10:58:34 EST 2012
ssl.sh: #1090: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser52   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5634 >/dev/null 2>/dev/null
selfserv with PID 5634 found at Wed Nov 28 10:58:34 EST 2012
ssl.sh: #1091: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/server/root.crl_49-52

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 151 bytes
tstclnt: Writing 151 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5634 >/dev/null 2>/dev/null
selfserv with PID 5634 found at Wed Nov 28 10:58:34 EST 2012
================= CRL Reloaded =============
ssl.sh: #1092: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 5634 >/dev/null 2>/dev/null
selfserv with PID 5634 found at Wed Nov 28 10:58:35 EST 2012
ssl.sh: #1093: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5634 >/dev/null 2>/dev/null
selfserv with PID 5634 found at Wed Nov 28 10:58:35 EST 2012
ssl.sh: #1094: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 5634 >/dev/null 2>/dev/null
selfserv with PID 5634 found at Wed Nov 28 10:58:35 EST 2012
ssl.sh: #1095: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser43   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 5634 >/dev/null 2>/dev/null
selfserv with PID 5634 found at Wed Nov 28 10:58:35 EST 2012
ssl.sh: #1096: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser44   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 5634 >/dev/null 2>/dev/null
selfserv with PID 5634 found at Wed Nov 28 10:58:35 EST 2012
ssl.sh: #1097: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser45   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 5634 >/dev/null 2>/dev/null
selfserv with PID 5634 found at Wed Nov 28 10:58:35 EST 2012
ssl.sh: #1098: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser46   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5634 >/dev/null 2>/dev/null
selfserv with PID 5634 found at Wed Nov 28 10:58:36 EST 2012
ssl.sh: #1099: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser47   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 5634 >/dev/null 2>/dev/null
selfserv with PID 5634 found at Wed Nov 28 10:58:36 EST 2012
ssl.sh: #1100: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser48   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 5634 >/dev/null 2>/dev/null
selfserv with PID 5634 found at Wed Nov 28 10:58:36 EST 2012
ssl.sh: #1101: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser49   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 5634 >/dev/null 2>/dev/null
selfserv with PID 5634 found at Wed Nov 28 10:58:36 EST 2012
ssl.sh: #1102: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser50   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 5634 >/dev/null 2>/dev/null
selfserv with PID 5634 found at Wed Nov 28 10:58:36 EST 2012
ssl.sh: #1103: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser51   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5634 >/dev/null 2>/dev/null
selfserv with PID 5634 found at Wed Nov 28 10:58:36 EST 2012
ssl.sh: #1104: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser52   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 5634 >/dev/null 2>/dev/null
selfserv with PID 5634 found at Wed Nov 28 10:58:36 EST 2012
ssl.sh: #1105: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 5634 at Wed Nov 28 10:58:36 EST 2012
kill -USR1 5634
selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 5634 killed at Wed Nov 28 10:58:36 EST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Wed Nov 28 10:58:36 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:36 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 7055 >/dev/null 2>/dev/null
selfserv with PID 7055 found at Wed Nov 28 10:58:36 EST 2012
selfserv with PID 7055 started at Wed Nov 28 10:58:36 EST 2012
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7055 >/dev/null 2>/dev/null
selfserv with PID 7055 found at Wed Nov 28 10:58:36 EST 2012
ssl.sh: #1106: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7055 >/dev/null 2>/dev/null
selfserv with PID 7055 found at Wed Nov 28 10:58:36 EST 2012
ssl.sh: #1107: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7055 >/dev/null 2>/dev/null
selfserv with PID 7055 found at Wed Nov 28 10:58:36 EST 2012
ssl.sh: #1108: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser43 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7055 >/dev/null 2>/dev/null
selfserv with PID 7055 found at Wed Nov 28 10:58:36 EST 2012
ssl.sh: #1109: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser44 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7055 >/dev/null 2>/dev/null
selfserv with PID 7055 found at Wed Nov 28 10:58:36 EST 2012
ssl.sh: #1110: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser45 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7055 >/dev/null 2>/dev/null
selfserv with PID 7055 found at Wed Nov 28 10:58:37 EST 2012
ssl.sh: #1111: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser46 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7055 >/dev/null 2>/dev/null
selfserv with PID 7055 found at Wed Nov 28 10:58:37 EST 2012
ssl.sh: #1112: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser47 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7055 >/dev/null 2>/dev/null
selfserv with PID 7055 found at Wed Nov 28 10:58:37 EST 2012
ssl.sh: #1113: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser48 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7055 >/dev/null 2>/dev/null
selfserv with PID 7055 found at Wed Nov 28 10:58:37 EST 2012
ssl.sh: #1114: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser49 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7055 >/dev/null 2>/dev/null
selfserv with PID 7055 found at Wed Nov 28 10:58:37 EST 2012
ssl.sh: #1115: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser50 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7055 >/dev/null 2>/dev/null
selfserv with PID 7055 found at Wed Nov 28 10:58:37 EST 2012
ssl.sh: #1116: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser51 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7055 >/dev/null 2>/dev/null
selfserv with PID 7055 found at Wed Nov 28 10:58:37 EST 2012
ssl.sh: #1117: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser52 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7055 >/dev/null 2>/dev/null
selfserv with PID 7055 found at Wed Nov 28 10:58:37 EST 2012
ssl.sh: #1118: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/server/root.crl_43-48

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 151 bytes
tstclnt: Writing 151 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7055 >/dev/null 2>/dev/null
selfserv with PID 7055 found at Wed Nov 28 10:58:37 EST 2012
================= CRL Reloaded =============
ssl.sh: #1119: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7055 >/dev/null 2>/dev/null
selfserv with PID 7055 found at Wed Nov 28 10:58:37 EST 2012
ssl.sh: #1120: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7055 >/dev/null 2>/dev/null
selfserv with PID 7055 found at Wed Nov 28 10:58:37 EST 2012
ssl.sh: #1121: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7055 >/dev/null 2>/dev/null
selfserv with PID 7055 found at Wed Nov 28 10:58:37 EST 2012
ssl.sh: #1122: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser43 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7055 >/dev/null 2>/dev/null
selfserv with PID 7055 found at Wed Nov 28 10:58:37 EST 2012
ssl.sh: #1123: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser44 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7055 >/dev/null 2>/dev/null
selfserv with PID 7055 found at Wed Nov 28 10:58:38 EST 2012
ssl.sh: #1124: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser45 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7055 >/dev/null 2>/dev/null
selfserv with PID 7055 found at Wed Nov 28 10:58:38 EST 2012
ssl.sh: #1125: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser46 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7055 >/dev/null 2>/dev/null
selfserv with PID 7055 found at Wed Nov 28 10:58:38 EST 2012
ssl.sh: #1126: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser47 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7055 >/dev/null 2>/dev/null
selfserv with PID 7055 found at Wed Nov 28 10:58:38 EST 2012
ssl.sh: #1127: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser48 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7055 >/dev/null 2>/dev/null
selfserv with PID 7055 found at Wed Nov 28 10:58:38 EST 2012
ssl.sh: #1128: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser49 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7055 >/dev/null 2>/dev/null
selfserv with PID 7055 found at Wed Nov 28 10:58:38 EST 2012
ssl.sh: #1129: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser50 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7055 >/dev/null 2>/dev/null
selfserv with PID 7055 found at Wed Nov 28 10:58:38 EST 2012
ssl.sh: #1130: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser51 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7055 >/dev/null 2>/dev/null
selfserv with PID 7055 found at Wed Nov 28 10:58:38 EST 2012
ssl.sh: #1131: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser52 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7055 >/dev/null 2>/dev/null
selfserv with PID 7055 found at Wed Nov 28 10:58:38 EST 2012
ssl.sh: #1132: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/server/root.crl_49-52

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 151 bytes
tstclnt: Writing 151 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7055 >/dev/null 2>/dev/null
selfserv with PID 7055 found at Wed Nov 28 10:58:38 EST 2012
================= CRL Reloaded =============
ssl.sh: #1133: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7055 >/dev/null 2>/dev/null
selfserv with PID 7055 found at Wed Nov 28 10:58:38 EST 2012
ssl.sh: #1134: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7055 >/dev/null 2>/dev/null
selfserv with PID 7055 found at Wed Nov 28 10:58:38 EST 2012
ssl.sh: #1135: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7055 >/dev/null 2>/dev/null
selfserv with PID 7055 found at Wed Nov 28 10:58:38 EST 2012
ssl.sh: #1136: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser43 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7055 >/dev/null 2>/dev/null
selfserv with PID 7055 found at Wed Nov 28 10:58:38 EST 2012
ssl.sh: #1137: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser44 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7055 >/dev/null 2>/dev/null
selfserv with PID 7055 found at Wed Nov 28 10:58:39 EST 2012
ssl.sh: #1138: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser45 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7055 >/dev/null 2>/dev/null
selfserv with PID 7055 found at Wed Nov 28 10:58:39 EST 2012
ssl.sh: #1139: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser46 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7055 >/dev/null 2>/dev/null
selfserv with PID 7055 found at Wed Nov 28 10:58:39 EST 2012
ssl.sh: #1140: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser47 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7055 >/dev/null 2>/dev/null
selfserv with PID 7055 found at Wed Nov 28 10:58:39 EST 2012
ssl.sh: #1141: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser48 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7055 >/dev/null 2>/dev/null
selfserv with PID 7055 found at Wed Nov 28 10:58:39 EST 2012
ssl.sh: #1142: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser49 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7055 >/dev/null 2>/dev/null
selfserv with PID 7055 found at Wed Nov 28 10:58:39 EST 2012
ssl.sh: #1143: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser50 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7055 >/dev/null 2>/dev/null
selfserv with PID 7055 found at Wed Nov 28 10:58:39 EST 2012
ssl.sh: #1144: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser51 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7055 >/dev/null 2>/dev/null
selfserv with PID 7055 found at Wed Nov 28 10:58:39 EST 2012
ssl.sh: #1145: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser52 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7055 >/dev/null 2>/dev/null
selfserv with PID 7055 found at Wed Nov 28 10:58:39 EST 2012
ssl.sh: #1146: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 7055 at Wed Nov 28 10:58:39 EST 2012
kill -USR1 7055
selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 7055 killed at Wed Nov 28 10:58:39 EST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Wed Nov 28 10:58:39 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 8476 >/dev/null 2>/dev/null
selfserv with PID 8476 found at Wed Nov 28 10:58:39 EST 2012
selfserv with PID 8476 started at Wed Nov 28 10:58:39 EST 2012
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8476 >/dev/null 2>/dev/null
selfserv with PID 8476 found at Wed Nov 28 10:58:39 EST 2012
ssl.sh: #1147: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8476 >/dev/null 2>/dev/null
selfserv with PID 8476 found at Wed Nov 28 10:58:39 EST 2012
ssl.sh: #1148: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8476 >/dev/null 2>/dev/null
selfserv with PID 8476 found at Wed Nov 28 10:58:40 EST 2012
ssl.sh: #1149: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser43-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8476 >/dev/null 2>/dev/null
selfserv with PID 8476 found at Wed Nov 28 10:58:40 EST 2012
ssl.sh: #1150: TLS Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser44-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8476 >/dev/null 2>/dev/null
selfserv with PID 8476 found at Wed Nov 28 10:58:40 EST 2012
ssl.sh: #1151: TLS Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser45-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8476 >/dev/null 2>/dev/null
selfserv with PID 8476 found at Wed Nov 28 10:58:40 EST 2012
ssl.sh: #1152: TLS Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser46-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8476 >/dev/null 2>/dev/null
selfserv with PID 8476 found at Wed Nov 28 10:58:40 EST 2012
ssl.sh: #1153: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser47-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8476 >/dev/null 2>/dev/null
selfserv with PID 8476 found at Wed Nov 28 10:58:40 EST 2012
ssl.sh: #1154: TLS Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser48-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8476 >/dev/null 2>/dev/null
selfserv with PID 8476 found at Wed Nov 28 10:58:40 EST 2012
ssl.sh: #1155: TLS Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser49-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8476 >/dev/null 2>/dev/null
selfserv with PID 8476 found at Wed Nov 28 10:58:40 EST 2012
ssl.sh: #1156: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser50-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8476 >/dev/null 2>/dev/null
selfserv with PID 8476 found at Wed Nov 28 10:58:40 EST 2012
ssl.sh: #1157: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser51-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8476 >/dev/null 2>/dev/null
selfserv with PID 8476 found at Wed Nov 28 10:58:40 EST 2012
ssl.sh: #1158: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser52-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8476 >/dev/null 2>/dev/null
selfserv with PID 8476 found at Wed Nov 28 10:58:41 EST 2012
ssl.sh: #1159: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/server/root.crl_43-48-ec

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 154 bytes
tstclnt: Writing 154 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8476 >/dev/null 2>/dev/null
selfserv with PID 8476 found at Wed Nov 28 10:58:41 EST 2012
================= CRL Reloaded =============
ssl.sh: #1160: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8476 >/dev/null 2>/dev/null
selfserv with PID 8476 found at Wed Nov 28 10:58:41 EST 2012
ssl.sh: #1161: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8476 >/dev/null 2>/dev/null
selfserv with PID 8476 found at Wed Nov 28 10:58:41 EST 2012
ssl.sh: #1162: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8476 >/dev/null 2>/dev/null
selfserv with PID 8476 found at Wed Nov 28 10:58:41 EST 2012
ssl.sh: #1163: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser43-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8476 >/dev/null 2>/dev/null
selfserv with PID 8476 found at Wed Nov 28 10:58:41 EST 2012
ssl.sh: #1164: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser44-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8476 >/dev/null 2>/dev/null
selfserv with PID 8476 found at Wed Nov 28 10:58:41 EST 2012
ssl.sh: #1165: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser45-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8476 >/dev/null 2>/dev/null
selfserv with PID 8476 found at Wed Nov 28 10:58:41 EST 2012
ssl.sh: #1166: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser46-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8476 >/dev/null 2>/dev/null
selfserv with PID 8476 found at Wed Nov 28 10:58:41 EST 2012
ssl.sh: #1167: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser47-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8476 >/dev/null 2>/dev/null
selfserv with PID 8476 found at Wed Nov 28 10:58:41 EST 2012
ssl.sh: #1168: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser48-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8476 >/dev/null 2>/dev/null
selfserv with PID 8476 found at Wed Nov 28 10:58:41 EST 2012
ssl.sh: #1169: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser49-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8476 >/dev/null 2>/dev/null
selfserv with PID 8476 found at Wed Nov 28 10:58:42 EST 2012
ssl.sh: #1170: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser50-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8476 >/dev/null 2>/dev/null
selfserv with PID 8476 found at Wed Nov 28 10:58:42 EST 2012
ssl.sh: #1171: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser51-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8476 >/dev/null 2>/dev/null
selfserv with PID 8476 found at Wed Nov 28 10:58:42 EST 2012
ssl.sh: #1172: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser52-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8476 >/dev/null 2>/dev/null
selfserv with PID 8476 found at Wed Nov 28 10:58:42 EST 2012
ssl.sh: #1173: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/server/root.crl_49-52-ec

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 154 bytes
tstclnt: Writing 154 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8476 >/dev/null 2>/dev/null
selfserv with PID 8476 found at Wed Nov 28 10:58:42 EST 2012
================= CRL Reloaded =============
ssl.sh: #1174: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8476 >/dev/null 2>/dev/null
selfserv with PID 8476 found at Wed Nov 28 10:58:42 EST 2012
ssl.sh: #1175: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8476 >/dev/null 2>/dev/null
selfserv with PID 8476 found at Wed Nov 28 10:58:42 EST 2012
ssl.sh: #1176: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8476 >/dev/null 2>/dev/null
selfserv with PID 8476 found at Wed Nov 28 10:58:42 EST 2012
ssl.sh: #1177: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser43-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8476 >/dev/null 2>/dev/null
selfserv with PID 8476 found at Wed Nov 28 10:58:42 EST 2012
ssl.sh: #1178: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser44-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8476 >/dev/null 2>/dev/null
selfserv with PID 8476 found at Wed Nov 28 10:58:42 EST 2012
ssl.sh: #1179: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser45-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8476 >/dev/null 2>/dev/null
selfserv with PID 8476 found at Wed Nov 28 10:58:42 EST 2012
ssl.sh: #1180: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser46-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8476 >/dev/null 2>/dev/null
selfserv with PID 8476 found at Wed Nov 28 10:58:43 EST 2012
ssl.sh: #1181: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser47-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8476 >/dev/null 2>/dev/null
selfserv with PID 8476 found at Wed Nov 28 10:58:43 EST 2012
ssl.sh: #1182: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser48-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8476 >/dev/null 2>/dev/null
selfserv with PID 8476 found at Wed Nov 28 10:58:43 EST 2012
ssl.sh: #1183: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser49-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8476 >/dev/null 2>/dev/null
selfserv with PID 8476 found at Wed Nov 28 10:58:43 EST 2012
ssl.sh: #1184: TLS Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser50-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8476 >/dev/null 2>/dev/null
selfserv with PID 8476 found at Wed Nov 28 10:58:43 EST 2012
ssl.sh: #1185: TLS Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser51-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8476 >/dev/null 2>/dev/null
selfserv with PID 8476 found at Wed Nov 28 10:58:43 EST 2012
ssl.sh: #1186: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser52-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8476 >/dev/null 2>/dev/null
selfserv with PID 8476 found at Wed Nov 28 10:58:43 EST 2012
ssl.sh: #1187: TLS Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 8476 at Wed Nov 28 10:58:43 EST 2012
kill -USR1 8476
selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 8476 killed at Wed Nov 28 10:58:43 EST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 10:58:43 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 9897 >/dev/null 2>/dev/null
selfserv with PID 9897 found at Wed Nov 28 10:58:43 EST 2012
selfserv with PID 9897 started at Wed Nov 28 10:58:43 EST 2012
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9897 >/dev/null 2>/dev/null
selfserv with PID 9897 found at Wed Nov 28 10:58:43 EST 2012
ssl.sh: #1188: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9897 >/dev/null 2>/dev/null
selfserv with PID 9897 found at Wed Nov 28 10:58:43 EST 2012
ssl.sh: #1189: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9897 >/dev/null 2>/dev/null
selfserv with PID 9897 found at Wed Nov 28 10:58:44 EST 2012
ssl.sh: #1190: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser43-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9897 >/dev/null 2>/dev/null
selfserv with PID 9897 found at Wed Nov 28 10:58:44 EST 2012
ssl.sh: #1191: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser44-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9897 >/dev/null 2>/dev/null
selfserv with PID 9897 found at Wed Nov 28 10:58:44 EST 2012
ssl.sh: #1192: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser45-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9897 >/dev/null 2>/dev/null
selfserv with PID 9897 found at Wed Nov 28 10:58:44 EST 2012
ssl.sh: #1193: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser46-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9897 >/dev/null 2>/dev/null
selfserv with PID 9897 found at Wed Nov 28 10:58:44 EST 2012
ssl.sh: #1194: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser47-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9897 >/dev/null 2>/dev/null
selfserv with PID 9897 found at Wed Nov 28 10:58:44 EST 2012
ssl.sh: #1195: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser48-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9897 >/dev/null 2>/dev/null
selfserv with PID 9897 found at Wed Nov 28 10:58:44 EST 2012
ssl.sh: #1196: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser49-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9897 >/dev/null 2>/dev/null
selfserv with PID 9897 found at Wed Nov 28 10:58:44 EST 2012
ssl.sh: #1197: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser50-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9897 >/dev/null 2>/dev/null
selfserv with PID 9897 found at Wed Nov 28 10:58:44 EST 2012
ssl.sh: #1198: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser51-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9897 >/dev/null 2>/dev/null
selfserv with PID 9897 found at Wed Nov 28 10:58:45 EST 2012
ssl.sh: #1199: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser52-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9897 >/dev/null 2>/dev/null
selfserv with PID 9897 found at Wed Nov 28 10:58:45 EST 2012
ssl.sh: #1200: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/server/root.crl_43-48-ec

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 154 bytes
tstclnt: Writing 154 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9897 >/dev/null 2>/dev/null
selfserv with PID 9897 found at Wed Nov 28 10:58:45 EST 2012
================= CRL Reloaded =============
ssl.sh: #1201: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9897 >/dev/null 2>/dev/null
selfserv with PID 9897 found at Wed Nov 28 10:58:45 EST 2012
ssl.sh: #1202: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9897 >/dev/null 2>/dev/null
selfserv with PID 9897 found at Wed Nov 28 10:58:45 EST 2012
ssl.sh: #1203: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9897 >/dev/null 2>/dev/null
selfserv with PID 9897 found at Wed Nov 28 10:58:45 EST 2012
ssl.sh: #1204: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser43-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9897 >/dev/null 2>/dev/null
selfserv with PID 9897 found at Wed Nov 28 10:58:45 EST 2012
ssl.sh: #1205: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser44-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9897 >/dev/null 2>/dev/null
selfserv with PID 9897 found at Wed Nov 28 10:58:45 EST 2012
ssl.sh: #1206: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser45-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9897 >/dev/null 2>/dev/null
selfserv with PID 9897 found at Wed Nov 28 10:58:45 EST 2012
ssl.sh: #1207: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser46-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9897 >/dev/null 2>/dev/null
selfserv with PID 9897 found at Wed Nov 28 10:58:45 EST 2012
ssl.sh: #1208: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser47-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9897 >/dev/null 2>/dev/null
selfserv with PID 9897 found at Wed Nov 28 10:58:45 EST 2012
ssl.sh: #1209: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser48-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9897 >/dev/null 2>/dev/null
selfserv with PID 9897 found at Wed Nov 28 10:58:46 EST 2012
ssl.sh: #1210: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser49-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9897 >/dev/null 2>/dev/null
selfserv with PID 9897 found at Wed Nov 28 10:58:46 EST 2012
ssl.sh: #1211: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser50-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9897 >/dev/null 2>/dev/null
selfserv with PID 9897 found at Wed Nov 28 10:58:46 EST 2012
ssl.sh: #1212: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser51-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9897 >/dev/null 2>/dev/null
selfserv with PID 9897 found at Wed Nov 28 10:58:46 EST 2012
ssl.sh: #1213: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser52-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9897 >/dev/null 2>/dev/null
selfserv with PID 9897 found at Wed Nov 28 10:58:46 EST 2012
ssl.sh: #1214: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/server/root.crl_49-52-ec

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 154 bytes
tstclnt: Writing 154 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9897 >/dev/null 2>/dev/null
selfserv with PID 9897 found at Wed Nov 28 10:58:46 EST 2012
================= CRL Reloaded =============
ssl.sh: #1215: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9897 >/dev/null 2>/dev/null
selfserv with PID 9897 found at Wed Nov 28 10:58:46 EST 2012
ssl.sh: #1216: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9897 >/dev/null 2>/dev/null
selfserv with PID 9897 found at Wed Nov 28 10:58:46 EST 2012
ssl.sh: #1217: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9897 >/dev/null 2>/dev/null
selfserv with PID 9897 found at Wed Nov 28 10:58:46 EST 2012
ssl.sh: #1218: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser43-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9897 >/dev/null 2>/dev/null
selfserv with PID 9897 found at Wed Nov 28 10:58:47 EST 2012
ssl.sh: #1219: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser44-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9897 >/dev/null 2>/dev/null
selfserv with PID 9897 found at Wed Nov 28 10:58:47 EST 2012
ssl.sh: #1220: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser45-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9897 >/dev/null 2>/dev/null
selfserv with PID 9897 found at Wed Nov 28 10:58:47 EST 2012
ssl.sh: #1221: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser46-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9897 >/dev/null 2>/dev/null
selfserv with PID 9897 found at Wed Nov 28 10:58:47 EST 2012
ssl.sh: #1222: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser47-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9897 >/dev/null 2>/dev/null
selfserv with PID 9897 found at Wed Nov 28 10:58:47 EST 2012
ssl.sh: #1223: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser48-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9897 >/dev/null 2>/dev/null
selfserv with PID 9897 found at Wed Nov 28 10:58:47 EST 2012
ssl.sh: #1224: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser49-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9897 >/dev/null 2>/dev/null
selfserv with PID 9897 found at Wed Nov 28 10:58:47 EST 2012
ssl.sh: #1225: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser50-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9897 >/dev/null 2>/dev/null
selfserv with PID 9897 found at Wed Nov 28 10:58:47 EST 2012
ssl.sh: #1226: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser51-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9897 >/dev/null 2>/dev/null
selfserv with PID 9897 found at Wed Nov 28 10:58:47 EST 2012
ssl.sh: #1227: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser52-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9897 >/dev/null 2>/dev/null
selfserv with PID 9897 found at Wed Nov 28 10:58:47 EST 2012
ssl.sh: #1228: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 9897 at Wed Nov 28 10:58:47 EST 2012
kill -USR1 9897
selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 9897 killed at Wed Nov 28 10:58:47 EST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 10:58:47 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 11322 >/dev/null 2>/dev/null
selfserv with PID 11322 found at Wed Nov 28 10:58:47 EST 2012
selfserv with PID 11322 started at Wed Nov 28 10:58:47 EST 2012
trying to kill selfserv with PID 11322 at Wed Nov 28 10:58:48 EST 2012
kill -USR1 11322
./ssl.sh: line 173: 11322 User defined signal 1   ${PROFTOOL} ${BINDIR}/selfserv -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 11322 killed at Wed Nov 28 10:58:48 EST 2012
selfserv starting at Wed Nov 28 10:58:48 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 11364 >/dev/null 2>/dev/null
selfserv with PID 11364 found at Wed Nov 28 10:58:48 EST 2012
selfserv with PID 11364 started at Wed Nov 28 10:58:48 EST 2012
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11364 >/dev/null 2>/dev/null
selfserv with PID 11364 found at Wed Nov 28 10:58:48 EST 2012
ssl.sh: #1229: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11364 >/dev/null 2>/dev/null
selfserv with PID 11364 found at Wed Nov 28 10:58:48 EST 2012
ssl.sh: #1230: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11364 >/dev/null 2>/dev/null
selfserv with PID 11364 found at Wed Nov 28 10:58:48 EST 2012
ssl.sh: #1231: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11364 >/dev/null 2>/dev/null
selfserv with PID 11364 found at Wed Nov 28 10:58:48 EST 2012
ssl.sh: #1232: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11364 >/dev/null 2>/dev/null
selfserv with PID 11364 found at Wed Nov 28 10:58:48 EST 2012
ssl.sh: #1233: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11364 >/dev/null 2>/dev/null
selfserv with PID 11364 found at Wed Nov 28 10:58:48 EST 2012
ssl.sh: #1234: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11364 >/dev/null 2>/dev/null
selfserv with PID 11364 found at Wed Nov 28 10:58:48 EST 2012
ssl.sh: #1235: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11364 >/dev/null 2>/dev/null
selfserv with PID 11364 found at Wed Nov 28 10:58:48 EST 2012
ssl.sh: #1236: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11364 >/dev/null 2>/dev/null
selfserv with PID 11364 found at Wed Nov 28 10:58:48 EST 2012
ssl.sh: #1237: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11364 >/dev/null 2>/dev/null
selfserv with PID 11364 found at Wed Nov 28 10:58:48 EST 2012
ssl.sh: #1238: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11364 >/dev/null 2>/dev/null
selfserv with PID 11364 found at Wed Nov 28 10:58:48 EST 2012
ssl.sh: #1239: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11364 >/dev/null 2>/dev/null
selfserv with PID 11364 found at Wed Nov 28 10:58:49 EST 2012
ssl.sh: #1240: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11364 >/dev/null 2>/dev/null
selfserv with PID 11364 found at Wed Nov 28 10:58:49 EST 2012
ssl.sh: #1241: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/server/root.crl_43-48

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 151 bytes
tstclnt: Writing 151 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11364 >/dev/null 2>/dev/null
selfserv with PID 11364 found at Wed Nov 28 10:58:49 EST 2012
================= CRL Reloaded =============
ssl.sh: #1242: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11364 >/dev/null 2>/dev/null
selfserv with PID 11364 found at Wed Nov 28 10:58:49 EST 2012
ssl.sh: #1243: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11364 >/dev/null 2>/dev/null
selfserv with PID 11364 found at Wed Nov 28 10:58:49 EST 2012
ssl.sh: #1244: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11364 >/dev/null 2>/dev/null
selfserv with PID 11364 found at Wed Nov 28 10:58:49 EST 2012
ssl.sh: #1245: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11364 >/dev/null 2>/dev/null
selfserv with PID 11364 found at Wed Nov 28 10:58:49 EST 2012
ssl.sh: #1246: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11364 >/dev/null 2>/dev/null
selfserv with PID 11364 found at Wed Nov 28 10:58:49 EST 2012
ssl.sh: #1247: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11364 >/dev/null 2>/dev/null
selfserv with PID 11364 found at Wed Nov 28 10:58:49 EST 2012
ssl.sh: #1248: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11364 >/dev/null 2>/dev/null
selfserv with PID 11364 found at Wed Nov 28 10:58:49 EST 2012
ssl.sh: #1249: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11364 >/dev/null 2>/dev/null
selfserv with PID 11364 found at Wed Nov 28 10:58:49 EST 2012
ssl.sh: #1250: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11364 >/dev/null 2>/dev/null
selfserv with PID 11364 found at Wed Nov 28 10:58:49 EST 2012
ssl.sh: #1251: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11364 >/dev/null 2>/dev/null
selfserv with PID 11364 found at Wed Nov 28 10:58:50 EST 2012
ssl.sh: #1252: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11364 >/dev/null 2>/dev/null
selfserv with PID 11364 found at Wed Nov 28 10:58:50 EST 2012
ssl.sh: #1253: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11364 >/dev/null 2>/dev/null
selfserv with PID 11364 found at Wed Nov 28 10:58:50 EST 2012
ssl.sh: #1254: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11364 >/dev/null 2>/dev/null
selfserv with PID 11364 found at Wed Nov 28 10:58:50 EST 2012
ssl.sh: #1255: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/server/root.crl_49-52

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 151 bytes
tstclnt: Writing 151 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11364 >/dev/null 2>/dev/null
selfserv with PID 11364 found at Wed Nov 28 10:58:50 EST 2012
================= CRL Reloaded =============
ssl.sh: #1256: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11364 >/dev/null 2>/dev/null
selfserv with PID 11364 found at Wed Nov 28 10:58:50 EST 2012
ssl.sh: #1257: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11364 >/dev/null 2>/dev/null
selfserv with PID 11364 found at Wed Nov 28 10:58:50 EST 2012
ssl.sh: #1258: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11364 >/dev/null 2>/dev/null
selfserv with PID 11364 found at Wed Nov 28 10:58:50 EST 2012
ssl.sh: #1259: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11364 >/dev/null 2>/dev/null
selfserv with PID 11364 found at Wed Nov 28 10:58:50 EST 2012
ssl.sh: #1260: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11364 >/dev/null 2>/dev/null
selfserv with PID 11364 found at Wed Nov 28 10:58:50 EST 2012
ssl.sh: #1261: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11364 >/dev/null 2>/dev/null
selfserv with PID 11364 found at Wed Nov 28 10:58:50 EST 2012
ssl.sh: #1262: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11364 >/dev/null 2>/dev/null
selfserv with PID 11364 found at Wed Nov 28 10:58:50 EST 2012
ssl.sh: #1263: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11364 >/dev/null 2>/dev/null
selfserv with PID 11364 found at Wed Nov 28 10:58:50 EST 2012
ssl.sh: #1264: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11364 >/dev/null 2>/dev/null
selfserv with PID 11364 found at Wed Nov 28 10:58:50 EST 2012
ssl.sh: #1265: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11364 >/dev/null 2>/dev/null
selfserv with PID 11364 found at Wed Nov 28 10:58:51 EST 2012
ssl.sh: #1266: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11364 >/dev/null 2>/dev/null
selfserv with PID 11364 found at Wed Nov 28 10:58:51 EST 2012
ssl.sh: #1267: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11364 >/dev/null 2>/dev/null
selfserv with PID 11364 found at Wed Nov 28 10:58:51 EST 2012
ssl.sh: #1268: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11364 >/dev/null 2>/dev/null
selfserv with PID 11364 found at Wed Nov 28 10:58:51 EST 2012
ssl.sh: #1269: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 11364 at Wed Nov 28 10:58:51 EST 2012
kill -USR1 11364
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 11364 killed at Wed Nov 28 10:58:51 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 10:58:51 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:51 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 12788 >/dev/null 2>/dev/null
selfserv with PID 12788 found at Wed Nov 28 10:58:51 EST 2012
selfserv with PID 12788 started at Wed Nov 28 10:58:51 EST 2012
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12788 >/dev/null 2>/dev/null
selfserv with PID 12788 found at Wed Nov 28 10:58:51 EST 2012
ssl.sh: #1270: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12788 >/dev/null 2>/dev/null
selfserv with PID 12788 found at Wed Nov 28 10:58:51 EST 2012
ssl.sh: #1271: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12788 >/dev/null 2>/dev/null
selfserv with PID 12788 found at Wed Nov 28 10:58:51 EST 2012
ssl.sh: #1272: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12788 >/dev/null 2>/dev/null
selfserv with PID 12788 found at Wed Nov 28 10:58:51 EST 2012
ssl.sh: #1273: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12788 >/dev/null 2>/dev/null
selfserv with PID 12788 found at Wed Nov 28 10:58:51 EST 2012
ssl.sh: #1274: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12788 >/dev/null 2>/dev/null
selfserv with PID 12788 found at Wed Nov 28 10:58:51 EST 2012
ssl.sh: #1275: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12788 >/dev/null 2>/dev/null
selfserv with PID 12788 found at Wed Nov 28 10:58:51 EST 2012
ssl.sh: #1276: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12788 >/dev/null 2>/dev/null
selfserv with PID 12788 found at Wed Nov 28 10:58:52 EST 2012
ssl.sh: #1277: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12788 >/dev/null 2>/dev/null
selfserv with PID 12788 found at Wed Nov 28 10:58:52 EST 2012
ssl.sh: #1278: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12788 >/dev/null 2>/dev/null
selfserv with PID 12788 found at Wed Nov 28 10:58:52 EST 2012
ssl.sh: #1279: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12788 >/dev/null 2>/dev/null
selfserv with PID 12788 found at Wed Nov 28 10:58:52 EST 2012
ssl.sh: #1280: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12788 >/dev/null 2>/dev/null
selfserv with PID 12788 found at Wed Nov 28 10:58:52 EST 2012
ssl.sh: #1281: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12788 >/dev/null 2>/dev/null
selfserv with PID 12788 found at Wed Nov 28 10:58:52 EST 2012
ssl.sh: #1282: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/server/root.crl_43-48

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 151 bytes
tstclnt: Writing 151 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12788 >/dev/null 2>/dev/null
selfserv with PID 12788 found at Wed Nov 28 10:58:52 EST 2012
================= CRL Reloaded =============
ssl.sh: #1283: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12788 >/dev/null 2>/dev/null
selfserv with PID 12788 found at Wed Nov 28 10:58:52 EST 2012
ssl.sh: #1284: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12788 >/dev/null 2>/dev/null
selfserv with PID 12788 found at Wed Nov 28 10:58:52 EST 2012
ssl.sh: #1285: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12788 >/dev/null 2>/dev/null
selfserv with PID 12788 found at Wed Nov 28 10:58:52 EST 2012
ssl.sh: #1286: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12788 >/dev/null 2>/dev/null
selfserv with PID 12788 found at Wed Nov 28 10:58:52 EST 2012
ssl.sh: #1287: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12788 >/dev/null 2>/dev/null
selfserv with PID 12788 found at Wed Nov 28 10:58:52 EST 2012
ssl.sh: #1288: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12788 >/dev/null 2>/dev/null
selfserv with PID 12788 found at Wed Nov 28 10:58:52 EST 2012
ssl.sh: #1289: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12788 >/dev/null 2>/dev/null
selfserv with PID 12788 found at Wed Nov 28 10:58:52 EST 2012
ssl.sh: #1290: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12788 >/dev/null 2>/dev/null
selfserv with PID 12788 found at Wed Nov 28 10:58:53 EST 2012
ssl.sh: #1291: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12788 >/dev/null 2>/dev/null
selfserv with PID 12788 found at Wed Nov 28 10:58:53 EST 2012
ssl.sh: #1292: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12788 >/dev/null 2>/dev/null
selfserv with PID 12788 found at Wed Nov 28 10:58:53 EST 2012
ssl.sh: #1293: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12788 >/dev/null 2>/dev/null
selfserv with PID 12788 found at Wed Nov 28 10:58:53 EST 2012
ssl.sh: #1294: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12788 >/dev/null 2>/dev/null
selfserv with PID 12788 found at Wed Nov 28 10:58:53 EST 2012
ssl.sh: #1295: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12788 >/dev/null 2>/dev/null
selfserv with PID 12788 found at Wed Nov 28 10:58:53 EST 2012
ssl.sh: #1296: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/server/root.crl_49-52

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 151 bytes
tstclnt: Writing 151 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12788 >/dev/null 2>/dev/null
selfserv with PID 12788 found at Wed Nov 28 10:58:53 EST 2012
================= CRL Reloaded =============
ssl.sh: #1297: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12788 >/dev/null 2>/dev/null
selfserv with PID 12788 found at Wed Nov 28 10:58:53 EST 2012
ssl.sh: #1298: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12788 >/dev/null 2>/dev/null
selfserv with PID 12788 found at Wed Nov 28 10:58:53 EST 2012
ssl.sh: #1299: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12788 >/dev/null 2>/dev/null
selfserv with PID 12788 found at Wed Nov 28 10:58:53 EST 2012
ssl.sh: #1300: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12788 >/dev/null 2>/dev/null
selfserv with PID 12788 found at Wed Nov 28 10:58:53 EST 2012
ssl.sh: #1301: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12788 >/dev/null 2>/dev/null
selfserv with PID 12788 found at Wed Nov 28 10:58:53 EST 2012
ssl.sh: #1302: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12788 >/dev/null 2>/dev/null
selfserv with PID 12788 found at Wed Nov 28 10:58:54 EST 2012
ssl.sh: #1303: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12788 >/dev/null 2>/dev/null
selfserv with PID 12788 found at Wed Nov 28 10:58:54 EST 2012
ssl.sh: #1304: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12788 >/dev/null 2>/dev/null
selfserv with PID 12788 found at Wed Nov 28 10:58:54 EST 2012
ssl.sh: #1305: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12788 >/dev/null 2>/dev/null
selfserv with PID 12788 found at Wed Nov 28 10:58:54 EST 2012
ssl.sh: #1306: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12788 >/dev/null 2>/dev/null
selfserv with PID 12788 found at Wed Nov 28 10:58:54 EST 2012
ssl.sh: #1307: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12788 >/dev/null 2>/dev/null
selfserv with PID 12788 found at Wed Nov 28 10:58:54 EST 2012
ssl.sh: #1308: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12788 >/dev/null 2>/dev/null
selfserv with PID 12788 found at Wed Nov 28 10:58:54 EST 2012
ssl.sh: #1309: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12788 >/dev/null 2>/dev/null
selfserv with PID 12788 found at Wed Nov 28 10:58:54 EST 2012
ssl.sh: #1310: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 12788 at Wed Nov 28 10:58:54 EST 2012
kill -USR1 12788
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 12788 killed at Wed Nov 28 10:58:54 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 10:58:54 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:54 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 14211 >/dev/null 2>/dev/null
selfserv with PID 14211 found at Wed Nov 28 10:58:54 EST 2012
selfserv with PID 14211 started at Wed Nov 28 10:58:54 EST 2012
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14211 >/dev/null 2>/dev/null
selfserv with PID 14211 found at Wed Nov 28 10:58:54 EST 2012
ssl.sh: #1311: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14211 >/dev/null 2>/dev/null
selfserv with PID 14211 found at Wed Nov 28 10:58:54 EST 2012
ssl.sh: #1312: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14211 >/dev/null 2>/dev/null
selfserv with PID 14211 found at Wed Nov 28 10:58:54 EST 2012
ssl.sh: #1313: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14211 >/dev/null 2>/dev/null
selfserv with PID 14211 found at Wed Nov 28 10:58:54 EST 2012
ssl.sh: #1314: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14211 >/dev/null 2>/dev/null
selfserv with PID 14211 found at Wed Nov 28 10:58:55 EST 2012
ssl.sh: #1315: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14211 >/dev/null 2>/dev/null
selfserv with PID 14211 found at Wed Nov 28 10:58:55 EST 2012
ssl.sh: #1316: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14211 >/dev/null 2>/dev/null
selfserv with PID 14211 found at Wed Nov 28 10:58:55 EST 2012
ssl.sh: #1317: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14211 >/dev/null 2>/dev/null
selfserv with PID 14211 found at Wed Nov 28 10:58:55 EST 2012
ssl.sh: #1318: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14211 >/dev/null 2>/dev/null
selfserv with PID 14211 found at Wed Nov 28 10:58:55 EST 2012
ssl.sh: #1319: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14211 >/dev/null 2>/dev/null
selfserv with PID 14211 found at Wed Nov 28 10:58:55 EST 2012
ssl.sh: #1320: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14211 >/dev/null 2>/dev/null
selfserv with PID 14211 found at Wed Nov 28 10:58:55 EST 2012
ssl.sh: #1321: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14211 >/dev/null 2>/dev/null
selfserv with PID 14211 found at Wed Nov 28 10:58:55 EST 2012
ssl.sh: #1322: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14211 >/dev/null 2>/dev/null
selfserv with PID 14211 found at Wed Nov 28 10:58:55 EST 2012
ssl.sh: #1323: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/server/root.crl_43-48

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 151 bytes
tstclnt: Writing 151 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14211 >/dev/null 2>/dev/null
selfserv with PID 14211 found at Wed Nov 28 10:58:55 EST 2012
================= CRL Reloaded =============
ssl.sh: #1324: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14211 >/dev/null 2>/dev/null
selfserv with PID 14211 found at Wed Nov 28 10:58:55 EST 2012
ssl.sh: #1325: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14211 >/dev/null 2>/dev/null
selfserv with PID 14211 found at Wed Nov 28 10:58:55 EST 2012
ssl.sh: #1326: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14211 >/dev/null 2>/dev/null
selfserv with PID 14211 found at Wed Nov 28 10:58:55 EST 2012
ssl.sh: #1327: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14211 >/dev/null 2>/dev/null
selfserv with PID 14211 found at Wed Nov 28 10:58:56 EST 2012
ssl.sh: #1328: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14211 >/dev/null 2>/dev/null
selfserv with PID 14211 found at Wed Nov 28 10:58:56 EST 2012
ssl.sh: #1329: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14211 >/dev/null 2>/dev/null
selfserv with PID 14211 found at Wed Nov 28 10:58:56 EST 2012
ssl.sh: #1330: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14211 >/dev/null 2>/dev/null
selfserv with PID 14211 found at Wed Nov 28 10:58:56 EST 2012
ssl.sh: #1331: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14211 >/dev/null 2>/dev/null
selfserv with PID 14211 found at Wed Nov 28 10:58:56 EST 2012
ssl.sh: #1332: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14211 >/dev/null 2>/dev/null
selfserv with PID 14211 found at Wed Nov 28 10:58:56 EST 2012
ssl.sh: #1333: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14211 >/dev/null 2>/dev/null
selfserv with PID 14211 found at Wed Nov 28 10:58:56 EST 2012
ssl.sh: #1334: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14211 >/dev/null 2>/dev/null
selfserv with PID 14211 found at Wed Nov 28 10:58:56 EST 2012
ssl.sh: #1335: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14211 >/dev/null 2>/dev/null
selfserv with PID 14211 found at Wed Nov 28 10:58:56 EST 2012
ssl.sh: #1336: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14211 >/dev/null 2>/dev/null
selfserv with PID 14211 found at Wed Nov 28 10:58:56 EST 2012
ssl.sh: #1337: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/server/root.crl_49-52

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 151 bytes
tstclnt: Writing 151 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14211 >/dev/null 2>/dev/null
selfserv with PID 14211 found at Wed Nov 28 10:58:56 EST 2012
================= CRL Reloaded =============
ssl.sh: #1338: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14211 >/dev/null 2>/dev/null
selfserv with PID 14211 found at Wed Nov 28 10:58:56 EST 2012
ssl.sh: #1339: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14211 >/dev/null 2>/dev/null
selfserv with PID 14211 found at Wed Nov 28 10:58:57 EST 2012
ssl.sh: #1340: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14211 >/dev/null 2>/dev/null
selfserv with PID 14211 found at Wed Nov 28 10:58:57 EST 2012
ssl.sh: #1341: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14211 >/dev/null 2>/dev/null
selfserv with PID 14211 found at Wed Nov 28 10:58:57 EST 2012
ssl.sh: #1342: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14211 >/dev/null 2>/dev/null
selfserv with PID 14211 found at Wed Nov 28 10:58:57 EST 2012
ssl.sh: #1343: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14211 >/dev/null 2>/dev/null
selfserv with PID 14211 found at Wed Nov 28 10:58:57 EST 2012
ssl.sh: #1344: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14211 >/dev/null 2>/dev/null
selfserv with PID 14211 found at Wed Nov 28 10:58:57 EST 2012
ssl.sh: #1345: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14211 >/dev/null 2>/dev/null
selfserv with PID 14211 found at Wed Nov 28 10:58:57 EST 2012
ssl.sh: #1346: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14211 >/dev/null 2>/dev/null
selfserv with PID 14211 found at Wed Nov 28 10:58:57 EST 2012
ssl.sh: #1347: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14211 >/dev/null 2>/dev/null
selfserv with PID 14211 found at Wed Nov 28 10:58:57 EST 2012
ssl.sh: #1348: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14211 >/dev/null 2>/dev/null
selfserv with PID 14211 found at Wed Nov 28 10:58:57 EST 2012
ssl.sh: #1349: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14211 >/dev/null 2>/dev/null
selfserv with PID 14211 found at Wed Nov 28 10:58:57 EST 2012
ssl.sh: #1350: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14211 >/dev/null 2>/dev/null
selfserv with PID 14211 found at Wed Nov 28 10:58:57 EST 2012
ssl.sh: #1351: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 14211 at Wed Nov 28 10:58:57 EST 2012
kill -USR1 14211
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 14211 killed at Wed Nov 28 10:58:57 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 10:58:57 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:58:57 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 15631 >/dev/null 2>/dev/null
selfserv with PID 15631 found at Wed Nov 28 10:58:57 EST 2012
selfserv with PID 15631 started at Wed Nov 28 10:58:57 EST 2012
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15631 >/dev/null 2>/dev/null
selfserv with PID 15631 found at Wed Nov 28 10:58:58 EST 2012
ssl.sh: #1352: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15631 >/dev/null 2>/dev/null
selfserv with PID 15631 found at Wed Nov 28 10:58:58 EST 2012
ssl.sh: #1353: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15631 >/dev/null 2>/dev/null
selfserv with PID 15631 found at Wed Nov 28 10:58:58 EST 2012
ssl.sh: #1354: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15631 >/dev/null 2>/dev/null
selfserv with PID 15631 found at Wed Nov 28 10:58:58 EST 2012
ssl.sh: #1355: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15631 >/dev/null 2>/dev/null
selfserv with PID 15631 found at Wed Nov 28 10:58:58 EST 2012
ssl.sh: #1356: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15631 >/dev/null 2>/dev/null
selfserv with PID 15631 found at Wed Nov 28 10:58:58 EST 2012
ssl.sh: #1357: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15631 >/dev/null 2>/dev/null
selfserv with PID 15631 found at Wed Nov 28 10:58:58 EST 2012
ssl.sh: #1358: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15631 >/dev/null 2>/dev/null
selfserv with PID 15631 found at Wed Nov 28 10:58:58 EST 2012
ssl.sh: #1359: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15631 >/dev/null 2>/dev/null
selfserv with PID 15631 found at Wed Nov 28 10:58:58 EST 2012
ssl.sh: #1360: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15631 >/dev/null 2>/dev/null
selfserv with PID 15631 found at Wed Nov 28 10:58:58 EST 2012
ssl.sh: #1361: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15631 >/dev/null 2>/dev/null
selfserv with PID 15631 found at Wed Nov 28 10:58:59 EST 2012
ssl.sh: #1362: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15631 >/dev/null 2>/dev/null
selfserv with PID 15631 found at Wed Nov 28 10:58:59 EST 2012
ssl.sh: #1363: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15631 >/dev/null 2>/dev/null
selfserv with PID 15631 found at Wed Nov 28 10:58:59 EST 2012
ssl.sh: #1364: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/server/root.crl_43-48-ec

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 154 bytes
tstclnt: Writing 154 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15631 >/dev/null 2>/dev/null
selfserv with PID 15631 found at Wed Nov 28 10:58:59 EST 2012
================= CRL Reloaded =============
ssl.sh: #1365: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15631 >/dev/null 2>/dev/null
selfserv with PID 15631 found at Wed Nov 28 10:58:59 EST 2012
ssl.sh: #1366: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15631 >/dev/null 2>/dev/null
selfserv with PID 15631 found at Wed Nov 28 10:58:59 EST 2012
ssl.sh: #1367: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15631 >/dev/null 2>/dev/null
selfserv with PID 15631 found at Wed Nov 28 10:58:59 EST 2012
ssl.sh: #1368: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15631 >/dev/null 2>/dev/null
selfserv with PID 15631 found at Wed Nov 28 10:58:59 EST 2012
ssl.sh: #1369: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15631 >/dev/null 2>/dev/null
selfserv with PID 15631 found at Wed Nov 28 10:58:59 EST 2012
ssl.sh: #1370: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15631 >/dev/null 2>/dev/null
selfserv with PID 15631 found at Wed Nov 28 10:58:59 EST 2012
ssl.sh: #1371: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15631 >/dev/null 2>/dev/null
selfserv with PID 15631 found at Wed Nov 28 10:59:00 EST 2012
ssl.sh: #1372: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15631 >/dev/null 2>/dev/null
selfserv with PID 15631 found at Wed Nov 28 10:59:00 EST 2012
ssl.sh: #1373: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15631 >/dev/null 2>/dev/null
selfserv with PID 15631 found at Wed Nov 28 10:59:00 EST 2012
ssl.sh: #1374: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15631 >/dev/null 2>/dev/null
selfserv with PID 15631 found at Wed Nov 28 10:59:00 EST 2012
ssl.sh: #1375: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15631 >/dev/null 2>/dev/null
selfserv with PID 15631 found at Wed Nov 28 10:59:00 EST 2012
ssl.sh: #1376: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15631 >/dev/null 2>/dev/null
selfserv with PID 15631 found at Wed Nov 28 10:59:00 EST 2012
ssl.sh: #1377: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15631 >/dev/null 2>/dev/null
selfserv with PID 15631 found at Wed Nov 28 10:59:00 EST 2012
ssl.sh: #1378: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/server/root.crl_49-52-ec

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 154 bytes
tstclnt: Writing 154 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15631 >/dev/null 2>/dev/null
selfserv with PID 15631 found at Wed Nov 28 10:59:00 EST 2012
================= CRL Reloaded =============
ssl.sh: #1379: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15631 >/dev/null 2>/dev/null
selfserv with PID 15631 found at Wed Nov 28 10:59:00 EST 2012
ssl.sh: #1380: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15631 >/dev/null 2>/dev/null
selfserv with PID 15631 found at Wed Nov 28 10:59:00 EST 2012
ssl.sh: #1381: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15631 >/dev/null 2>/dev/null
selfserv with PID 15631 found at Wed Nov 28 10:59:01 EST 2012
ssl.sh: #1382: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15631 >/dev/null 2>/dev/null
selfserv with PID 15631 found at Wed Nov 28 10:59:01 EST 2012
ssl.sh: #1383: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15631 >/dev/null 2>/dev/null
selfserv with PID 15631 found at Wed Nov 28 10:59:01 EST 2012
ssl.sh: #1384: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15631 >/dev/null 2>/dev/null
selfserv with PID 15631 found at Wed Nov 28 10:59:01 EST 2012
ssl.sh: #1385: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15631 >/dev/null 2>/dev/null
selfserv with PID 15631 found at Wed Nov 28 10:59:01 EST 2012
ssl.sh: #1386: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15631 >/dev/null 2>/dev/null
selfserv with PID 15631 found at Wed Nov 28 10:59:01 EST 2012
ssl.sh: #1387: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15631 >/dev/null 2>/dev/null
selfserv with PID 15631 found at Wed Nov 28 10:59:01 EST 2012
ssl.sh: #1388: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15631 >/dev/null 2>/dev/null
selfserv with PID 15631 found at Wed Nov 28 10:59:01 EST 2012
ssl.sh: #1389: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15631 >/dev/null 2>/dev/null
selfserv with PID 15631 found at Wed Nov 28 10:59:01 EST 2012
ssl.sh: #1390: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15631 >/dev/null 2>/dev/null
selfserv with PID 15631 found at Wed Nov 28 10:59:01 EST 2012
ssl.sh: #1391: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15631 >/dev/null 2>/dev/null
selfserv with PID 15631 found at Wed Nov 28 10:59:01 EST 2012
ssl.sh: #1392: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 15631 at Wed Nov 28 10:59:02 EST 2012
kill -USR1 15631
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 15631 killed at Wed Nov 28 10:59:02 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 10:59:02 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:02 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 17051 >/dev/null 2>/dev/null
selfserv with PID 17051 found at Wed Nov 28 10:59:02 EST 2012
selfserv with PID 17051 started at Wed Nov 28 10:59:02 EST 2012
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17051 >/dev/null 2>/dev/null
selfserv with PID 17051 found at Wed Nov 28 10:59:02 EST 2012
ssl.sh: #1393: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17051 >/dev/null 2>/dev/null
selfserv with PID 17051 found at Wed Nov 28 10:59:02 EST 2012
ssl.sh: #1394: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17051 >/dev/null 2>/dev/null
selfserv with PID 17051 found at Wed Nov 28 10:59:02 EST 2012
ssl.sh: #1395: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17051 >/dev/null 2>/dev/null
selfserv with PID 17051 found at Wed Nov 28 10:59:02 EST 2012
ssl.sh: #1396: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17051 >/dev/null 2>/dev/null
selfserv with PID 17051 found at Wed Nov 28 10:59:02 EST 2012
ssl.sh: #1397: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17051 >/dev/null 2>/dev/null
selfserv with PID 17051 found at Wed Nov 28 10:59:02 EST 2012
ssl.sh: #1398: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17051 >/dev/null 2>/dev/null
selfserv with PID 17051 found at Wed Nov 28 10:59:02 EST 2012
ssl.sh: #1399: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17051 >/dev/null 2>/dev/null
selfserv with PID 17051 found at Wed Nov 28 10:59:02 EST 2012
ssl.sh: #1400: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17051 >/dev/null 2>/dev/null
selfserv with PID 17051 found at Wed Nov 28 10:59:02 EST 2012
ssl.sh: #1401: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17051 >/dev/null 2>/dev/null
selfserv with PID 17051 found at Wed Nov 28 10:59:03 EST 2012
ssl.sh: #1402: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17051 >/dev/null 2>/dev/null
selfserv with PID 17051 found at Wed Nov 28 10:59:03 EST 2012
ssl.sh: #1403: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17051 >/dev/null 2>/dev/null
selfserv with PID 17051 found at Wed Nov 28 10:59:03 EST 2012
ssl.sh: #1404: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17051 >/dev/null 2>/dev/null
selfserv with PID 17051 found at Wed Nov 28 10:59:03 EST 2012
ssl.sh: #1405: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/server/root.crl_43-48-ec

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 154 bytes
tstclnt: Writing 154 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17051 >/dev/null 2>/dev/null
selfserv with PID 17051 found at Wed Nov 28 10:59:03 EST 2012
================= CRL Reloaded =============
ssl.sh: #1406: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17051 >/dev/null 2>/dev/null
selfserv with PID 17051 found at Wed Nov 28 10:59:03 EST 2012
ssl.sh: #1407: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17051 >/dev/null 2>/dev/null
selfserv with PID 17051 found at Wed Nov 28 10:59:03 EST 2012
ssl.sh: #1408: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17051 >/dev/null 2>/dev/null
selfserv with PID 17051 found at Wed Nov 28 10:59:03 EST 2012
ssl.sh: #1409: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17051 >/dev/null 2>/dev/null
selfserv with PID 17051 found at Wed Nov 28 10:59:03 EST 2012
ssl.sh: #1410: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17051 >/dev/null 2>/dev/null
selfserv with PID 17051 found at Wed Nov 28 10:59:04 EST 2012
ssl.sh: #1411: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17051 >/dev/null 2>/dev/null
selfserv with PID 17051 found at Wed Nov 28 10:59:04 EST 2012
ssl.sh: #1412: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17051 >/dev/null 2>/dev/null
selfserv with PID 17051 found at Wed Nov 28 10:59:04 EST 2012
ssl.sh: #1413: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17051 >/dev/null 2>/dev/null
selfserv with PID 17051 found at Wed Nov 28 10:59:04 EST 2012
ssl.sh: #1414: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17051 >/dev/null 2>/dev/null
selfserv with PID 17051 found at Wed Nov 28 10:59:04 EST 2012
ssl.sh: #1415: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17051 >/dev/null 2>/dev/null
selfserv with PID 17051 found at Wed Nov 28 10:59:04 EST 2012
ssl.sh: #1416: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17051 >/dev/null 2>/dev/null
selfserv with PID 17051 found at Wed Nov 28 10:59:04 EST 2012
ssl.sh: #1417: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17051 >/dev/null 2>/dev/null
selfserv with PID 17051 found at Wed Nov 28 10:59:04 EST 2012
ssl.sh: #1418: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17051 >/dev/null 2>/dev/null
selfserv with PID 17051 found at Wed Nov 28 10:59:04 EST 2012
ssl.sh: #1419: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/server/root.crl_49-52-ec

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 154 bytes
tstclnt: Writing 154 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17051 >/dev/null 2>/dev/null
selfserv with PID 17051 found at Wed Nov 28 10:59:04 EST 2012
================= CRL Reloaded =============
ssl.sh: #1420: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17051 >/dev/null 2>/dev/null
selfserv with PID 17051 found at Wed Nov 28 10:59:05 EST 2012
ssl.sh: #1421: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17051 >/dev/null 2>/dev/null
selfserv with PID 17051 found at Wed Nov 28 10:59:05 EST 2012
ssl.sh: #1422: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17051 >/dev/null 2>/dev/null
selfserv with PID 17051 found at Wed Nov 28 10:59:05 EST 2012
ssl.sh: #1423: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17051 >/dev/null 2>/dev/null
selfserv with PID 17051 found at Wed Nov 28 10:59:05 EST 2012
ssl.sh: #1424: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17051 >/dev/null 2>/dev/null
selfserv with PID 17051 found at Wed Nov 28 10:59:05 EST 2012
ssl.sh: #1425: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17051 >/dev/null 2>/dev/null
selfserv with PID 17051 found at Wed Nov 28 10:59:05 EST 2012
ssl.sh: #1426: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17051 >/dev/null 2>/dev/null
selfserv with PID 17051 found at Wed Nov 28 10:59:05 EST 2012
ssl.sh: #1427: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17051 >/dev/null 2>/dev/null
selfserv with PID 17051 found at Wed Nov 28 10:59:05 EST 2012
ssl.sh: #1428: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17051 >/dev/null 2>/dev/null
selfserv with PID 17051 found at Wed Nov 28 10:59:05 EST 2012
ssl.sh: #1429: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17051 >/dev/null 2>/dev/null
selfserv with PID 17051 found at Wed Nov 28 10:59:05 EST 2012
ssl.sh: #1430: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17051 >/dev/null 2>/dev/null
selfserv with PID 17051 found at Wed Nov 28 10:59:06 EST 2012
ssl.sh: #1431: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17051 >/dev/null 2>/dev/null
selfserv with PID 17051 found at Wed Nov 28 10:59:06 EST 2012
ssl.sh: #1432: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17051 >/dev/null 2>/dev/null
selfserv with PID 17051 found at Wed Nov 28 10:59:06 EST 2012
ssl.sh: #1433: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 17051 at Wed Nov 28 10:59:06 EST 2012
kill -USR1 17051
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 17051 killed at Wed Nov 28 10:59:06 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 10:59:06 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:06 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 18472 >/dev/null 2>/dev/null
selfserv with PID 18472 found at Wed Nov 28 10:59:06 EST 2012
selfserv with PID 18472 started at Wed Nov 28 10:59:06 EST 2012
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18472 >/dev/null 2>/dev/null
selfserv with PID 18472 found at Wed Nov 28 10:59:06 EST 2012
ssl.sh: #1434: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18472 >/dev/null 2>/dev/null
selfserv with PID 18472 found at Wed Nov 28 10:59:06 EST 2012
ssl.sh: #1435: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18472 >/dev/null 2>/dev/null
selfserv with PID 18472 found at Wed Nov 28 10:59:06 EST 2012
ssl.sh: #1436: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18472 >/dev/null 2>/dev/null
selfserv with PID 18472 found at Wed Nov 28 10:59:06 EST 2012
ssl.sh: #1437: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18472 >/dev/null 2>/dev/null
selfserv with PID 18472 found at Wed Nov 28 10:59:06 EST 2012
ssl.sh: #1438: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18472 >/dev/null 2>/dev/null
selfserv with PID 18472 found at Wed Nov 28 10:59:06 EST 2012
ssl.sh: #1439: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18472 >/dev/null 2>/dev/null
selfserv with PID 18472 found at Wed Nov 28 10:59:07 EST 2012
ssl.sh: #1440: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18472 >/dev/null 2>/dev/null
selfserv with PID 18472 found at Wed Nov 28 10:59:07 EST 2012
ssl.sh: #1441: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18472 >/dev/null 2>/dev/null
selfserv with PID 18472 found at Wed Nov 28 10:59:07 EST 2012
ssl.sh: #1442: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18472 >/dev/null 2>/dev/null
selfserv with PID 18472 found at Wed Nov 28 10:59:07 EST 2012
ssl.sh: #1443: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18472 >/dev/null 2>/dev/null
selfserv with PID 18472 found at Wed Nov 28 10:59:07 EST 2012
ssl.sh: #1444: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18472 >/dev/null 2>/dev/null
selfserv with PID 18472 found at Wed Nov 28 10:59:07 EST 2012
ssl.sh: #1445: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18472 >/dev/null 2>/dev/null
selfserv with PID 18472 found at Wed Nov 28 10:59:07 EST 2012
ssl.sh: #1446: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/server/root.crl_43-48-ec

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 154 bytes
tstclnt: Writing 154 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18472 >/dev/null 2>/dev/null
selfserv with PID 18472 found at Wed Nov 28 10:59:07 EST 2012
================= CRL Reloaded =============
ssl.sh: #1447: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18472 >/dev/null 2>/dev/null
selfserv with PID 18472 found at Wed Nov 28 10:59:07 EST 2012
ssl.sh: #1448: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18472 >/dev/null 2>/dev/null
selfserv with PID 18472 found at Wed Nov 28 10:59:07 EST 2012
ssl.sh: #1449: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18472 >/dev/null 2>/dev/null
selfserv with PID 18472 found at Wed Nov 28 10:59:08 EST 2012
ssl.sh: #1450: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18472 >/dev/null 2>/dev/null
selfserv with PID 18472 found at Wed Nov 28 10:59:08 EST 2012
ssl.sh: #1451: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18472 >/dev/null 2>/dev/null
selfserv with PID 18472 found at Wed Nov 28 10:59:08 EST 2012
ssl.sh: #1452: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18472 >/dev/null 2>/dev/null
selfserv with PID 18472 found at Wed Nov 28 10:59:08 EST 2012
ssl.sh: #1453: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18472 >/dev/null 2>/dev/null
selfserv with PID 18472 found at Wed Nov 28 10:59:08 EST 2012
ssl.sh: #1454: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18472 >/dev/null 2>/dev/null
selfserv with PID 18472 found at Wed Nov 28 10:59:08 EST 2012
ssl.sh: #1455: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18472 >/dev/null 2>/dev/null
selfserv with PID 18472 found at Wed Nov 28 10:59:08 EST 2012
ssl.sh: #1456: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18472 >/dev/null 2>/dev/null
selfserv with PID 18472 found at Wed Nov 28 10:59:08 EST 2012
ssl.sh: #1457: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18472 >/dev/null 2>/dev/null
selfserv with PID 18472 found at Wed Nov 28 10:59:08 EST 2012
ssl.sh: #1458: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18472 >/dev/null 2>/dev/null
selfserv with PID 18472 found at Wed Nov 28 10:59:08 EST 2012
ssl.sh: #1459: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18472 >/dev/null 2>/dev/null
selfserv with PID 18472 found at Wed Nov 28 10:59:09 EST 2012
ssl.sh: #1460: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/server/root.crl_49-52-ec

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 154 bytes
tstclnt: Writing 154 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18472 >/dev/null 2>/dev/null
selfserv with PID 18472 found at Wed Nov 28 10:59:09 EST 2012
================= CRL Reloaded =============
ssl.sh: #1461: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18472 >/dev/null 2>/dev/null
selfserv with PID 18472 found at Wed Nov 28 10:59:09 EST 2012
ssl.sh: #1462: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18472 >/dev/null 2>/dev/null
selfserv with PID 18472 found at Wed Nov 28 10:59:09 EST 2012
ssl.sh: #1463: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18472 >/dev/null 2>/dev/null
selfserv with PID 18472 found at Wed Nov 28 10:59:09 EST 2012
ssl.sh: #1464: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18472 >/dev/null 2>/dev/null
selfserv with PID 18472 found at Wed Nov 28 10:59:09 EST 2012
ssl.sh: #1465: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18472 >/dev/null 2>/dev/null
selfserv with PID 18472 found at Wed Nov 28 10:59:09 EST 2012
ssl.sh: #1466: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18472 >/dev/null 2>/dev/null
selfserv with PID 18472 found at Wed Nov 28 10:59:09 EST 2012
ssl.sh: #1467: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18472 >/dev/null 2>/dev/null
selfserv with PID 18472 found at Wed Nov 28 10:59:09 EST 2012
ssl.sh: #1468: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18472 >/dev/null 2>/dev/null
selfserv with PID 18472 found at Wed Nov 28 10:59:09 EST 2012
ssl.sh: #1469: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18472 >/dev/null 2>/dev/null
selfserv with PID 18472 found at Wed Nov 28 10:59:09 EST 2012
ssl.sh: #1470: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18472 >/dev/null 2>/dev/null
selfserv with PID 18472 found at Wed Nov 28 10:59:10 EST 2012
ssl.sh: #1471: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18472 >/dev/null 2>/dev/null
selfserv with PID 18472 found at Wed Nov 28 10:59:10 EST 2012
ssl.sh: #1472: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18472 >/dev/null 2>/dev/null
selfserv with PID 18472 found at Wed Nov 28 10:59:10 EST 2012
ssl.sh: #1473: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18472 >/dev/null 2>/dev/null
selfserv with PID 18472 found at Wed Nov 28 10:59:10 EST 2012
ssl.sh: #1474: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 18472 at Wed Nov 28 10:59:10 EST 2012
kill -USR1 18472
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 18472 killed at Wed Nov 28 10:59:10 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 10:59:10 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:10 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 19893 >/dev/null 2>/dev/null
selfserv with PID 19893 found at Wed Nov 28 10:59:10 EST 2012
selfserv with PID 19893 started at Wed Nov 28 10:59:10 EST 2012
trying to kill selfserv with PID 19893 at Wed Nov 28 10:59:10 EST 2012
kill -USR1 19893
./ssl.sh: line 173: 19893 User defined signal 1   ${PROFTOOL} ${BINDIR}/selfserv -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 19893 killed at Wed Nov 28 10:59:10 EST 2012
selfserv starting at Wed Nov 28 10:59:10 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:10 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 19935 >/dev/null 2>/dev/null
selfserv with PID 19935 found at Wed Nov 28 10:59:10 EST 2012
selfserv with PID 19935 started at Wed Nov 28 10:59:10 EST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19935 >/dev/null 2>/dev/null
selfserv with PID 19935 found at Wed Nov 28 10:59:10 EST 2012
ssl.sh: #1475: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19935 >/dev/null 2>/dev/null
selfserv with PID 19935 found at Wed Nov 28 10:59:10 EST 2012
ssl.sh: #1476: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19935 >/dev/null 2>/dev/null
selfserv with PID 19935 found at Wed Nov 28 10:59:10 EST 2012
ssl.sh: #1477: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19935 >/dev/null 2>/dev/null
selfserv with PID 19935 found at Wed Nov 28 10:59:10 EST 2012
ssl.sh: #1478: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19935 >/dev/null 2>/dev/null
selfserv with PID 19935 found at Wed Nov 28 10:59:10 EST 2012
ssl.sh: #1479: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19935 >/dev/null 2>/dev/null
selfserv with PID 19935 found at Wed Nov 28 10:59:10 EST 2012
ssl.sh: #1480: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19935 >/dev/null 2>/dev/null
selfserv with PID 19935 found at Wed Nov 28 10:59:11 EST 2012
ssl.sh: #1481: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19935 >/dev/null 2>/dev/null
selfserv with PID 19935 found at Wed Nov 28 10:59:11 EST 2012
ssl.sh: #1482: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19935 >/dev/null 2>/dev/null
selfserv with PID 19935 found at Wed Nov 28 10:59:11 EST 2012
ssl.sh: #1483: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19935 >/dev/null 2>/dev/null
selfserv with PID 19935 found at Wed Nov 28 10:59:11 EST 2012
ssl.sh: #1484: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19935 >/dev/null 2>/dev/null
selfserv with PID 19935 found at Wed Nov 28 10:59:11 EST 2012
ssl.sh: #1485: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19935 >/dev/null 2>/dev/null
selfserv with PID 19935 found at Wed Nov 28 10:59:11 EST 2012
ssl.sh: #1486: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19935 >/dev/null 2>/dev/null
selfserv with PID 19935 found at Wed Nov 28 10:59:11 EST 2012
ssl.sh: #1487: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/server/root.crl_43-48

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 151 bytes
tstclnt: Writing 151 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19935 >/dev/null 2>/dev/null
selfserv with PID 19935 found at Wed Nov 28 10:59:11 EST 2012
================= CRL Reloaded =============
ssl.sh: #1488: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19935 >/dev/null 2>/dev/null
selfserv with PID 19935 found at Wed Nov 28 10:59:11 EST 2012
ssl.sh: #1489: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19935 >/dev/null 2>/dev/null
selfserv with PID 19935 found at Wed Nov 28 10:59:11 EST 2012
ssl.sh: #1490: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19935 >/dev/null 2>/dev/null
selfserv with PID 19935 found at Wed Nov 28 10:59:11 EST 2012
ssl.sh: #1491: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19935 >/dev/null 2>/dev/null
selfserv with PID 19935 found at Wed Nov 28 10:59:11 EST 2012
ssl.sh: #1492: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19935 >/dev/null 2>/dev/null
selfserv with PID 19935 found at Wed Nov 28 10:59:12 EST 2012
ssl.sh: #1493: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19935 >/dev/null 2>/dev/null
selfserv with PID 19935 found at Wed Nov 28 10:59:12 EST 2012
ssl.sh: #1494: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19935 >/dev/null 2>/dev/null
selfserv with PID 19935 found at Wed Nov 28 10:59:12 EST 2012
ssl.sh: #1495: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19935 >/dev/null 2>/dev/null
selfserv with PID 19935 found at Wed Nov 28 10:59:12 EST 2012
ssl.sh: #1496: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19935 >/dev/null 2>/dev/null
selfserv with PID 19935 found at Wed Nov 28 10:59:12 EST 2012
ssl.sh: #1497: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19935 >/dev/null 2>/dev/null
selfserv with PID 19935 found at Wed Nov 28 10:59:12 EST 2012
ssl.sh: #1498: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19935 >/dev/null 2>/dev/null
selfserv with PID 19935 found at Wed Nov 28 10:59:12 EST 2012
ssl.sh: #1499: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19935 >/dev/null 2>/dev/null
selfserv with PID 19935 found at Wed Nov 28 10:59:12 EST 2012
ssl.sh: #1500: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19935 >/dev/null 2>/dev/null
selfserv with PID 19935 found at Wed Nov 28 10:59:12 EST 2012
ssl.sh: #1501: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/server/root.crl_49-52

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 151 bytes
tstclnt: Writing 151 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19935 >/dev/null 2>/dev/null
selfserv with PID 19935 found at Wed Nov 28 10:59:12 EST 2012
================= CRL Reloaded =============
ssl.sh: #1502: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19935 >/dev/null 2>/dev/null
selfserv with PID 19935 found at Wed Nov 28 10:59:12 EST 2012
ssl.sh: #1503: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19935 >/dev/null 2>/dev/null
selfserv with PID 19935 found at Wed Nov 28 10:59:12 EST 2012
ssl.sh: #1504: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19935 >/dev/null 2>/dev/null
selfserv with PID 19935 found at Wed Nov 28 10:59:12 EST 2012
ssl.sh: #1505: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19935 >/dev/null 2>/dev/null
selfserv with PID 19935 found at Wed Nov 28 10:59:12 EST 2012
ssl.sh: #1506: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19935 >/dev/null 2>/dev/null
selfserv with PID 19935 found at Wed Nov 28 10:59:13 EST 2012
ssl.sh: #1507: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19935 >/dev/null 2>/dev/null
selfserv with PID 19935 found at Wed Nov 28 10:59:13 EST 2012
ssl.sh: #1508: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19935 >/dev/null 2>/dev/null
selfserv with PID 19935 found at Wed Nov 28 10:59:13 EST 2012
ssl.sh: #1509: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19935 >/dev/null 2>/dev/null
selfserv with PID 19935 found at Wed Nov 28 10:59:13 EST 2012
ssl.sh: #1510: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19935 >/dev/null 2>/dev/null
selfserv with PID 19935 found at Wed Nov 28 10:59:13 EST 2012
ssl.sh: #1511: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19935 >/dev/null 2>/dev/null
selfserv with PID 19935 found at Wed Nov 28 10:59:13 EST 2012
ssl.sh: #1512: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19935 >/dev/null 2>/dev/null
selfserv with PID 19935 found at Wed Nov 28 10:59:13 EST 2012
ssl.sh: #1513: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19935 >/dev/null 2>/dev/null
selfserv with PID 19935 found at Wed Nov 28 10:59:13 EST 2012
ssl.sh: #1514: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19935 >/dev/null 2>/dev/null
selfserv with PID 19935 found at Wed Nov 28 10:59:13 EST 2012
ssl.sh: #1515: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 19935 at Wed Nov 28 10:59:13 EST 2012
kill -USR1 19935
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 19935 killed at Wed Nov 28 10:59:13 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 10:59:13 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:13 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 21357 >/dev/null 2>/dev/null
selfserv with PID 21357 found at Wed Nov 28 10:59:13 EST 2012
selfserv with PID 21357 started at Wed Nov 28 10:59:13 EST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21357 >/dev/null 2>/dev/null
selfserv with PID 21357 found at Wed Nov 28 10:59:13 EST 2012
ssl.sh: #1516: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21357 >/dev/null 2>/dev/null
selfserv with PID 21357 found at Wed Nov 28 10:59:13 EST 2012
ssl.sh: #1517: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21357 >/dev/null 2>/dev/null
selfserv with PID 21357 found at Wed Nov 28 10:59:13 EST 2012
ssl.sh: #1518: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21357 >/dev/null 2>/dev/null
selfserv with PID 21357 found at Wed Nov 28 10:59:14 EST 2012
ssl.sh: #1519: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21357 >/dev/null 2>/dev/null
selfserv with PID 21357 found at Wed Nov 28 10:59:14 EST 2012
ssl.sh: #1520: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21357 >/dev/null 2>/dev/null
selfserv with PID 21357 found at Wed Nov 28 10:59:14 EST 2012
ssl.sh: #1521: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21357 >/dev/null 2>/dev/null
selfserv with PID 21357 found at Wed Nov 28 10:59:14 EST 2012
ssl.sh: #1522: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21357 >/dev/null 2>/dev/null
selfserv with PID 21357 found at Wed Nov 28 10:59:14 EST 2012
ssl.sh: #1523: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21357 >/dev/null 2>/dev/null
selfserv with PID 21357 found at Wed Nov 28 10:59:14 EST 2012
ssl.sh: #1524: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21357 >/dev/null 2>/dev/null
selfserv with PID 21357 found at Wed Nov 28 10:59:14 EST 2012
ssl.sh: #1525: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21357 >/dev/null 2>/dev/null
selfserv with PID 21357 found at Wed Nov 28 10:59:14 EST 2012
ssl.sh: #1526: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21357 >/dev/null 2>/dev/null
selfserv with PID 21357 found at Wed Nov 28 10:59:14 EST 2012
ssl.sh: #1527: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21357 >/dev/null 2>/dev/null
selfserv with PID 21357 found at Wed Nov 28 10:59:14 EST 2012
ssl.sh: #1528: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/server/root.crl_43-48

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 151 bytes
tstclnt: Writing 151 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21357 >/dev/null 2>/dev/null
selfserv with PID 21357 found at Wed Nov 28 10:59:14 EST 2012
================= CRL Reloaded =============
ssl.sh: #1529: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21357 >/dev/null 2>/dev/null
selfserv with PID 21357 found at Wed Nov 28 10:59:14 EST 2012
ssl.sh: #1530: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21357 >/dev/null 2>/dev/null
selfserv with PID 21357 found at Wed Nov 28 10:59:14 EST 2012
ssl.sh: #1531: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21357 >/dev/null 2>/dev/null
selfserv with PID 21357 found at Wed Nov 28 10:59:15 EST 2012
ssl.sh: #1532: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21357 >/dev/null 2>/dev/null
selfserv with PID 21357 found at Wed Nov 28 10:59:15 EST 2012
ssl.sh: #1533: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21357 >/dev/null 2>/dev/null
selfserv with PID 21357 found at Wed Nov 28 10:59:15 EST 2012
ssl.sh: #1534: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21357 >/dev/null 2>/dev/null
selfserv with PID 21357 found at Wed Nov 28 10:59:15 EST 2012
ssl.sh: #1535: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21357 >/dev/null 2>/dev/null
selfserv with PID 21357 found at Wed Nov 28 10:59:15 EST 2012
ssl.sh: #1536: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21357 >/dev/null 2>/dev/null
selfserv with PID 21357 found at Wed Nov 28 10:59:15 EST 2012
ssl.sh: #1537: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21357 >/dev/null 2>/dev/null
selfserv with PID 21357 found at Wed Nov 28 10:59:15 EST 2012
ssl.sh: #1538: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21357 >/dev/null 2>/dev/null
selfserv with PID 21357 found at Wed Nov 28 10:59:15 EST 2012
ssl.sh: #1539: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21357 >/dev/null 2>/dev/null
selfserv with PID 21357 found at Wed Nov 28 10:59:15 EST 2012
ssl.sh: #1540: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21357 >/dev/null 2>/dev/null
selfserv with PID 21357 found at Wed Nov 28 10:59:15 EST 2012
ssl.sh: #1541: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21357 >/dev/null 2>/dev/null
selfserv with PID 21357 found at Wed Nov 28 10:59:15 EST 2012
ssl.sh: #1542: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/server/root.crl_49-52

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 151 bytes
tstclnt: Writing 151 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21357 >/dev/null 2>/dev/null
selfserv with PID 21357 found at Wed Nov 28 10:59:15 EST 2012
================= CRL Reloaded =============
ssl.sh: #1543: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21357 >/dev/null 2>/dev/null
selfserv with PID 21357 found at Wed Nov 28 10:59:15 EST 2012
ssl.sh: #1544: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21357 >/dev/null 2>/dev/null
selfserv with PID 21357 found at Wed Nov 28 10:59:16 EST 2012
ssl.sh: #1545: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21357 >/dev/null 2>/dev/null
selfserv with PID 21357 found at Wed Nov 28 10:59:16 EST 2012
ssl.sh: #1546: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21357 >/dev/null 2>/dev/null
selfserv with PID 21357 found at Wed Nov 28 10:59:16 EST 2012
ssl.sh: #1547: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21357 >/dev/null 2>/dev/null
selfserv with PID 21357 found at Wed Nov 28 10:59:16 EST 2012
ssl.sh: #1548: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21357 >/dev/null 2>/dev/null
selfserv with PID 21357 found at Wed Nov 28 10:59:16 EST 2012
ssl.sh: #1549: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21357 >/dev/null 2>/dev/null
selfserv with PID 21357 found at Wed Nov 28 10:59:16 EST 2012
ssl.sh: #1550: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21357 >/dev/null 2>/dev/null
selfserv with PID 21357 found at Wed Nov 28 10:59:16 EST 2012
ssl.sh: #1551: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21357 >/dev/null 2>/dev/null
selfserv with PID 21357 found at Wed Nov 28 10:59:16 EST 2012
ssl.sh: #1552: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21357 >/dev/null 2>/dev/null
selfserv with PID 21357 found at Wed Nov 28 10:59:16 EST 2012
ssl.sh: #1553: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21357 >/dev/null 2>/dev/null
selfserv with PID 21357 found at Wed Nov 28 10:59:16 EST 2012
ssl.sh: #1554: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21357 >/dev/null 2>/dev/null
selfserv with PID 21357 found at Wed Nov 28 10:59:16 EST 2012
ssl.sh: #1555: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21357 >/dev/null 2>/dev/null
selfserv with PID 21357 found at Wed Nov 28 10:59:16 EST 2012
ssl.sh: #1556: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 21357 at Wed Nov 28 10:59:16 EST 2012
kill -USR1 21357
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 21357 killed at Wed Nov 28 10:59:16 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 10:59:16 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:16 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 22777 >/dev/null 2>/dev/null
selfserv with PID 22777 found at Wed Nov 28 10:59:17 EST 2012
selfserv with PID 22777 started at Wed Nov 28 10:59:17 EST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22777 >/dev/null 2>/dev/null
selfserv with PID 22777 found at Wed Nov 28 10:59:17 EST 2012
ssl.sh: #1557: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22777 >/dev/null 2>/dev/null
selfserv with PID 22777 found at Wed Nov 28 10:59:17 EST 2012
ssl.sh: #1558: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22777 >/dev/null 2>/dev/null
selfserv with PID 22777 found at Wed Nov 28 10:59:17 EST 2012
ssl.sh: #1559: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22777 >/dev/null 2>/dev/null
selfserv with PID 22777 found at Wed Nov 28 10:59:17 EST 2012
ssl.sh: #1560: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22777 >/dev/null 2>/dev/null
selfserv with PID 22777 found at Wed Nov 28 10:59:17 EST 2012
ssl.sh: #1561: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22777 >/dev/null 2>/dev/null
selfserv with PID 22777 found at Wed Nov 28 10:59:17 EST 2012
ssl.sh: #1562: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22777 >/dev/null 2>/dev/null
selfserv with PID 22777 found at Wed Nov 28 10:59:17 EST 2012
ssl.sh: #1563: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22777 >/dev/null 2>/dev/null
selfserv with PID 22777 found at Wed Nov 28 10:59:17 EST 2012
ssl.sh: #1564: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22777 >/dev/null 2>/dev/null
selfserv with PID 22777 found at Wed Nov 28 10:59:17 EST 2012
ssl.sh: #1565: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22777 >/dev/null 2>/dev/null
selfserv with PID 22777 found at Wed Nov 28 10:59:17 EST 2012
ssl.sh: #1566: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22777 >/dev/null 2>/dev/null
selfserv with PID 22777 found at Wed Nov 28 10:59:17 EST 2012
ssl.sh: #1567: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22777 >/dev/null 2>/dev/null
selfserv with PID 22777 found at Wed Nov 28 10:59:17 EST 2012
ssl.sh: #1568: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22777 >/dev/null 2>/dev/null
selfserv with PID 22777 found at Wed Nov 28 10:59:18 EST 2012
ssl.sh: #1569: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/server/root.crl_43-48

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 151 bytes
tstclnt: Writing 151 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22777 >/dev/null 2>/dev/null
selfserv with PID 22777 found at Wed Nov 28 10:59:18 EST 2012
================= CRL Reloaded =============
ssl.sh: #1570: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22777 >/dev/null 2>/dev/null
selfserv with PID 22777 found at Wed Nov 28 10:59:18 EST 2012
ssl.sh: #1571: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22777 >/dev/null 2>/dev/null
selfserv with PID 22777 found at Wed Nov 28 10:59:18 EST 2012
ssl.sh: #1572: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22777 >/dev/null 2>/dev/null
selfserv with PID 22777 found at Wed Nov 28 10:59:18 EST 2012
ssl.sh: #1573: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22777 >/dev/null 2>/dev/null
selfserv with PID 22777 found at Wed Nov 28 10:59:18 EST 2012
ssl.sh: #1574: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22777 >/dev/null 2>/dev/null
selfserv with PID 22777 found at Wed Nov 28 10:59:18 EST 2012
ssl.sh: #1575: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22777 >/dev/null 2>/dev/null
selfserv with PID 22777 found at Wed Nov 28 10:59:18 EST 2012
ssl.sh: #1576: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22777 >/dev/null 2>/dev/null
selfserv with PID 22777 found at Wed Nov 28 10:59:18 EST 2012
ssl.sh: #1577: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22777 >/dev/null 2>/dev/null
selfserv with PID 22777 found at Wed Nov 28 10:59:18 EST 2012
ssl.sh: #1578: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22777 >/dev/null 2>/dev/null
selfserv with PID 22777 found at Wed Nov 28 10:59:18 EST 2012
ssl.sh: #1579: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22777 >/dev/null 2>/dev/null
selfserv with PID 22777 found at Wed Nov 28 10:59:18 EST 2012
ssl.sh: #1580: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22777 >/dev/null 2>/dev/null
selfserv with PID 22777 found at Wed Nov 28 10:59:18 EST 2012
ssl.sh: #1581: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22777 >/dev/null 2>/dev/null
selfserv with PID 22777 found at Wed Nov 28 10:59:19 EST 2012
ssl.sh: #1582: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22777 >/dev/null 2>/dev/null
selfserv with PID 22777 found at Wed Nov 28 10:59:19 EST 2012
ssl.sh: #1583: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/server/root.crl_49-52

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 151 bytes
tstclnt: Writing 151 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22777 >/dev/null 2>/dev/null
selfserv with PID 22777 found at Wed Nov 28 10:59:19 EST 2012
================= CRL Reloaded =============
ssl.sh: #1584: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22777 >/dev/null 2>/dev/null
selfserv with PID 22777 found at Wed Nov 28 10:59:19 EST 2012
ssl.sh: #1585: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22777 >/dev/null 2>/dev/null
selfserv with PID 22777 found at Wed Nov 28 10:59:19 EST 2012
ssl.sh: #1586: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22777 >/dev/null 2>/dev/null
selfserv with PID 22777 found at Wed Nov 28 10:59:19 EST 2012
ssl.sh: #1587: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22777 >/dev/null 2>/dev/null
selfserv with PID 22777 found at Wed Nov 28 10:59:19 EST 2012
ssl.sh: #1588: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22777 >/dev/null 2>/dev/null
selfserv with PID 22777 found at Wed Nov 28 10:59:19 EST 2012
ssl.sh: #1589: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22777 >/dev/null 2>/dev/null
selfserv with PID 22777 found at Wed Nov 28 10:59:19 EST 2012
ssl.sh: #1590: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22777 >/dev/null 2>/dev/null
selfserv with PID 22777 found at Wed Nov 28 10:59:19 EST 2012
ssl.sh: #1591: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22777 >/dev/null 2>/dev/null
selfserv with PID 22777 found at Wed Nov 28 10:59:19 EST 2012
ssl.sh: #1592: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22777 >/dev/null 2>/dev/null
selfserv with PID 22777 found at Wed Nov 28 10:59:19 EST 2012
ssl.sh: #1593: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22777 >/dev/null 2>/dev/null
selfserv with PID 22777 found at Wed Nov 28 10:59:19 EST 2012
ssl.sh: #1594: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22777 >/dev/null 2>/dev/null
selfserv with PID 22777 found at Wed Nov 28 10:59:19 EST 2012
ssl.sh: #1595: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22777 >/dev/null 2>/dev/null
selfserv with PID 22777 found at Wed Nov 28 10:59:20 EST 2012
ssl.sh: #1596: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22777 >/dev/null 2>/dev/null
selfserv with PID 22777 found at Wed Nov 28 10:59:20 EST 2012
ssl.sh: #1597: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 22777 at Wed Nov 28 10:59:20 EST 2012
kill -USR1 22777
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 22777 killed at Wed Nov 28 10:59:20 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 10:59:20 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:20 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24197 >/dev/null 2>/dev/null
selfserv with PID 24197 found at Wed Nov 28 10:59:20 EST 2012
selfserv with PID 24197 started at Wed Nov 28 10:59:20 EST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24197 >/dev/null 2>/dev/null
selfserv with PID 24197 found at Wed Nov 28 10:59:20 EST 2012
ssl.sh: #1598: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24197 >/dev/null 2>/dev/null
selfserv with PID 24197 found at Wed Nov 28 10:59:20 EST 2012
ssl.sh: #1599: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24197 >/dev/null 2>/dev/null
selfserv with PID 24197 found at Wed Nov 28 10:59:20 EST 2012
ssl.sh: #1600: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24197 >/dev/null 2>/dev/null
selfserv with PID 24197 found at Wed Nov 28 10:59:20 EST 2012
ssl.sh: #1601: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24197 >/dev/null 2>/dev/null
selfserv with PID 24197 found at Wed Nov 28 10:59:20 EST 2012
ssl.sh: #1602: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24197 >/dev/null 2>/dev/null
selfserv with PID 24197 found at Wed Nov 28 10:59:20 EST 2012
ssl.sh: #1603: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24197 >/dev/null 2>/dev/null
selfserv with PID 24197 found at Wed Nov 28 10:59:20 EST 2012
ssl.sh: #1604: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24197 >/dev/null 2>/dev/null
selfserv with PID 24197 found at Wed Nov 28 10:59:21 EST 2012
ssl.sh: #1605: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24197 >/dev/null 2>/dev/null
selfserv with PID 24197 found at Wed Nov 28 10:59:21 EST 2012
ssl.sh: #1606: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24197 >/dev/null 2>/dev/null
selfserv with PID 24197 found at Wed Nov 28 10:59:21 EST 2012
ssl.sh: #1607: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24197 >/dev/null 2>/dev/null
selfserv with PID 24197 found at Wed Nov 28 10:59:21 EST 2012
ssl.sh: #1608: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24197 >/dev/null 2>/dev/null
selfserv with PID 24197 found at Wed Nov 28 10:59:21 EST 2012
ssl.sh: #1609: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24197 >/dev/null 2>/dev/null
selfserv with PID 24197 found at Wed Nov 28 10:59:21 EST 2012
ssl.sh: #1610: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/server/root.crl_43-48-ec

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 154 bytes
tstclnt: Writing 154 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24197 >/dev/null 2>/dev/null
selfserv with PID 24197 found at Wed Nov 28 10:59:21 EST 2012
================= CRL Reloaded =============
ssl.sh: #1611: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24197 >/dev/null 2>/dev/null
selfserv with PID 24197 found at Wed Nov 28 10:59:21 EST 2012
ssl.sh: #1612: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24197 >/dev/null 2>/dev/null
selfserv with PID 24197 found at Wed Nov 28 10:59:21 EST 2012
ssl.sh: #1613: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24197 >/dev/null 2>/dev/null
selfserv with PID 24197 found at Wed Nov 28 10:59:22 EST 2012
ssl.sh: #1614: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24197 >/dev/null 2>/dev/null
selfserv with PID 24197 found at Wed Nov 28 10:59:22 EST 2012
ssl.sh: #1615: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24197 >/dev/null 2>/dev/null
selfserv with PID 24197 found at Wed Nov 28 10:59:22 EST 2012
ssl.sh: #1616: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24197 >/dev/null 2>/dev/null
selfserv with PID 24197 found at Wed Nov 28 10:59:22 EST 2012
ssl.sh: #1617: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24197 >/dev/null 2>/dev/null
selfserv with PID 24197 found at Wed Nov 28 10:59:22 EST 2012
ssl.sh: #1618: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24197 >/dev/null 2>/dev/null
selfserv with PID 24197 found at Wed Nov 28 10:59:22 EST 2012
ssl.sh: #1619: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24197 >/dev/null 2>/dev/null
selfserv with PID 24197 found at Wed Nov 28 10:59:22 EST 2012
ssl.sh: #1620: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24197 >/dev/null 2>/dev/null
selfserv with PID 24197 found at Wed Nov 28 10:59:22 EST 2012
ssl.sh: #1621: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24197 >/dev/null 2>/dev/null
selfserv with PID 24197 found at Wed Nov 28 10:59:22 EST 2012
ssl.sh: #1622: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24197 >/dev/null 2>/dev/null
selfserv with PID 24197 found at Wed Nov 28 10:59:22 EST 2012
ssl.sh: #1623: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24197 >/dev/null 2>/dev/null
selfserv with PID 24197 found at Wed Nov 28 10:59:23 EST 2012
ssl.sh: #1624: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/server/root.crl_49-52-ec

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 154 bytes
tstclnt: Writing 154 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24197 >/dev/null 2>/dev/null
selfserv with PID 24197 found at Wed Nov 28 10:59:23 EST 2012
================= CRL Reloaded =============
ssl.sh: #1625: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24197 >/dev/null 2>/dev/null
selfserv with PID 24197 found at Wed Nov 28 10:59:23 EST 2012
ssl.sh: #1626: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24197 >/dev/null 2>/dev/null
selfserv with PID 24197 found at Wed Nov 28 10:59:23 EST 2012
ssl.sh: #1627: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24197 >/dev/null 2>/dev/null
selfserv with PID 24197 found at Wed Nov 28 10:59:23 EST 2012
ssl.sh: #1628: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24197 >/dev/null 2>/dev/null
selfserv with PID 24197 found at Wed Nov 28 10:59:23 EST 2012
ssl.sh: #1629: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24197 >/dev/null 2>/dev/null
selfserv with PID 24197 found at Wed Nov 28 10:59:23 EST 2012
ssl.sh: #1630: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24197 >/dev/null 2>/dev/null
selfserv with PID 24197 found at Wed Nov 28 10:59:23 EST 2012
ssl.sh: #1631: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24197 >/dev/null 2>/dev/null
selfserv with PID 24197 found at Wed Nov 28 10:59:23 EST 2012
ssl.sh: #1632: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24197 >/dev/null 2>/dev/null
selfserv with PID 24197 found at Wed Nov 28 10:59:23 EST 2012
ssl.sh: #1633: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24197 >/dev/null 2>/dev/null
selfserv with PID 24197 found at Wed Nov 28 10:59:24 EST 2012
ssl.sh: #1634: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24197 >/dev/null 2>/dev/null
selfserv with PID 24197 found at Wed Nov 28 10:59:24 EST 2012
ssl.sh: #1635: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24197 >/dev/null 2>/dev/null
selfserv with PID 24197 found at Wed Nov 28 10:59:24 EST 2012
ssl.sh: #1636: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24197 >/dev/null 2>/dev/null
selfserv with PID 24197 found at Wed Nov 28 10:59:24 EST 2012
ssl.sh: #1637: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24197 >/dev/null 2>/dev/null
selfserv with PID 24197 found at Wed Nov 28 10:59:24 EST 2012
ssl.sh: #1638: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24197 at Wed Nov 28 10:59:24 EST 2012
kill -USR1 24197
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24197 killed at Wed Nov 28 10:59:24 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 10:59:24 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:24 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25617 >/dev/null 2>/dev/null
selfserv with PID 25617 found at Wed Nov 28 10:59:24 EST 2012
selfserv with PID 25617 started at Wed Nov 28 10:59:24 EST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25617 >/dev/null 2>/dev/null
selfserv with PID 25617 found at Wed Nov 28 10:59:24 EST 2012
ssl.sh: #1639: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25617 >/dev/null 2>/dev/null
selfserv with PID 25617 found at Wed Nov 28 10:59:24 EST 2012
ssl.sh: #1640: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25617 >/dev/null 2>/dev/null
selfserv with PID 25617 found at Wed Nov 28 10:59:24 EST 2012
ssl.sh: #1641: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25617 >/dev/null 2>/dev/null
selfserv with PID 25617 found at Wed Nov 28 10:59:24 EST 2012
ssl.sh: #1642: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25617 >/dev/null 2>/dev/null
selfserv with PID 25617 found at Wed Nov 28 10:59:25 EST 2012
ssl.sh: #1643: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25617 >/dev/null 2>/dev/null
selfserv with PID 25617 found at Wed Nov 28 10:59:25 EST 2012
ssl.sh: #1644: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25617 >/dev/null 2>/dev/null
selfserv with PID 25617 found at Wed Nov 28 10:59:25 EST 2012
ssl.sh: #1645: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25617 >/dev/null 2>/dev/null
selfserv with PID 25617 found at Wed Nov 28 10:59:25 EST 2012
ssl.sh: #1646: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25617 >/dev/null 2>/dev/null
selfserv with PID 25617 found at Wed Nov 28 10:59:25 EST 2012
ssl.sh: #1647: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25617 >/dev/null 2>/dev/null
selfserv with PID 25617 found at Wed Nov 28 10:59:25 EST 2012
ssl.sh: #1648: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25617 >/dev/null 2>/dev/null
selfserv with PID 25617 found at Wed Nov 28 10:59:25 EST 2012
ssl.sh: #1649: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25617 >/dev/null 2>/dev/null
selfserv with PID 25617 found at Wed Nov 28 10:59:25 EST 2012
ssl.sh: #1650: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25617 >/dev/null 2>/dev/null
selfserv with PID 25617 found at Wed Nov 28 10:59:25 EST 2012
ssl.sh: #1651: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/server/root.crl_43-48-ec

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 154 bytes
tstclnt: Writing 154 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25617 >/dev/null 2>/dev/null
selfserv with PID 25617 found at Wed Nov 28 10:59:26 EST 2012
================= CRL Reloaded =============
ssl.sh: #1652: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25617 >/dev/null 2>/dev/null
selfserv with PID 25617 found at Wed Nov 28 10:59:26 EST 2012
ssl.sh: #1653: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25617 >/dev/null 2>/dev/null
selfserv with PID 25617 found at Wed Nov 28 10:59:26 EST 2012
ssl.sh: #1654: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25617 >/dev/null 2>/dev/null
selfserv with PID 25617 found at Wed Nov 28 10:59:26 EST 2012
ssl.sh: #1655: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25617 >/dev/null 2>/dev/null
selfserv with PID 25617 found at Wed Nov 28 10:59:26 EST 2012
ssl.sh: #1656: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25617 >/dev/null 2>/dev/null
selfserv with PID 25617 found at Wed Nov 28 10:59:26 EST 2012
ssl.sh: #1657: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25617 >/dev/null 2>/dev/null
selfserv with PID 25617 found at Wed Nov 28 10:59:26 EST 2012
ssl.sh: #1658: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25617 >/dev/null 2>/dev/null
selfserv with PID 25617 found at Wed Nov 28 10:59:26 EST 2012
ssl.sh: #1659: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25617 >/dev/null 2>/dev/null
selfserv with PID 25617 found at Wed Nov 28 10:59:26 EST 2012
ssl.sh: #1660: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25617 >/dev/null 2>/dev/null
selfserv with PID 25617 found at Wed Nov 28 10:59:26 EST 2012
ssl.sh: #1661: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25617 >/dev/null 2>/dev/null
selfserv with PID 25617 found at Wed Nov 28 10:59:27 EST 2012
ssl.sh: #1662: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25617 >/dev/null 2>/dev/null
selfserv with PID 25617 found at Wed Nov 28 10:59:27 EST 2012
ssl.sh: #1663: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25617 >/dev/null 2>/dev/null
selfserv with PID 25617 found at Wed Nov 28 10:59:27 EST 2012
ssl.sh: #1664: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25617 >/dev/null 2>/dev/null
selfserv with PID 25617 found at Wed Nov 28 10:59:27 EST 2012
ssl.sh: #1665: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/server/root.crl_49-52-ec

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 154 bytes
tstclnt: Writing 154 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25617 >/dev/null 2>/dev/null
selfserv with PID 25617 found at Wed Nov 28 10:59:27 EST 2012
================= CRL Reloaded =============
ssl.sh: #1666: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25617 >/dev/null 2>/dev/null
selfserv with PID 25617 found at Wed Nov 28 10:59:27 EST 2012
ssl.sh: #1667: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25617 >/dev/null 2>/dev/null
selfserv with PID 25617 found at Wed Nov 28 10:59:27 EST 2012
ssl.sh: #1668: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25617 >/dev/null 2>/dev/null
selfserv with PID 25617 found at Wed Nov 28 10:59:27 EST 2012
ssl.sh: #1669: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25617 >/dev/null 2>/dev/null
selfserv with PID 25617 found at Wed Nov 28 10:59:27 EST 2012
ssl.sh: #1670: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25617 >/dev/null 2>/dev/null
selfserv with PID 25617 found at Wed Nov 28 10:59:27 EST 2012
ssl.sh: #1671: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25617 >/dev/null 2>/dev/null
selfserv with PID 25617 found at Wed Nov 28 10:59:28 EST 2012
ssl.sh: #1672: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25617 >/dev/null 2>/dev/null
selfserv with PID 25617 found at Wed Nov 28 10:59:28 EST 2012
ssl.sh: #1673: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25617 >/dev/null 2>/dev/null
selfserv with PID 25617 found at Wed Nov 28 10:59:28 EST 2012
ssl.sh: #1674: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25617 >/dev/null 2>/dev/null
selfserv with PID 25617 found at Wed Nov 28 10:59:28 EST 2012
ssl.sh: #1675: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25617 >/dev/null 2>/dev/null
selfserv with PID 25617 found at Wed Nov 28 10:59:28 EST 2012
ssl.sh: #1676: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25617 >/dev/null 2>/dev/null
selfserv with PID 25617 found at Wed Nov 28 10:59:28 EST 2012
ssl.sh: #1677: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25617 >/dev/null 2>/dev/null
selfserv with PID 25617 found at Wed Nov 28 10:59:28 EST 2012
ssl.sh: #1678: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25617 >/dev/null 2>/dev/null
selfserv with PID 25617 found at Wed Nov 28 10:59:28 EST 2012
ssl.sh: #1679: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25617 at Wed Nov 28 10:59:28 EST 2012
kill -USR1 25617
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25617 killed at Wed Nov 28 10:59:28 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 10:59:28 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:28 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 27038 >/dev/null 2>/dev/null
selfserv with PID 27038 found at Wed Nov 28 10:59:28 EST 2012
selfserv with PID 27038 started at Wed Nov 28 10:59:28 EST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27038 >/dev/null 2>/dev/null
selfserv with PID 27038 found at Wed Nov 28 10:59:29 EST 2012
ssl.sh: #1680: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27038 >/dev/null 2>/dev/null
selfserv with PID 27038 found at Wed Nov 28 10:59:29 EST 2012
ssl.sh: #1681: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27038 >/dev/null 2>/dev/null
selfserv with PID 27038 found at Wed Nov 28 10:59:29 EST 2012
ssl.sh: #1682: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27038 >/dev/null 2>/dev/null
selfserv with PID 27038 found at Wed Nov 28 10:59:29 EST 2012
ssl.sh: #1683: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27038 >/dev/null 2>/dev/null
selfserv with PID 27038 found at Wed Nov 28 10:59:29 EST 2012
ssl.sh: #1684: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27038 >/dev/null 2>/dev/null
selfserv with PID 27038 found at Wed Nov 28 10:59:29 EST 2012
ssl.sh: #1685: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27038 >/dev/null 2>/dev/null
selfserv with PID 27038 found at Wed Nov 28 10:59:29 EST 2012
ssl.sh: #1686: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27038 >/dev/null 2>/dev/null
selfserv with PID 27038 found at Wed Nov 28 10:59:29 EST 2012
ssl.sh: #1687: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27038 >/dev/null 2>/dev/null
selfserv with PID 27038 found at Wed Nov 28 10:59:29 EST 2012
ssl.sh: #1688: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27038 >/dev/null 2>/dev/null
selfserv with PID 27038 found at Wed Nov 28 10:59:29 EST 2012
ssl.sh: #1689: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27038 >/dev/null 2>/dev/null
selfserv with PID 27038 found at Wed Nov 28 10:59:30 EST 2012
ssl.sh: #1690: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27038 >/dev/null 2>/dev/null
selfserv with PID 27038 found at Wed Nov 28 10:59:30 EST 2012
ssl.sh: #1691: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27038 >/dev/null 2>/dev/null
selfserv with PID 27038 found at Wed Nov 28 10:59:30 EST 2012
ssl.sh: #1692: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/server/root.crl_43-48-ec

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 154 bytes
tstclnt: Writing 154 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27038 >/dev/null 2>/dev/null
selfserv with PID 27038 found at Wed Nov 28 10:59:30 EST 2012
================= CRL Reloaded =============
ssl.sh: #1693: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27038 >/dev/null 2>/dev/null
selfserv with PID 27038 found at Wed Nov 28 10:59:30 EST 2012
ssl.sh: #1694: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27038 >/dev/null 2>/dev/null
selfserv with PID 27038 found at Wed Nov 28 10:59:30 EST 2012
ssl.sh: #1695: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27038 >/dev/null 2>/dev/null
selfserv with PID 27038 found at Wed Nov 28 10:59:30 EST 2012
ssl.sh: #1696: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27038 >/dev/null 2>/dev/null
selfserv with PID 27038 found at Wed Nov 28 10:59:30 EST 2012
ssl.sh: #1697: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27038 >/dev/null 2>/dev/null
selfserv with PID 27038 found at Wed Nov 28 10:59:30 EST 2012
ssl.sh: #1698: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27038 >/dev/null 2>/dev/null
selfserv with PID 27038 found at Wed Nov 28 10:59:30 EST 2012
ssl.sh: #1699: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27038 >/dev/null 2>/dev/null
selfserv with PID 27038 found at Wed Nov 28 10:59:31 EST 2012
ssl.sh: #1700: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27038 >/dev/null 2>/dev/null
selfserv with PID 27038 found at Wed Nov 28 10:59:31 EST 2012
ssl.sh: #1701: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27038 >/dev/null 2>/dev/null
selfserv with PID 27038 found at Wed Nov 28 10:59:31 EST 2012
ssl.sh: #1702: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27038 >/dev/null 2>/dev/null
selfserv with PID 27038 found at Wed Nov 28 10:59:31 EST 2012
ssl.sh: #1703: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27038 >/dev/null 2>/dev/null
selfserv with PID 27038 found at Wed Nov 28 10:59:31 EST 2012
ssl.sh: #1704: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27038 >/dev/null 2>/dev/null
selfserv with PID 27038 found at Wed Nov 28 10:59:31 EST 2012
ssl.sh: #1705: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27038 >/dev/null 2>/dev/null
selfserv with PID 27038 found at Wed Nov 28 10:59:31 EST 2012
ssl.sh: #1706: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/server/root.crl_49-52-ec

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 154 bytes
tstclnt: Writing 154 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27038 >/dev/null 2>/dev/null
selfserv with PID 27038 found at Wed Nov 28 10:59:31 EST 2012
================= CRL Reloaded =============
ssl.sh: #1707: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27038 >/dev/null 2>/dev/null
selfserv with PID 27038 found at Wed Nov 28 10:59:31 EST 2012
ssl.sh: #1708: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27038 >/dev/null 2>/dev/null
selfserv with PID 27038 found at Wed Nov 28 10:59:32 EST 2012
ssl.sh: #1709: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27038 >/dev/null 2>/dev/null
selfserv with PID 27038 found at Wed Nov 28 10:59:32 EST 2012
ssl.sh: #1710: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27038 >/dev/null 2>/dev/null
selfserv with PID 27038 found at Wed Nov 28 10:59:32 EST 2012
ssl.sh: #1711: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27038 >/dev/null 2>/dev/null
selfserv with PID 27038 found at Wed Nov 28 10:59:32 EST 2012
ssl.sh: #1712: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27038 >/dev/null 2>/dev/null
selfserv with PID 27038 found at Wed Nov 28 10:59:32 EST 2012
ssl.sh: #1713: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27038 >/dev/null 2>/dev/null
selfserv with PID 27038 found at Wed Nov 28 10:59:32 EST 2012
ssl.sh: #1714: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27038 >/dev/null 2>/dev/null
selfserv with PID 27038 found at Wed Nov 28 10:59:32 EST 2012
ssl.sh: #1715: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27038 >/dev/null 2>/dev/null
selfserv with PID 27038 found at Wed Nov 28 10:59:32 EST 2012
ssl.sh: #1716: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27038 >/dev/null 2>/dev/null
selfserv with PID 27038 found at Wed Nov 28 10:59:32 EST 2012
ssl.sh: #1717: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27038 >/dev/null 2>/dev/null
selfserv with PID 27038 found at Wed Nov 28 10:59:32 EST 2012
ssl.sh: #1718: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27038 >/dev/null 2>/dev/null
selfserv with PID 27038 found at Wed Nov 28 10:59:33 EST 2012
ssl.sh: #1719: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27038 >/dev/null 2>/dev/null
selfserv with PID 27038 found at Wed Nov 28 10:59:33 EST 2012
ssl.sh: #1720: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 27038 at Wed Nov 28 10:59:33 EST 2012
kill -USR1 27038
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 27038 killed at Wed Nov 28 10:59:33 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 10:59:33 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:33 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 28458 >/dev/null 2>/dev/null
selfserv with PID 28458 found at Wed Nov 28 10:59:33 EST 2012
selfserv with PID 28458 started at Wed Nov 28 10:59:33 EST 2012
trying to kill selfserv with PID 28458 at Wed Nov 28 10:59:33 EST 2012
kill -USR1 28458
./ssl.sh: line 173: 28458 User defined signal 1   ${PROFTOOL} ${BINDIR}/selfserv -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 28458 killed at Wed Nov 28 10:59:33 EST 2012
ssl.sh: SSL Cipher Coverage  - server bypass/client normal  - with ECC ===============================
selfserv starting at Wed Nov 28 10:59:33 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:33 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 28506 >/dev/null 2>/dev/null
selfserv with PID 28506 found at Wed Nov 28 10:59:33 EST 2012
selfserv with PID 28506 started at Wed Nov 28 10:59:33 EST 2012
ssl.sh: running SSL2_RC4_128_WITH_MD5 ----------------------------
kill -0 28506 >/dev/null 2>/dev/null
selfserv with PID 28506 found at Wed Nov 28 10:59:33 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c A -V ssl2:ssl3 -O  \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1721: SSL2_RC4_128_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_RC4_128_EXPORT40_WITH_MD5 ----------------------------
kill -0 28506 >/dev/null 2>/dev/null
selfserv with PID 28506 found at Wed Nov 28 10:59:33 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c B -V ssl2:ssl3 -O  \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1722: SSL2_RC4_128_EXPORT40_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_RC2_128_CBC_WITH_MD5 ----------------------------
kill -0 28506 >/dev/null 2>/dev/null
selfserv with PID 28506 found at Wed Nov 28 10:59:33 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c C -V ssl2:ssl3 -O  \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 128-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1723: SSL2_RC2_128_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 ----------------------------
kill -0 28506 >/dev/null 2>/dev/null
selfserv with PID 28506 found at Wed Nov 28 10:59:33 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c D -V ssl2:ssl3 -O  \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1724: SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_DES_64_CBC_WITH_MD5 ----------------------------
kill -0 28506 >/dev/null 2>/dev/null
selfserv with PID 28506 found at Wed Nov 28 10:59:33 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c E -V ssl2:ssl3 -O  \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 56-bit DES with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1725: SSL2_DES_64_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_DES_192_EDE3_CBC_WITH_MD5 ----------------------------
kill -0 28506 >/dev/null 2>/dev/null
selfserv with PID 28506 found at Wed Nov 28 10:59:33 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c F -V ssl2:ssl3 -O  \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 112-bit 3DES with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1726: SSL2_DES_192_EDE3_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_RC4_128_EXPORT40_WITH_MD5 ----------------------------
kill -0 28506 >/dev/null 2>/dev/null
selfserv with PID 28506 found at Wed Nov 28 10:59:33 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c B -V ssl2:tls1.1 -O  \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1727: SSL2_RC4_128_EXPORT40_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_RC2_128_CBC_WITH_MD5 ----------------------------
kill -0 28506 >/dev/null 2>/dev/null
selfserv with PID 28506 found at Wed Nov 28 10:59:34 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c C -V ssl2:tls1.1 -O  \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 128-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1728: SSL2_RC2_128_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_DES_64_CBC_WITH_MD5 ----------------------------
kill -0 28506 >/dev/null 2>/dev/null
selfserv with PID 28506 found at Wed Nov 28 10:59:34 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c E -V ssl2:tls1.1 -O  \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 56-bit DES with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1729: SSL2_DES_64_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 28506 >/dev/null 2>/dev/null
selfserv with PID 28506 found at Wed Nov 28 10:59:34 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c c -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1730: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 28506 >/dev/null 2>/dev/null
selfserv with PID 28506 found at Wed Nov 28 10:59:34 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c d -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1731: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 28506 >/dev/null 2>/dev/null
selfserv with PID 28506 found at Wed Nov 28 10:59:34 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c e -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1732: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 28506 >/dev/null 2>/dev/null
selfserv with PID 28506 found at Wed Nov 28 10:59:34 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c f -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1733: SSL3_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 28506 >/dev/null 2>/dev/null
selfserv with PID 28506 found at Wed Nov 28 10:59:34 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c g -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1734: SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ----------------------------
kill -0 28506 >/dev/null 2>/dev/null
selfserv with PID 28506 found at Wed Nov 28 10:59:34 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c i -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1735: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 28506 >/dev/null 2>/dev/null
selfserv with PID 28506 found at Wed Nov 28 10:59:34 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c j -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1736: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 28506 >/dev/null 2>/dev/null
selfserv with PID 28506 found at Wed Nov 28 10:59:34 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c k -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1737: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 28506 >/dev/null 2>/dev/null
selfserv with PID 28506 found at Wed Nov 28 10:59:34 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c l -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1738: SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 28506 >/dev/null 2>/dev/null
selfserv with PID 28506 found at Wed Nov 28 10:59:34 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c m -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1739: SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 28506 >/dev/null 2>/dev/null
selfserv with PID 28506 found at Wed Nov 28 10:59:34 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c n -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1740: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 28506 >/dev/null 2>/dev/null
selfserv with PID 28506 found at Wed Nov 28 10:59:34 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c v -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1741: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 28506 >/dev/null 2>/dev/null
selfserv with PID 28506 found at Wed Nov 28 10:59:34 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c y -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1742: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_SHA ----------------------------
kill -0 28506 >/dev/null 2>/dev/null
selfserv with PID 28506 found at Wed Nov 28 10:59:34 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c z -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1743: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 28506 >/dev/null 2>/dev/null
selfserv with PID 28506 found at Wed Nov 28 10:59:35 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c c -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1744: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 28506 >/dev/null 2>/dev/null
selfserv with PID 28506 found at Wed Nov 28 10:59:35 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c d -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1745: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 28506 >/dev/null 2>/dev/null
selfserv with PID 28506 found at Wed Nov 28 10:59:35 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c e -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1746: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 28506 >/dev/null 2>/dev/null
selfserv with PID 28506 found at Wed Nov 28 10:59:35 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c f -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1747: TLS_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 28506 >/dev/null 2>/dev/null
selfserv with PID 28506 found at Wed Nov 28 10:59:35 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c g -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1748: TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_MD5 ----------------------------
kill -0 28506 >/dev/null 2>/dev/null
selfserv with PID 28506 found at Wed Nov 28 10:59:35 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c i -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1749: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 28506 >/dev/null 2>/dev/null
selfserv with PID 28506 found at Wed Nov 28 10:59:35 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c j -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1750: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 28506 >/dev/null 2>/dev/null
selfserv with PID 28506 found at Wed Nov 28 10:59:35 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c k -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1751: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 28506 >/dev/null 2>/dev/null
selfserv with PID 28506 found at Wed Nov 28 10:59:35 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c l -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1752: TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 28506 >/dev/null 2>/dev/null
selfserv with PID 28506 found at Wed Nov 28 10:59:35 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c m -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1753: TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 28506 >/dev/null 2>/dev/null
selfserv with PID 28506 found at Wed Nov 28 10:59:35 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c n -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1754: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 28506 >/dev/null 2>/dev/null
selfserv with PID 28506 found at Wed Nov 28 10:59:35 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c v -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1755: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 28506 >/dev/null 2>/dev/null
selfserv with PID 28506 found at Wed Nov 28 10:59:35 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c y -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1756: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_SHA ----------------------------
kill -0 28506 >/dev/null 2>/dev/null
selfserv with PID 28506 found at Wed Nov 28 10:59:35 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c z -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1757: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 28506 >/dev/null 2>/dev/null
selfserv with PID 28506 found at Wed Nov 28 10:59:35 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c c -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1758: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 28506 >/dev/null 2>/dev/null
selfserv with PID 28506 found at Wed Nov 28 10:59:35 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c d -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1759: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 28506 >/dev/null 2>/dev/null
selfserv with PID 28506 found at Wed Nov 28 10:59:35 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c e -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1760: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ----------------------------
kill -0 28506 >/dev/null 2>/dev/null
selfserv with PID 28506 found at Wed Nov 28 10:59:36 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c i -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1761: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 28506 >/dev/null 2>/dev/null
selfserv with PID 28506 found at Wed Nov 28 10:59:36 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c j -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1762: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 28506 >/dev/null 2>/dev/null
selfserv with PID 28506 found at Wed Nov 28 10:59:36 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c k -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1763: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 28506 >/dev/null 2>/dev/null
selfserv with PID 28506 found at Wed Nov 28 10:59:36 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c l -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1764: TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 28506 >/dev/null 2>/dev/null
selfserv with PID 28506 found at Wed Nov 28 10:59:36 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c m -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1765: TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 28506 >/dev/null 2>/dev/null
selfserv with PID 28506 found at Wed Nov 28 10:59:36 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c n -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1766: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 28506 >/dev/null 2>/dev/null
selfserv with PID 28506 found at Wed Nov 28 10:59:36 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c v -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1767: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 28506 >/dev/null 2>/dev/null
selfserv with PID 28506 found at Wed Nov 28 10:59:36 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c y -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1768: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_SHA ----------------------------
kill -0 28506 >/dev/null 2>/dev/null
selfserv with PID 28506 found at Wed Nov 28 10:59:36 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c z -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1769: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 28506 >/dev/null 2>/dev/null
selfserv with PID 28506 found at Wed Nov 28 10:59:36 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1770: SSL3_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 28506 >/dev/null 2>/dev/null
selfserv with PID 28506 found at Wed Nov 28 10:59:36 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1771: SSL3_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 28506 >/dev/null 2>/dev/null
selfserv with PID 28506 found at Wed Nov 28 10:59:36 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1772: SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 28506 >/dev/null 2>/dev/null
selfserv with PID 28506 found at Wed Nov 28 10:59:36 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1773: SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 28506 >/dev/null 2>/dev/null
selfserv with PID 28506 found at Wed Nov 28 10:59:36 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1774: SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 28506 >/dev/null 2>/dev/null
selfserv with PID 28506 found at Wed Nov 28 10:59:36 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1775: SSL3_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 28506 >/dev/null 2>/dev/null
selfserv with PID 28506 found at Wed Nov 28 10:59:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1776: SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 28506 >/dev/null 2>/dev/null
selfserv with PID 28506 found at Wed Nov 28 10:59:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1777: SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 28506 >/dev/null 2>/dev/null
selfserv with PID 28506 found at Wed Nov 28 10:59:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1778: SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 28506 >/dev/null 2>/dev/null
selfserv with PID 28506 found at Wed Nov 28 10:59:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1779: SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 28506 at Wed Nov 28 10:59:37 EST 2012
kill -USR1 28506
selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 28506 killed at Wed Nov 28 10:59:37 EST 2012
ssl.sh: SSL3_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Wed Nov 28 10:59:37 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 30097 >/dev/null 2>/dev/null
selfserv with PID 30097 found at Wed Nov 28 10:59:37 EST 2012
selfserv with PID 30097 started at Wed Nov 28 10:59:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1780: SSL3_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 30097 >/dev/null 2>/dev/null
selfserv with PID 30097 found at Wed Nov 28 10:59:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1781: SSL3_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 30097 >/dev/null 2>/dev/null
selfserv with PID 30097 found at Wed Nov 28 10:59:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1782: SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 30097 >/dev/null 2>/dev/null
selfserv with PID 30097 found at Wed Nov 28 10:59:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1783: SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 30097 >/dev/null 2>/dev/null
selfserv with PID 30097 found at Wed Nov 28 10:59:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1784: SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 30097 at Wed Nov 28 10:59:37 EST 2012
kill -USR1 30097
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 30097 killed at Wed Nov 28 10:59:37 EST 2012
ssl.sh: SSL3_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Wed Nov 28 10:59:38 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 30245 >/dev/null 2>/dev/null
selfserv with PID 30245 found at Wed Nov 28 10:59:38 EST 2012
selfserv with PID 30245 started at Wed Nov 28 10:59:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1785: SSL3_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 30245 >/dev/null 2>/dev/null
selfserv with PID 30245 found at Wed Nov 28 10:59:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1786: SSL3_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 30245 >/dev/null 2>/dev/null
selfserv with PID 30245 found at Wed Nov 28 10:59:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1787: SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 30245 >/dev/null 2>/dev/null
selfserv with PID 30245 found at Wed Nov 28 10:59:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1788: SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 30245 >/dev/null 2>/dev/null
selfserv with PID 30245 found at Wed Nov 28 10:59:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1789: SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 30245 >/dev/null 2>/dev/null
selfserv with PID 30245 found at Wed Nov 28 10:59:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1790: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 30245 >/dev/null 2>/dev/null
selfserv with PID 30245 found at Wed Nov 28 10:59:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1791: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 30245 >/dev/null 2>/dev/null
selfserv with PID 30245 found at Wed Nov 28 10:59:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1792: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 30245 >/dev/null 2>/dev/null
selfserv with PID 30245 found at Wed Nov 28 10:59:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1793: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 30245 >/dev/null 2>/dev/null
selfserv with PID 30245 found at Wed Nov 28 10:59:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1794: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 30245 >/dev/null 2>/dev/null
selfserv with PID 30245 found at Wed Nov 28 10:59:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1795: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 30245 >/dev/null 2>/dev/null
selfserv with PID 30245 found at Wed Nov 28 10:59:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1796: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 30245 >/dev/null 2>/dev/null
selfserv with PID 30245 found at Wed Nov 28 10:59:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1797: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 30245 >/dev/null 2>/dev/null
selfserv with PID 30245 found at Wed Nov 28 10:59:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1798: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 30245 >/dev/null 2>/dev/null
selfserv with PID 30245 found at Wed Nov 28 10:59:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1799: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 30245 at Wed Nov 28 10:59:39 EST 2012
kill -USR1 30245
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 30245 killed at Wed Nov 28 10:59:39 EST 2012
ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Wed Nov 28 10:59:39 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 30644 >/dev/null 2>/dev/null
selfserv with PID 30644 found at Wed Nov 28 10:59:39 EST 2012
selfserv with PID 30644 started at Wed Nov 28 10:59:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1800: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 30644 >/dev/null 2>/dev/null
selfserv with PID 30644 found at Wed Nov 28 10:59:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1801: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 30644 >/dev/null 2>/dev/null
selfserv with PID 30644 found at Wed Nov 28 10:59:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1802: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 30644 >/dev/null 2>/dev/null
selfserv with PID 30644 found at Wed Nov 28 10:59:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1803: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 30644 >/dev/null 2>/dev/null
selfserv with PID 30644 found at Wed Nov 28 10:59:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1804: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 30644 at Wed Nov 28 10:59:39 EST 2012
kill -USR1 30644
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 30644 killed at Wed Nov 28 10:59:39 EST 2012
ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Wed Nov 28 10:59:39 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 30792 >/dev/null 2>/dev/null
selfserv with PID 30792 found at Wed Nov 28 10:59:39 EST 2012
selfserv with PID 30792 started at Wed Nov 28 10:59:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1805: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 30792 >/dev/null 2>/dev/null
selfserv with PID 30792 found at Wed Nov 28 10:59:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1806: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 30792 >/dev/null 2>/dev/null
selfserv with PID 30792 found at Wed Nov 28 10:59:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1807: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 30792 >/dev/null 2>/dev/null
selfserv with PID 30792 found at Wed Nov 28 10:59:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1808: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 30792 >/dev/null 2>/dev/null
selfserv with PID 30792 found at Wed Nov 28 10:59:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1809: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 30792 >/dev/null 2>/dev/null
selfserv with PID 30792 found at Wed Nov 28 10:59:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1810: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 30792 >/dev/null 2>/dev/null
selfserv with PID 30792 found at Wed Nov 28 10:59:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1811: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 30792 >/dev/null 2>/dev/null
selfserv with PID 30792 found at Wed Nov 28 10:59:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1812: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 30792 >/dev/null 2>/dev/null
selfserv with PID 30792 found at Wed Nov 28 10:59:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1813: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 30792 >/dev/null 2>/dev/null
selfserv with PID 30792 found at Wed Nov 28 10:59:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1814: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 30792 >/dev/null 2>/dev/null
selfserv with PID 30792 found at Wed Nov 28 10:59:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1815: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 30792 >/dev/null 2>/dev/null
selfserv with PID 30792 found at Wed Nov 28 10:59:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1816: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 30792 >/dev/null 2>/dev/null
selfserv with PID 30792 found at Wed Nov 28 10:59:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1817: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 30792 >/dev/null 2>/dev/null
selfserv with PID 30792 found at Wed Nov 28 10:59:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1818: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 30792 >/dev/null 2>/dev/null
selfserv with PID 30792 found at Wed Nov 28 10:59:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1819: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 30792 at Wed Nov 28 10:59:41 EST 2012
kill -USR1 30792
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 30792 killed at Wed Nov 28 10:59:41 EST 2012
ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Wed Nov 28 10:59:41 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 31177 >/dev/null 2>/dev/null
selfserv with PID 31177 found at Wed Nov 28 10:59:41 EST 2012
selfserv with PID 31177 started at Wed Nov 28 10:59:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1820: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 31177 >/dev/null 2>/dev/null
selfserv with PID 31177 found at Wed Nov 28 10:59:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1821: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 31177 >/dev/null 2>/dev/null
selfserv with PID 31177 found at Wed Nov 28 10:59:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1822: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 31177 >/dev/null 2>/dev/null
selfserv with PID 31177 found at Wed Nov 28 10:59:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1823: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 31177 >/dev/null 2>/dev/null
selfserv with PID 31177 found at Wed Nov 28 10:59:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1824: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 31177 at Wed Nov 28 10:59:41 EST 2012
kill -USR1 31177
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 31177 killed at Wed Nov 28 10:59:41 EST 2012
ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Wed Nov 28 10:59:41 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 31325 >/dev/null 2>/dev/null
selfserv with PID 31325 found at Wed Nov 28 10:59:41 EST 2012
selfserv with PID 31325 started at Wed Nov 28 10:59:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1825: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 31325 >/dev/null 2>/dev/null
selfserv with PID 31325 found at Wed Nov 28 10:59:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1826: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 31325 >/dev/null 2>/dev/null
selfserv with PID 31325 found at Wed Nov 28 10:59:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1827: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 31325 >/dev/null 2>/dev/null
selfserv with PID 31325 found at Wed Nov 28 10:59:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1828: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 31325 >/dev/null 2>/dev/null
selfserv with PID 31325 found at Wed Nov 28 10:59:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1829: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31325 at Wed Nov 28 10:59:42 EST 2012
kill -USR1 31325
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 31325 killed at Wed Nov 28 10:59:42 EST 2012
ssl.sh: SSL Client Authentication  - server bypass/client normal  - with ECC ===============================
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 10:59:42 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 31524 >/dev/null 2>/dev/null
selfserv with PID 31524 found at Wed Nov 28 10:59:42 EST 2012
selfserv with PID 31524 started at Wed Nov 28 10:59:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1830: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31524 at Wed Nov 28 10:59:42 EST 2012
kill -USR1 31524
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 31524 killed at Wed Nov 28 10:59:42 EST 2012
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Wed Nov 28 10:59:42 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 31581 >/dev/null 2>/dev/null
selfserv with PID 31581 found at Wed Nov 28 10:59:42 EST 2012
selfserv with PID 31581 started at Wed Nov 28 10:59:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -w bogus -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1831: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31581 at Wed Nov 28 10:59:42 EST 2012
kill -USR1 31581
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 31581 killed at Wed Nov 28 10:59:42 EST 2012
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Wed Nov 28 10:59:42 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 31638 >/dev/null 2>/dev/null
selfserv with PID 31638 found at Wed Nov 28 10:59:42 EST 2012
selfserv with PID 31638 started at Wed Nov 28 10:59:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -w nss -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1832: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31638 at Wed Nov 28 10:59:42 EST 2012
kill -USR1 31638
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 31638 killed at Wed Nov 28 10:59:42 EST 2012
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 10:59:42 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 31695 >/dev/null 2>/dev/null
selfserv with PID 31695 found at Wed Nov 28 10:59:42 EST 2012
selfserv with PID 31695 started at Wed Nov 28 10:59:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1833: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 31695 at Wed Nov 28 10:59:42 EST 2012
kill -USR1 31695
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 31695 killed at Wed Nov 28 10:59:42 EST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Wed Nov 28 10:59:42 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 31752 >/dev/null 2>/dev/null
selfserv with PID 31752 found at Wed Nov 28 10:59:42 EST 2012
selfserv with PID 31752 started at Wed Nov 28 10:59:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -w bogus -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1834: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 31752 at Wed Nov 28 10:59:42 EST 2012
kill -USR1 31752
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 31752 killed at Wed Nov 28 10:59:42 EST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Wed Nov 28 10:59:43 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 31809 >/dev/null 2>/dev/null
selfserv with PID 31809 found at Wed Nov 28 10:59:43 EST 2012
selfserv with PID 31809 started at Wed Nov 28 10:59:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -w nss -n TestUser   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1835: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31809 at Wed Nov 28 10:59:43 EST 2012
kill -USR1 31809
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 31809 killed at Wed Nov 28 10:59:43 EST 2012
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 10:59:43 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 31866 >/dev/null 2>/dev/null
selfserv with PID 31866 found at Wed Nov 28 10:59:43 EST 2012
selfserv with PID 31866 started at Wed Nov 28 10:59:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1836: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31866 at Wed Nov 28 10:59:43 EST 2012
kill -USR1 31866
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 31866 killed at Wed Nov 28 10:59:43 EST 2012
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Wed Nov 28 10:59:43 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 31923 >/dev/null 2>/dev/null
selfserv with PID 31923 found at Wed Nov 28 10:59:43 EST 2012
selfserv with PID 31923 started at Wed Nov 28 10:59:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V :ssl3 -n TestUser -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1837: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31923 at Wed Nov 28 10:59:43 EST 2012
kill -USR1 31923
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 31923 killed at Wed Nov 28 10:59:43 EST 2012
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Wed Nov 28 10:59:43 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 31980 >/dev/null 2>/dev/null
selfserv with PID 31980 found at Wed Nov 28 10:59:43 EST 2012
selfserv with PID 31980 started at Wed Nov 28 10:59:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V :ssl3 -n TestUser -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1838: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31980 at Wed Nov 28 10:59:43 EST 2012
kill -USR1 31980
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 31980 killed at Wed Nov 28 10:59:43 EST 2012
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 10:59:43 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 32037 >/dev/null 2>/dev/null
selfserv with PID 32037 found at Wed Nov 28 10:59:43 EST 2012
selfserv with PID 32037 started at Wed Nov 28 10:59:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1839: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 32037 at Wed Nov 28 10:59:43 EST 2012
kill -USR1 32037
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 32037 killed at Wed Nov 28 10:59:43 EST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Wed Nov 28 10:59:43 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 32094 >/dev/null 2>/dev/null
selfserv with PID 32094 found at Wed Nov 28 10:59:43 EST 2012
selfserv with PID 32094 started at Wed Nov 28 10:59:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V :ssl3 -n TestUser -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1840: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 32094 at Wed Nov 28 10:59:43 EST 2012
kill -USR1 32094
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 32094 killed at Wed Nov 28 10:59:43 EST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Wed Nov 28 10:59:43 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 32151 >/dev/null 2>/dev/null
selfserv with PID 32151 found at Wed Nov 28 10:59:43 EST 2012
selfserv with PID 32151 started at Wed Nov 28 10:59:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V :ssl3 -n TestUser -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1841: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32151 at Wed Nov 28 10:59:44 EST 2012
kill -USR1 32151
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 32151 killed at Wed Nov 28 10:59:44 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 10:59:44 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 32208 >/dev/null 2>/dev/null
selfserv with PID 32208 found at Wed Nov 28 10:59:44 EST 2012
selfserv with PID 32208 started at Wed Nov 28 10:59:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1842: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32208 at Wed Nov 28 10:59:44 EST 2012
kill -USR1 32208
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 32208 killed at Wed Nov 28 10:59:44 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 10:59:44 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 32265 >/dev/null 2>/dev/null
selfserv with PID 32265 found at Wed Nov 28 10:59:44 EST 2012
selfserv with PID 32265 started at Wed Nov 28 10:59:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w bogus -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1843: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32265 at Wed Nov 28 10:59:44 EST 2012
kill -USR1 32265
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 32265 killed at Wed Nov 28 10:59:44 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 10:59:44 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 32322 >/dev/null 2>/dev/null
selfserv with PID 32322 found at Wed Nov 28 10:59:44 EST 2012
selfserv with PID 32322 started at Wed Nov 28 10:59:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1844: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32322 at Wed Nov 28 10:59:44 EST 2012
kill -USR1 32322
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 32322 killed at Wed Nov 28 10:59:44 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 10:59:44 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 32379 >/dev/null 2>/dev/null
selfserv with PID 32379 found at Wed Nov 28 10:59:44 EST 2012
selfserv with PID 32379 started at Wed Nov 28 10:59:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1845: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 32379 at Wed Nov 28 10:59:44 EST 2012
kill -USR1 32379
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 32379 killed at Wed Nov 28 10:59:44 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 10:59:44 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 32436 >/dev/null 2>/dev/null
selfserv with PID 32436 found at Wed Nov 28 10:59:44 EST 2012
selfserv with PID 32436 started at Wed Nov 28 10:59:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w bogus -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1846: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 32436 at Wed Nov 28 10:59:44 EST 2012
kill -USR1 32436
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 32436 killed at Wed Nov 28 10:59:44 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 10:59:44 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:45 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 32493 >/dev/null 2>/dev/null
selfserv with PID 32493 found at Wed Nov 28 10:59:45 EST 2012
selfserv with PID 32493 started at Wed Nov 28 10:59:45 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1847: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32493 at Wed Nov 28 10:59:45 EST 2012
kill -USR1 32493
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 32493 killed at Wed Nov 28 10:59:45 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 10:59:45 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:45 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 32550 >/dev/null 2>/dev/null
selfserv with PID 32550 found at Wed Nov 28 10:59:45 EST 2012
selfserv with PID 32550 started at Wed Nov 28 10:59:45 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1848: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32550 at Wed Nov 28 10:59:45 EST 2012
kill -USR1 32550
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 32550 killed at Wed Nov 28 10:59:45 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 10:59:45 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:45 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 32607 >/dev/null 2>/dev/null
selfserv with PID 32607 found at Wed Nov 28 10:59:45 EST 2012
selfserv with PID 32607 started at Wed Nov 28 10:59:45 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:tls1.0 -w bogus -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1849: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32607 at Wed Nov 28 10:59:45 EST 2012
kill -USR1 32607
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 32607 killed at Wed Nov 28 10:59:45 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 10:59:45 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:45 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 32664 >/dev/null 2>/dev/null
selfserv with PID 32664 found at Wed Nov 28 10:59:45 EST 2012
selfserv with PID 32664 started at Wed Nov 28 10:59:45 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1850: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32664 at Wed Nov 28 10:59:45 EST 2012
kill -USR1 32664
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 32664 killed at Wed Nov 28 10:59:45 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 10:59:45 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:45 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 32721 >/dev/null 2>/dev/null
selfserv with PID 32721 found at Wed Nov 28 10:59:45 EST 2012
selfserv with PID 32721 started at Wed Nov 28 10:59:45 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1851: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 32721 at Wed Nov 28 10:59:45 EST 2012
kill -USR1 32721
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 32721 killed at Wed Nov 28 10:59:45 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 10:59:45 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:45 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 311 >/dev/null 2>/dev/null
selfserv with PID 311 found at Wed Nov 28 10:59:45 EST 2012
selfserv with PID 311 started at Wed Nov 28 10:59:45 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:tls1.0 -w bogus -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1852: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 311 at Wed Nov 28 10:59:46 EST 2012
kill -USR1 311
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 311 killed at Wed Nov 28 10:59:46 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 10:59:46 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 372 >/dev/null 2>/dev/null
selfserv with PID 372 found at Wed Nov 28 10:59:46 EST 2012
selfserv with PID 372 started at Wed Nov 28 10:59:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1853: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 372 at Wed Nov 28 10:59:46 EST 2012
kill -USR1 372
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 372 killed at Wed Nov 28 10:59:46 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 10:59:46 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 435 >/dev/null 2>/dev/null
selfserv with PID 435 found at Wed Nov 28 10:59:46 EST 2012
selfserv with PID 435 started at Wed Nov 28 10:59:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1854: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 435 at Wed Nov 28 10:59:46 EST 2012
kill -USR1 435
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 435 killed at Wed Nov 28 10:59:46 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 10:59:46 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 497 >/dev/null 2>/dev/null
selfserv with PID 497 found at Wed Nov 28 10:59:46 EST 2012
selfserv with PID 497 started at Wed Nov 28 10:59:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1855: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 497 at Wed Nov 28 10:59:46 EST 2012
kill -USR1 497
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 497 killed at Wed Nov 28 10:59:46 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 10:59:46 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 569 >/dev/null 2>/dev/null
selfserv with PID 569 found at Wed Nov 28 10:59:46 EST 2012
selfserv with PID 569 started at Wed Nov 28 10:59:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1856: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 569 at Wed Nov 28 10:59:46 EST 2012
kill -USR1 569
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 569 killed at Wed Nov 28 10:59:46 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 10:59:46 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 637 >/dev/null 2>/dev/null
selfserv with PID 637 found at Wed Nov 28 10:59:46 EST 2012
selfserv with PID 637 started at Wed Nov 28 10:59:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1857: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 637 at Wed Nov 28 10:59:46 EST 2012
kill -USR1 637
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 637 killed at Wed Nov 28 10:59:46 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 10:59:47 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 708 >/dev/null 2>/dev/null
selfserv with PID 708 found at Wed Nov 28 10:59:47 EST 2012
selfserv with PID 708 started at Wed Nov 28 10:59:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1858: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 708 at Wed Nov 28 10:59:47 EST 2012
kill -USR1 708
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 708 killed at Wed Nov 28 10:59:47 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 10:59:47 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 766 >/dev/null 2>/dev/null
selfserv with PID 766 found at Wed Nov 28 10:59:47 EST 2012
selfserv with PID 766 started at Wed Nov 28 10:59:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1859: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 766 at Wed Nov 28 10:59:47 EST 2012
kill -USR1 766
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 766 killed at Wed Nov 28 10:59:47 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 10:59:47 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 853 >/dev/null 2>/dev/null
selfserv with PID 853 found at Wed Nov 28 10:59:47 EST 2012
selfserv with PID 853 started at Wed Nov 28 10:59:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -w bogus -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1860: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 853 at Wed Nov 28 10:59:47 EST 2012
kill -USR1 853
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 853 killed at Wed Nov 28 10:59:47 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 10:59:47 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 922 >/dev/null 2>/dev/null
selfserv with PID 922 found at Wed Nov 28 10:59:47 EST 2012
selfserv with PID 922 started at Wed Nov 28 10:59:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -w nss -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1861: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 922 at Wed Nov 28 10:59:47 EST 2012
kill -USR1 922
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 922 killed at Wed Nov 28 10:59:47 EST 2012
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 10:59:47 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 1009 >/dev/null 2>/dev/null
selfserv with PID 1009 found at Wed Nov 28 10:59:47 EST 2012
selfserv with PID 1009 started at Wed Nov 28 10:59:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -w bogus -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1862: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1009 at Wed Nov 28 10:59:47 EST 2012
kill -USR1 1009
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 1009 killed at Wed Nov 28 10:59:47 EST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 10:59:47 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 1066 >/dev/null 2>/dev/null
selfserv with PID 1066 found at Wed Nov 28 10:59:47 EST 2012
selfserv with PID 1066 started at Wed Nov 28 10:59:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -w nss -n TestUser-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1863: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1066 at Wed Nov 28 10:59:48 EST 2012
kill -USR1 1066
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 1066 killed at Wed Nov 28 10:59:48 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 10:59:48 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 1123 >/dev/null 2>/dev/null
selfserv with PID 1123 found at Wed Nov 28 10:59:48 EST 2012
selfserv with PID 1123 started at Wed Nov 28 10:59:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V :ssl3 -n TestUser-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1864: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1123 at Wed Nov 28 10:59:48 EST 2012
kill -USR1 1123
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 1123 killed at Wed Nov 28 10:59:48 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 10:59:48 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 1180 >/dev/null 2>/dev/null
selfserv with PID 1180 found at Wed Nov 28 10:59:48 EST 2012
selfserv with PID 1180 started at Wed Nov 28 10:59:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V :ssl3 -n TestUser-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1865: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1180 at Wed Nov 28 10:59:48 EST 2012
kill -USR1 1180
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 1180 killed at Wed Nov 28 10:59:48 EST 2012
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 10:59:48 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 1237 >/dev/null 2>/dev/null
selfserv with PID 1237 found at Wed Nov 28 10:59:48 EST 2012
selfserv with PID 1237 started at Wed Nov 28 10:59:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V :ssl3 -n TestUser-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1866: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1237 at Wed Nov 28 10:59:48 EST 2012
kill -USR1 1237
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 1237 killed at Wed Nov 28 10:59:48 EST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 10:59:48 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 1294 >/dev/null 2>/dev/null
selfserv with PID 1294 found at Wed Nov 28 10:59:48 EST 2012
selfserv with PID 1294 started at Wed Nov 28 10:59:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V :ssl3 -n TestUser-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1867: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1294 at Wed Nov 28 10:59:48 EST 2012
kill -USR1 1294
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 1294 killed at Wed Nov 28 10:59:48 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 10:59:48 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 1351 >/dev/null 2>/dev/null
selfserv with PID 1351 found at Wed Nov 28 10:59:48 EST 2012
selfserv with PID 1351 started at Wed Nov 28 10:59:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w bogus -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1868: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1351 at Wed Nov 28 10:59:49 EST 2012
kill -USR1 1351
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 1351 killed at Wed Nov 28 10:59:49 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 10:59:49 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:49 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 1408 >/dev/null 2>/dev/null
selfserv with PID 1408 found at Wed Nov 28 10:59:49 EST 2012
selfserv with PID 1408 started at Wed Nov 28 10:59:49 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1869: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1408 at Wed Nov 28 10:59:49 EST 2012
kill -USR1 1408
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 1408 killed at Wed Nov 28 10:59:49 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 10:59:49 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:49 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 1465 >/dev/null 2>/dev/null
selfserv with PID 1465 found at Wed Nov 28 10:59:49 EST 2012
selfserv with PID 1465 started at Wed Nov 28 10:59:49 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w bogus -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1870: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1465 at Wed Nov 28 10:59:49 EST 2012
kill -USR1 1465
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 1465 killed at Wed Nov 28 10:59:49 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 10:59:49 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:49 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 1522 >/dev/null 2>/dev/null
selfserv with PID 1522 found at Wed Nov 28 10:59:49 EST 2012
selfserv with PID 1522 started at Wed Nov 28 10:59:49 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1871: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1522 at Wed Nov 28 10:59:49 EST 2012
kill -USR1 1522
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 1522 killed at Wed Nov 28 10:59:49 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 10:59:49 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:49 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 1579 >/dev/null 2>/dev/null
selfserv with PID 1579 found at Wed Nov 28 10:59:49 EST 2012
selfserv with PID 1579 started at Wed Nov 28 10:59:49 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:tls1.0 -w bogus -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1872: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1579 at Wed Nov 28 10:59:49 EST 2012
kill -USR1 1579
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 1579 killed at Wed Nov 28 10:59:49 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 10:59:49 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:49 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 1636 >/dev/null 2>/dev/null
selfserv with PID 1636 found at Wed Nov 28 10:59:49 EST 2012
selfserv with PID 1636 started at Wed Nov 28 10:59:49 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1873: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1636 at Wed Nov 28 10:59:50 EST 2012
kill -USR1 1636
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 1636 killed at Wed Nov 28 10:59:50 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 10:59:50 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:50 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 1693 >/dev/null 2>/dev/null
selfserv with PID 1693 found at Wed Nov 28 10:59:50 EST 2012
selfserv with PID 1693 started at Wed Nov 28 10:59:50 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:tls1.0 -w bogus -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1874: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1693 at Wed Nov 28 10:59:50 EST 2012
kill -USR1 1693
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 1693 killed at Wed Nov 28 10:59:50 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 10:59:50 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:50 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 1750 >/dev/null 2>/dev/null
selfserv with PID 1750 found at Wed Nov 28 10:59:50 EST 2012
selfserv with PID 1750 started at Wed Nov 28 10:59:50 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n TestUser-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1875: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1750 at Wed Nov 28 10:59:50 EST 2012
kill -USR1 1750
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 1750 killed at Wed Nov 28 10:59:50 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 10:59:50 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:50 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 1807 >/dev/null 2>/dev/null
selfserv with PID 1807 found at Wed Nov 28 10:59:50 EST 2012
selfserv with PID 1807 started at Wed Nov 28 10:59:50 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1876: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1807 at Wed Nov 28 10:59:50 EST 2012
kill -USR1 1807
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 1807 killed at Wed Nov 28 10:59:50 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 10:59:50 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:50 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 1865 >/dev/null 2>/dev/null
selfserv with PID 1865 found at Wed Nov 28 10:59:50 EST 2012
selfserv with PID 1865 started at Wed Nov 28 10:59:50 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1877: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1865 at Wed Nov 28 10:59:50 EST 2012
kill -USR1 1865
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 1865 killed at Wed Nov 28 10:59:50 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 10:59:50 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:50 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 1922 >/dev/null 2>/dev/null
selfserv with PID 1922 found at Wed Nov 28 10:59:50 EST 2012
selfserv with PID 1922 started at Wed Nov 28 10:59:50 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1878: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1922 at Wed Nov 28 10:59:50 EST 2012
kill -USR1 1922
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 1922 killed at Wed Nov 28 10:59:50 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 10:59:50 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:50 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 1979 >/dev/null 2>/dev/null
selfserv with PID 1979 found at Wed Nov 28 10:59:50 EST 2012
selfserv with PID 1979 started at Wed Nov 28 10:59:50 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1879: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1979 at Wed Nov 28 10:59:51 EST 2012
kill -USR1 1979
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 1979 killed at Wed Nov 28 10:59:51 EST 2012
ssl.sh: TLS Server hello response without SNI ----
selfserv starting at Wed Nov 28 10:59:51 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:51 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 2057 >/dev/null 2>/dev/null
selfserv with PID 2057 found at Wed Nov 28 10:59:51 EST 2012
selfserv with PID 2057 started at Wed Nov 28 10:59:51 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1880: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2057 at Wed Nov 28 10:59:51 EST 2012
kill -USR1 2057
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 2057 killed at Wed Nov 28 10:59:51 EST 2012
ssl.sh: TLS Server hello response with SNI ----
selfserv starting at Wed Nov 28 10:59:51 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:51 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 2120 >/dev/null 2>/dev/null
selfserv with PID 2120 found at Wed Nov 28 10:59:51 EST 2012
selfserv with PID 2120 started at Wed Nov 28 10:59:51 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser -a buildnss02-sni.usersys.redhat.com  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02-sni.usersys.redhat.com,E=buildnss02-sni.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1881: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2120 at Wed Nov 28 10:59:51 EST 2012
kill -USR1 2120
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 2120 killed at Wed Nov 28 10:59:51 EST 2012
ssl.sh: TLS Server response with alert ----
selfserv starting at Wed Nov 28 10:59:51 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:51 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 2184 >/dev/null 2>/dev/null
selfserv with PID 2184 found at Wed Nov 28 10:59:51 EST 2012
selfserv with PID 2184 started at Wed Nov 28 10:59:51 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser -a buildnss02-sni1.usersys.redhat.com  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 254
ssl.sh: #1882: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2184 at Wed Nov 28 10:59:51 EST 2012
kill -USR1 2184
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 2184 killed at Wed Nov 28 10:59:51 EST 2012
ssl.sh: SSL3 Server hello response without SNI ----
selfserv starting at Wed Nov 28 10:59:51 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:51 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 2247 >/dev/null 2>/dev/null
selfserv with PID 2247 found at Wed Nov 28 10:59:51 EST 2012
selfserv with PID 2247 started at Wed Nov 28 10:59:51 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:ssl3 -w nss -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1883: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2247 at Wed Nov 28 10:59:51 EST 2012
kill -USR1 2247
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 2247 killed at Wed Nov 28 10:59:51 EST 2012
ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ----
selfserv starting at Wed Nov 28 10:59:51 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:51 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 2311 >/dev/null 2>/dev/null
selfserv with PID 2311 found at Wed Nov 28 10:59:51 EST 2012
selfserv with PID 2311 started at Wed Nov 28 10:59:51 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:ssl3 -w nss -n TestUser -a buildnss02-sni.usersys.redhat.com  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12271:
SSL peer cannot verify your certificate.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: authentication of server cert failed: Unable to communicate securely with peer: requested domain name does not match the server's certificate.
tstclnt: exiting with return code 254
ssl.sh: #1884: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2311 at Wed Nov 28 10:59:52 EST 2012
kill -USR1 2311
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 2311 killed at Wed Nov 28 10:59:52 EST 2012
ssl.sh: TLS Server hello response without SNI ----
selfserv starting at Wed Nov 28 10:59:52 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:52 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 2374 >/dev/null 2>/dev/null
selfserv with PID 2374 found at Wed Nov 28 10:59:52 EST 2012
selfserv with PID 2374 started at Wed Nov 28 10:59:52 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1885: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2374 at Wed Nov 28 10:59:52 EST 2012
kill -USR1 2374
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 2374 killed at Wed Nov 28 10:59:52 EST 2012
ssl.sh: TLS Server hello response with SNI ----
selfserv starting at Wed Nov 28 10:59:52 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:52 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 2437 >/dev/null 2>/dev/null
selfserv with PID 2437 found at Wed Nov 28 10:59:52 EST 2012
selfserv with PID 2437 started at Wed Nov 28 10:59:52 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser -a buildnss02-sni.usersys.redhat.com  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02-sni.usersys.redhat.com,E=buildnss02-sni.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02-sni.usersys.redhat.com,E=buildnss02-sni.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1886: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2437 at Wed Nov 28 10:59:52 EST 2012
kill -USR1 2437
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 2437 killed at Wed Nov 28 10:59:52 EST 2012
ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ----
selfserv starting at Wed Nov 28 10:59:52 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:52 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 2500 >/dev/null 2>/dev/null
selfserv with PID 2500 found at Wed Nov 28 10:59:52 EST 2012
selfserv with PID 2500 started at Wed Nov 28 10:59:52 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser -a buildnss02-sni.usersys.redhat.com -a buildnss02.usersys.redhat.com  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02-sni.usersys.redhat.com,E=buildnss02-sni.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: Cannot communicate securely with peer: no common encryption algorithm(s).
tstclnt: exiting with return code 1
ssl.sh: #1887: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2500 at Wed Nov 28 10:59:52 EST 2012
kill -USR1 2500
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 2500 killed at Wed Nov 28 10:59:52 EST 2012
ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ----
selfserv starting at Wed Nov 28 10:59:52 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:52 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 2563 >/dev/null 2>/dev/null
selfserv with PID 2563 found at Wed Nov 28 10:59:52 EST 2012
selfserv with PID 2563 started at Wed Nov 28 10:59:52 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser -a buildnss02-sni.usersys.redhat.com -a buildnss02-sni1.usersys.redhat.com  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02-sni.usersys.redhat.com,E=buildnss02-sni.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 1
ssl.sh: #1888: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2563 at Wed Nov 28 10:59:52 EST 2012
kill -USR1 2563
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 2563 killed at Wed Nov 28 10:59:52 EST 2012
ssl.sh: TLS Server response with alert ----
selfserv starting at Wed Nov 28 10:59:52 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:52 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 2626 >/dev/null 2>/dev/null
selfserv with PID 2626 found at Wed Nov 28 10:59:52 EST 2012
selfserv with PID 2626 started at Wed Nov 28 10:59:52 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser -a buildnss02-sni1.usersys.redhat.com  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 254
ssl.sh: #1889: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2626 at Wed Nov 28 10:59:52 EST 2012
kill -USR1 2626
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 2626 killed at Wed Nov 28 10:59:52 EST 2012
ssl.sh: SSL Stress Test  - server bypass/client normal  - with ECC ===============================
ssl.sh: Stress SSL2 RC4 128 with MD5 ----
selfserv starting at Wed Nov 28 10:59:53 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:53 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 2758 >/dev/null 2>/dev/null
selfserv with PID 2758 found at Wed Nov 28 10:59:53 EST 2012
selfserv with PID 2758 started at Wed Nov 28 10:59:53 EST 2012
strsclnt -q -p 8546 -d ../client  -w nss -c 1000 -C A \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 10:59:53 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: SSL2 - 1 server certificates tested.
strsclnt completed at Wed Nov 28 10:59:53 EST 2012
ssl.sh: #1890: Stress SSL2 RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 2758 at Wed Nov 28 10:59:53 EST 2012
kill -USR1 2758
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 2758 killed at Wed Nov 28 10:59:53 EST 2012
ssl.sh: Stress SSL3 RC4 128 with MD5 ----
selfserv starting at Wed Nov 28 10:59:53 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:53 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 2834 >/dev/null 2>/dev/null
selfserv with PID 2834 found at Wed Nov 28 10:59:53 EST 2012
selfserv with PID 2834 started at Wed Nov 28 10:59:53 EST 2012
strsclnt -q -p 8546 -d ../client  -w nss -c 1000 -C c -V :ssl3 \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 10:59:53 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 10:59:53 EST 2012
ssl.sh: #1891: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 2834 at Wed Nov 28 10:59:53 EST 2012
kill -USR1 2834
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 2834 killed at Wed Nov 28 10:59:53 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 ----
selfserv starting at Wed Nov 28 10:59:53 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:53 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 2910 >/dev/null 2>/dev/null
selfserv with PID 2910 found at Wed Nov 28 10:59:53 EST 2012
selfserv with PID 2910 started at Wed Nov 28 10:59:53 EST 2012
strsclnt -q -p 8546 -d ../client  -w nss -c 1000 -C c \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 10:59:53 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 10:59:53 EST 2012
ssl.sh: #1892: Stress TLS  RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 2910 at Wed Nov 28 10:59:54 EST 2012
kill -USR1 2910
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 2910 killed at Wed Nov 28 10:59:54 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (false start) ----
selfserv starting at Wed Nov 28 10:59:54 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:54 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 2986 >/dev/null 2>/dev/null
selfserv with PID 2986 found at Wed Nov 28 10:59:54 EST 2012
selfserv with PID 2986 started at Wed Nov 28 10:59:54 EST 2012
strsclnt -q -p 8546 -d ../client  -w nss -c 1000 -C c -g \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 10:59:54 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 10:59:54 EST 2012
ssl.sh: #1893: Stress TLS  RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 2986 at Wed Nov 28 10:59:54 EST 2012
kill -USR1 2986
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 2986 killed at Wed Nov 28 10:59:54 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket) ----
selfserv starting at Wed Nov 28 10:59:54 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:54 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 3064 >/dev/null 2>/dev/null
selfserv with PID 3064 found at Wed Nov 28 10:59:54 EST 2012
selfserv with PID 3064 started at Wed Nov 28 10:59:54 EST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V ssl3: -c 1000 -C c -u \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 10:59:54 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Wed Nov 28 10:59:54 EST 2012
ssl.sh: #1894: Stress TLS  RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 3064 at Wed Nov 28 10:59:54 EST 2012
kill -USR1 3064
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 3064 killed at Wed Nov 28 10:59:54 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (compression) ----
selfserv starting at Wed Nov 28 10:59:54 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:54 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 3140 >/dev/null 2>/dev/null
selfserv with PID 3140 found at Wed Nov 28 10:59:54 EST 2012
selfserv with PID 3140 started at Wed Nov 28 10:59:54 EST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V ssl3: -c 1000 -C c -z \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 10:59:54 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 10:59:55 EST 2012
ssl.sh: #1895: Stress TLS  RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 3140 at Wed Nov 28 10:59:55 EST 2012
kill -USR1 3140
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 3140 killed at Wed Nov 28 10:59:55 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression) ----
selfserv starting at Wed Nov 28 10:59:55 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:55 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 3216 >/dev/null 2>/dev/null
selfserv with PID 3216 found at Wed Nov 28 10:59:55 EST 2012
selfserv with PID 3216 started at Wed Nov 28 10:59:55 EST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V ssl3: -c 1000 -C c -u -z \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 10:59:55 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Wed Nov 28 10:59:55 EST 2012
ssl.sh: #1896: Stress TLS  RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 3216 at Wed Nov 28 10:59:55 EST 2012
kill -USR1 3216
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 3216 killed at Wed Nov 28 10:59:55 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) ----
selfserv starting at Wed Nov 28 10:59:55 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:55 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 3293 >/dev/null 2>/dev/null
selfserv with PID 3293 found at Wed Nov 28 10:59:55 EST 2012
selfserv with PID 3293 started at Wed Nov 28 10:59:55 EST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V ssl3: -c 1000 -C c -u -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 10:59:55 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Wed Nov 28 10:59:55 EST 2012
ssl.sh: #1897: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 3293 at Wed Nov 28 10:59:55 EST 2012
kill -USR1 3293
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 3293 killed at Wed Nov 28 10:59:55 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI) ----
selfserv starting at Wed Nov 28 10:59:55 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:55 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 3375 >/dev/null 2>/dev/null
selfserv with PID 3375 found at Wed Nov 28 10:59:55 EST 2012
selfserv with PID 3375 started at Wed Nov 28 10:59:55 EST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V tls1.0: -c 1000 -C c -u \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 10:59:55 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Wed Nov 28 10:59:56 EST 2012
ssl.sh: #1898: Stress TLS RC4 128 with MD5 (session ticket, SNI) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 3375 at Wed Nov 28 10:59:56 EST 2012
kill -USR1 3375
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 3375 killed at Wed Nov 28 10:59:56 EST 2012
ssl.sh: Stress SSL2 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Wed Nov 28 10:59:56 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:56 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 3472 >/dev/null 2>/dev/null
selfserv with PID 3472 found at Wed Nov 28 10:59:56 EST 2012
selfserv with PID 3472 started at Wed Nov 28 10:59:56 EST 2012
strsclnt -q -p 8546 -d ../client  -w nss -c 100 -C A -N -n TestUser \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 10:59:56 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: SSL2 - 100 server certificates tested.
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed Nov 28 10:59:56 EST 2012
ssl.sh: #1899: Stress SSL2 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 3472 at Wed Nov 28 10:59:56 EST 2012
kill -USR1 3472
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 3472 killed at Wed Nov 28 10:59:56 EST 2012
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Wed Nov 28 10:59:57 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:57 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 3547 >/dev/null 2>/dev/null
selfserv with PID 3547 found at Wed Nov 28 10:59:57 EST 2012
selfserv with PID 3547 started at Wed Nov 28 10:59:57 EST 2012
strsclnt -q -p 8546 -d ../client  -w nss -c 100 -C c -V :ssl3 -N -n TestUser \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 10:59:57 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed Nov 28 10:59:57 EST 2012
ssl.sh: #1900: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 3547 at Wed Nov 28 10:59:57 EST 2012
kill -USR1 3547
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 3547 killed at Wed Nov 28 10:59:57 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Wed Nov 28 10:59:57 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:57 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 3622 >/dev/null 2>/dev/null
selfserv with PID 3622 found at Wed Nov 28 10:59:57 EST 2012
selfserv with PID 3622 started at Wed Nov 28 10:59:57 EST 2012
strsclnt -q -p 8546 -d ../client  -w nss -c 100 -C c -N -n TestUser \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 10:59:57 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed Nov 28 10:59:57 EST 2012
ssl.sh: #1901: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 3622 at Wed Nov 28 10:59:57 EST 2012
kill -USR1 3622
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 3622 killed at Wed Nov 28 10:59:57 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Wed Nov 28 10:59:57 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:57 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 3697 >/dev/null 2>/dev/null
selfserv with PID 3697 found at Wed Nov 28 10:59:57 EST 2012
selfserv with PID 3697 started at Wed Nov 28 10:59:57 EST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V ssl3: -c 100 -C c -n TestUser -u \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 10:59:57 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Wed Nov 28 10:59:58 EST 2012
ssl.sh: #1902: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 3697 at Wed Nov 28 10:59:58 EST 2012
kill -USR1 3697
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 3697 killed at Wed Nov 28 10:59:58 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Wed Nov 28 10:59:58 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:58 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 3773 >/dev/null 2>/dev/null
selfserv with PID 3773 found at Wed Nov 28 10:59:58 EST 2012
selfserv with PID 3773 started at Wed Nov 28 10:59:58 EST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V ssl3: -c 100 -C c -n TestUser -z \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 10:59:58 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 10:59:58 EST 2012
ssl.sh: #1903: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 3773 at Wed Nov 28 10:59:58 EST 2012
kill -USR1 3773
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 3773 killed at Wed Nov 28 10:59:58 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Wed Nov 28 10:59:58 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:58 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 3849 >/dev/null 2>/dev/null
selfserv with PID 3849 found at Wed Nov 28 10:59:58 EST 2012
selfserv with PID 3849 started at Wed Nov 28 10:59:58 EST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V ssl3: -c 100 -C c -n TestUser -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 10:59:58 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 10:59:58 EST 2012
ssl.sh: #1904: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 3849 at Wed Nov 28 10:59:58 EST 2012
kill -USR1 3849
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 3849 killed at Wed Nov 28 10:59:58 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Wed Nov 28 10:59:58 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:58 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 3925 >/dev/null 2>/dev/null
selfserv with PID 3925 found at Wed Nov 28 10:59:58 EST 2012
selfserv with PID 3925 started at Wed Nov 28 10:59:58 EST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V ssl3: -c 100 -C c -n TestUser -u -z \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 10:59:58 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Wed Nov 28 10:59:58 EST 2012
ssl.sh: #1905: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 3925 at Wed Nov 28 10:59:58 EST 2012
kill -USR1 3925
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 3925 killed at Wed Nov 28 10:59:58 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Wed Nov 28 10:59:58 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:58 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 4001 >/dev/null 2>/dev/null
selfserv with PID 4001 found at Wed Nov 28 10:59:58 EST 2012
selfserv with PID 4001 started at Wed Nov 28 10:59:58 EST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V ssl3: -c 100 -C c -n TestUser -u -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 10:59:58 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Wed Nov 28 10:59:59 EST 2012
ssl.sh: #1906: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 4001 at Wed Nov 28 10:59:59 EST 2012
kill -USR1 4001
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 4001 killed at Wed Nov 28 10:59:59 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ----
selfserv starting at Wed Nov 28 10:59:59 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:59 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 4083 >/dev/null 2>/dev/null
selfserv with PID 4083 found at Wed Nov 28 10:59:59 EST 2012
selfserv with PID 4083 started at Wed Nov 28 10:59:59 EST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V tls1.0: -c 1000 -C c -u \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 10:59:59 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Wed Nov 28 10:59:59 EST 2012
ssl.sh: #1907: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 4083 at Wed Nov 28 10:59:59 EST 2012
kill -USR1 4083
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 4083 killed at Wed Nov 28 10:59:59 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ----
selfserv starting at Wed Nov 28 10:59:59 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -a buildnss02-sni.usersys.redhat.com -k buildnss02-sni.usersys.redhat.com -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:59 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 4165 >/dev/null 2>/dev/null
selfserv with PID 4165 found at Wed Nov 28 10:59:59 EST 2012
selfserv with PID 4165 started at Wed Nov 28 10:59:59 EST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V tls1.0: -c 1000 -C c -u -a buildnss02-sni.usersys.redhat.com \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 10:59:59 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Wed Nov 28 10:59:59 EST 2012
ssl.sh: #1908: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 4165 at Wed Nov 28 10:59:59 EST 2012
kill -USR1 4165
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 4165 killed at Wed Nov 28 10:59:59 EST 2012
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Wed Nov 28 10:59:59 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C009 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 10:59:59 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 4262 >/dev/null 2>/dev/null
selfserv with PID 4262 found at Wed Nov 28 10:59:59 EST 2012
selfserv with PID 4262 started at Wed Nov 28 10:59:59 EST 2012
strsclnt -q -p 8546 -d ../client  -w nss -c 100 -C :C009 -N -V :ssl3 \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 10:59:59 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed Nov 28 11:00:00 EST 2012
ssl.sh: #1909: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 4262 at Wed Nov 28 11:00:00 EST 2012
kill -USR1 4262
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 4262 killed at Wed Nov 28 11:00:00 EST 2012
ssl.sh: Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Wed Nov 28 11:00:00 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C013 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:00 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 4337 >/dev/null 2>/dev/null
selfserv with PID 4337 found at Wed Nov 28 11:00:00 EST 2012
selfserv with PID 4337 started at Wed Nov 28 11:00:00 EST 2012
strsclnt -q -p 8546 -d ../client  -w nss -c 1000 -C :C013 -V :ssl3 \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:00:00 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:00:01 EST 2012
ssl.sh: #1910: Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 4337 at Wed Nov 28 11:00:01 EST 2012
kill -USR1 4337
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 4337 killed at Wed Nov 28 11:00:01 EST 2012
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) ----
selfserv starting at Wed Nov 28 11:00:01 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C004 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:01 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 4413 >/dev/null 2>/dev/null
selfserv with PID 4413 found at Wed Nov 28 11:00:01 EST 2012
selfserv with PID 4413 started at Wed Nov 28 11:00:01 EST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V ssl3: -c 100 -C :C004 -N \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:00:01 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed Nov 28 11:00:01 EST 2012
ssl.sh: #1911: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 4413 at Wed Nov 28 11:00:02 EST 2012
kill -USR1 4413
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 4413 killed at Wed Nov 28 11:00:02 EST 2012
ssl.sh: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) ----
selfserv starting at Wed Nov 28 11:00:02 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c :C00E -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:02 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 4496 >/dev/null 2>/dev/null
selfserv with PID 4496 found at Wed Nov 28 11:00:02 EST 2012
selfserv with PID 4496 started at Wed Nov 28 11:00:02 EST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V ssl3: -c 100 -C :C00E -N \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:00:02 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed Nov 28 11:00:02 EST 2012
ssl.sh: #1912: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 4496 at Wed Nov 28 11:00:02 EST 2012
kill -USR1 4496
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 4496 killed at Wed Nov 28 11:00:02 EST 2012
ssl.sh: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Wed Nov 28 11:00:03 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C013 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:03 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 4571 >/dev/null 2>/dev/null
selfserv with PID 4571 found at Wed Nov 28 11:00:03 EST 2012
selfserv with PID 4571 started at Wed Nov 28 11:00:03 EST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V ssl3: -c 1000 -C :C013 \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:00:03 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:00:03 EST 2012
ssl.sh: #1913: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 4571 at Wed Nov 28 11:00:03 EST 2012
kill -USR1 4571
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 4571 killed at Wed Nov 28 11:00:03 EST 2012
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) ----
selfserv starting at Wed Nov 28 11:00:03 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C004 -u -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:03 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 4647 >/dev/null 2>/dev/null
selfserv with PID 4647 found at Wed Nov 28 11:00:03 EST 2012
selfserv with PID 4647 started at Wed Nov 28 11:00:03 EST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V ssl3: -c 1000 -C :C004 -u \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:00:03 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Wed Nov 28 11:00:03 EST 2012
ssl.sh: #1914: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 4647 at Wed Nov 28 11:00:03 EST 2012
kill -USR1 4647
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 4647 killed at Wed Nov 28 11:00:03 EST 2012
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Wed Nov 28 11:00:03 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C009 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:03 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 4744 >/dev/null 2>/dev/null
selfserv with PID 4744 found at Wed Nov 28 11:00:03 EST 2012
selfserv with PID 4744 started at Wed Nov 28 11:00:03 EST 2012
strsclnt -q -p 8546 -d ../client  -w nss -c 10 -C :C009 -N -V :ssl3 -n TestUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:00:03 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Wed Nov 28 11:00:04 EST 2012
ssl.sh: #1915: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 4744 at Wed Nov 28 11:00:04 EST 2012
kill -USR1 4744
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 4744 killed at Wed Nov 28 11:00:04 EST 2012
ssl.sh: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) ----
selfserv starting at Wed Nov 28 11:00:04 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:04 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 4820 >/dev/null 2>/dev/null
selfserv with PID 4820 found at Wed Nov 28 11:00:04 EST 2012
selfserv with PID 4820 started at Wed Nov 28 11:00:04 EST 2012
strsclnt -q -p 8546 -d ../client  -w nss -c 100 -C :C013 -V :ssl3 -n TestUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:00:04 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:00:04 EST 2012
ssl.sh: #1916: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 4820 at Wed Nov 28 11:00:04 EST 2012
kill -USR1 4820
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 4820 killed at Wed Nov 28 11:00:04 EST 2012
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Wed Nov 28 11:00:04 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C004 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:04 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 4896 >/dev/null 2>/dev/null
selfserv with PID 4896 found at Wed Nov 28 11:00:04 EST 2012
selfserv with PID 4896 started at Wed Nov 28 11:00:04 EST 2012
strsclnt -q -p 8546 -d ../client  -w nss -c 10 -C :C004 -N -n TestUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:00:04 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Wed Nov 28 11:00:04 EST 2012
ssl.sh: #1917: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 4896 at Wed Nov 28 11:00:04 EST 2012
kill -USR1 4896
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 4896 killed at Wed Nov 28 11:00:04 EST 2012
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Wed Nov 28 11:00:04 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -r -r -c :C00E -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:04 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 4971 >/dev/null 2>/dev/null
selfserv with PID 4971 found at Wed Nov 28 11:00:04 EST 2012
selfserv with PID 4971 started at Wed Nov 28 11:00:04 EST 2012
strsclnt -q -p 8546 -d ../client  -w nss -c 10 -C :C00E -N -n TestUser-ecmixed \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:00:04 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Wed Nov 28 11:00:05 EST 2012
ssl.sh: #1918: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 4971 at Wed Nov 28 11:00:05 EST 2012
kill -USR1 4971
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 4971 killed at Wed Nov 28 11:00:05 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ----
selfserv starting at Wed Nov 28 11:00:05 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:05 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 5046 >/dev/null 2>/dev/null
selfserv with PID 5046 found at Wed Nov 28 11:00:05 EST 2012
selfserv with PID 5046 started at Wed Nov 28 11:00:05 EST 2012
strsclnt -q -p 8546 -d ../client  -w nss -c 100 -C :C013 -n TestUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:00:05 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:00:05 EST 2012
ssl.sh: #1919: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 5046 at Wed Nov 28 11:00:05 EST 2012
kill -USR1 5046
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 5046 killed at Wed Nov 28 11:00:05 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ----
selfserv starting at Wed Nov 28 11:00:05 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -u -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:05 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 5122 >/dev/null 2>/dev/null
selfserv with PID 5122 found at Wed Nov 28 11:00:05 EST 2012
selfserv with PID 5122 started at Wed Nov 28 11:00:05 EST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec -u \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:00:05 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Wed Nov 28 11:00:05 EST 2012
ssl.sh: #1920: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 5122 at Wed Nov 28 11:00:05 EST 2012
kill -USR1 5122
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 5122 killed at Wed Nov 28 11:00:05 EST 2012
ssl.sh: SSL Cipher Coverage Extended Test - server bypass/client normal  - with ECC ===============================
selfserv starting at Wed Nov 28 11:00:05 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:05 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 5187 >/dev/null 2>/dev/null
selfserv with PID 5187 found at Wed Nov 28 11:00:05 EST 2012
selfserv with PID 5187 started at Wed Nov 28 11:00:05 EST 2012
ssl.sh: skipping  SSL2_RC4_128_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC2_128_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_DES_64_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_DES_192_EDE3_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC2_128_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_DES_64_CBC_WITH_MD5 for Extended Test
ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 5187 >/dev/null 2>/dev/null
selfserv with PID 5187 found at Wed Nov 28 11:00:05 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c c -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1921: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 5187 >/dev/null 2>/dev/null
selfserv with PID 5187 found at Wed Nov 28 11:00:05 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c d -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1922: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 5187 >/dev/null 2>/dev/null
selfserv with PID 5187 found at Wed Nov 28 11:00:05 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c e -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1923: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 5187 >/dev/null 2>/dev/null
selfserv with PID 5187 found at Wed Nov 28 11:00:06 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c f -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1924: SSL3_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 5187 >/dev/null 2>/dev/null
selfserv with PID 5187 found at Wed Nov 28 11:00:06 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c g -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1925: SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ----------------------------
kill -0 5187 >/dev/null 2>/dev/null
selfserv with PID 5187 found at Wed Nov 28 11:00:06 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c i -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1926: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 5187 >/dev/null 2>/dev/null
selfserv with PID 5187 found at Wed Nov 28 11:00:06 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c j -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1927: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 5187 >/dev/null 2>/dev/null
selfserv with PID 5187 found at Wed Nov 28 11:00:06 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c k -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1928: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 5187 >/dev/null 2>/dev/null
selfserv with PID 5187 found at Wed Nov 28 11:00:06 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c l -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1929: SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 5187 >/dev/null 2>/dev/null
selfserv with PID 5187 found at Wed Nov 28 11:00:06 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c m -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1930: SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 5187 >/dev/null 2>/dev/null
selfserv with PID 5187 found at Wed Nov 28 11:00:06 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c n -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1931: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 5187 >/dev/null 2>/dev/null
selfserv with PID 5187 found at Wed Nov 28 11:00:06 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c v -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1932: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 5187 >/dev/null 2>/dev/null
selfserv with PID 5187 found at Wed Nov 28 11:00:06 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c y -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1933: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_SHA ----------------------------
kill -0 5187 >/dev/null 2>/dev/null
selfserv with PID 5187 found at Wed Nov 28 11:00:06 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c z -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1934: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 5187 >/dev/null 2>/dev/null
selfserv with PID 5187 found at Wed Nov 28 11:00:06 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c c -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1935: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 5187 >/dev/null 2>/dev/null
selfserv with PID 5187 found at Wed Nov 28 11:00:06 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c d -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1936: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 5187 >/dev/null 2>/dev/null
selfserv with PID 5187 found at Wed Nov 28 11:00:06 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c e -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1937: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 5187 >/dev/null 2>/dev/null
selfserv with PID 5187 found at Wed Nov 28 11:00:06 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c f -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1938: TLS_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 5187 >/dev/null 2>/dev/null
selfserv with PID 5187 found at Wed Nov 28 11:00:07 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c g -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1939: TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_MD5 ----------------------------
kill -0 5187 >/dev/null 2>/dev/null
selfserv with PID 5187 found at Wed Nov 28 11:00:07 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c i -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1940: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 5187 >/dev/null 2>/dev/null
selfserv with PID 5187 found at Wed Nov 28 11:00:07 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c j -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1941: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 5187 >/dev/null 2>/dev/null
selfserv with PID 5187 found at Wed Nov 28 11:00:07 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c k -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1942: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 5187 >/dev/null 2>/dev/null
selfserv with PID 5187 found at Wed Nov 28 11:00:07 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c l -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1943: TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 5187 >/dev/null 2>/dev/null
selfserv with PID 5187 found at Wed Nov 28 11:00:07 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c m -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1944: TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 5187 >/dev/null 2>/dev/null
selfserv with PID 5187 found at Wed Nov 28 11:00:07 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c n -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1945: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 5187 >/dev/null 2>/dev/null
selfserv with PID 5187 found at Wed Nov 28 11:00:07 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c v -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1946: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 5187 >/dev/null 2>/dev/null
selfserv with PID 5187 found at Wed Nov 28 11:00:07 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c y -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1947: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_SHA ----------------------------
kill -0 5187 >/dev/null 2>/dev/null
selfserv with PID 5187 found at Wed Nov 28 11:00:07 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c z -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1948: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 5187 >/dev/null 2>/dev/null
selfserv with PID 5187 found at Wed Nov 28 11:00:07 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c c -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1949: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 5187 >/dev/null 2>/dev/null
selfserv with PID 5187 found at Wed Nov 28 11:00:07 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c d -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1950: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 5187 >/dev/null 2>/dev/null
selfserv with PID 5187 found at Wed Nov 28 11:00:07 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c e -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1951: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ----------------------------
kill -0 5187 >/dev/null 2>/dev/null
selfserv with PID 5187 found at Wed Nov 28 11:00:07 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c i -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1952: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 5187 >/dev/null 2>/dev/null
selfserv with PID 5187 found at Wed Nov 28 11:00:07 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c j -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1953: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 5187 >/dev/null 2>/dev/null
selfserv with PID 5187 found at Wed Nov 28 11:00:07 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c k -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1954: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 5187 >/dev/null 2>/dev/null
selfserv with PID 5187 found at Wed Nov 28 11:00:07 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c l -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1955: TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 5187 >/dev/null 2>/dev/null
selfserv with PID 5187 found at Wed Nov 28 11:00:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c m -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1956: TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 5187 >/dev/null 2>/dev/null
selfserv with PID 5187 found at Wed Nov 28 11:00:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c n -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1957: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 5187 >/dev/null 2>/dev/null
selfserv with PID 5187 found at Wed Nov 28 11:00:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c v -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1958: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 5187 >/dev/null 2>/dev/null
selfserv with PID 5187 found at Wed Nov 28 11:00:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c y -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1959: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_SHA ----------------------------
kill -0 5187 >/dev/null 2>/dev/null
selfserv with PID 5187 found at Wed Nov 28 11:00:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c z -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1960: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 5187 >/dev/null 2>/dev/null
selfserv with PID 5187 found at Wed Nov 28 11:00:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1961: SSL3_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 5187 >/dev/null 2>/dev/null
selfserv with PID 5187 found at Wed Nov 28 11:00:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1962: SSL3_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 5187 >/dev/null 2>/dev/null
selfserv with PID 5187 found at Wed Nov 28 11:00:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1963: SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 5187 >/dev/null 2>/dev/null
selfserv with PID 5187 found at Wed Nov 28 11:00:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1964: SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 5187 >/dev/null 2>/dev/null
selfserv with PID 5187 found at Wed Nov 28 11:00:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1965: SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 5187 >/dev/null 2>/dev/null
selfserv with PID 5187 found at Wed Nov 28 11:00:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1966: SSL3_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 5187 >/dev/null 2>/dev/null
selfserv with PID 5187 found at Wed Nov 28 11:00:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1967: SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 5187 >/dev/null 2>/dev/null
selfserv with PID 5187 found at Wed Nov 28 11:00:09 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1968: SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 5187 >/dev/null 2>/dev/null
selfserv with PID 5187 found at Wed Nov 28 11:00:09 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1969: SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 5187 >/dev/null 2>/dev/null
selfserv with PID 5187 found at Wed Nov 28 11:00:09 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1970: SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 5187 at Wed Nov 28 11:00:09 EST 2012
kill -USR1 5187
selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 5187 killed at Wed Nov 28 11:00:09 EST 2012
ssl.sh: SSL3_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Wed Nov 28 11:00:09 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:09 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 6607 >/dev/null 2>/dev/null
selfserv with PID 6607 found at Wed Nov 28 11:00:09 EST 2012
selfserv with PID 6607 started at Wed Nov 28 11:00:09 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1971: SSL3_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 6607 >/dev/null 2>/dev/null
selfserv with PID 6607 found at Wed Nov 28 11:00:09 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1972: SSL3_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 6607 >/dev/null 2>/dev/null
selfserv with PID 6607 found at Wed Nov 28 11:00:09 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1973: SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 6607 >/dev/null 2>/dev/null
selfserv with PID 6607 found at Wed Nov 28 11:00:09 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1974: SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 6607 >/dev/null 2>/dev/null
selfserv with PID 6607 found at Wed Nov 28 11:00:09 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1975: SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 6607 at Wed Nov 28 11:00:09 EST 2012
kill -USR1 6607
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 6607 killed at Wed Nov 28 11:00:09 EST 2012
ssl.sh: SSL3_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Wed Nov 28 11:00:09 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:09 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 6755 >/dev/null 2>/dev/null
selfserv with PID 6755 found at Wed Nov 28 11:00:09 EST 2012
selfserv with PID 6755 started at Wed Nov 28 11:00:09 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1976: SSL3_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 6755 >/dev/null 2>/dev/null
selfserv with PID 6755 found at Wed Nov 28 11:00:09 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1977: SSL3_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 6755 >/dev/null 2>/dev/null
selfserv with PID 6755 found at Wed Nov 28 11:00:09 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1978: SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 6755 >/dev/null 2>/dev/null
selfserv with PID 6755 found at Wed Nov 28 11:00:10 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1979: SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 6755 >/dev/null 2>/dev/null
selfserv with PID 6755 found at Wed Nov 28 11:00:10 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1980: SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 6755 >/dev/null 2>/dev/null
selfserv with PID 6755 found at Wed Nov 28 11:00:10 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1981: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 6755 >/dev/null 2>/dev/null
selfserv with PID 6755 found at Wed Nov 28 11:00:10 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1982: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 6755 >/dev/null 2>/dev/null
selfserv with PID 6755 found at Wed Nov 28 11:00:10 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1983: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 6755 >/dev/null 2>/dev/null
selfserv with PID 6755 found at Wed Nov 28 11:00:10 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1984: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 6755 >/dev/null 2>/dev/null
selfserv with PID 6755 found at Wed Nov 28 11:00:10 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1985: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 6755 >/dev/null 2>/dev/null
selfserv with PID 6755 found at Wed Nov 28 11:00:10 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1986: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 6755 >/dev/null 2>/dev/null
selfserv with PID 6755 found at Wed Nov 28 11:00:10 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1987: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 6755 >/dev/null 2>/dev/null
selfserv with PID 6755 found at Wed Nov 28 11:00:10 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1988: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 6755 >/dev/null 2>/dev/null
selfserv with PID 6755 found at Wed Nov 28 11:00:10 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1989: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 6755 >/dev/null 2>/dev/null
selfserv with PID 6755 found at Wed Nov 28 11:00:11 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1990: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 6755 at Wed Nov 28 11:00:11 EST 2012
kill -USR1 6755
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 6755 killed at Wed Nov 28 11:00:11 EST 2012
ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Wed Nov 28 11:00:11 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:11 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 7154 >/dev/null 2>/dev/null
selfserv with PID 7154 found at Wed Nov 28 11:00:11 EST 2012
selfserv with PID 7154 started at Wed Nov 28 11:00:11 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1991: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 7154 >/dev/null 2>/dev/null
selfserv with PID 7154 found at Wed Nov 28 11:00:11 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1992: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 7154 >/dev/null 2>/dev/null
selfserv with PID 7154 found at Wed Nov 28 11:00:11 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1993: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 7154 >/dev/null 2>/dev/null
selfserv with PID 7154 found at Wed Nov 28 11:00:11 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1994: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 7154 >/dev/null 2>/dev/null
selfserv with PID 7154 found at Wed Nov 28 11:00:11 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1995: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 7154 at Wed Nov 28 11:00:11 EST 2012
kill -USR1 7154
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 7154 killed at Wed Nov 28 11:00:11 EST 2012
ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Wed Nov 28 11:00:11 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:11 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 7302 >/dev/null 2>/dev/null
selfserv with PID 7302 found at Wed Nov 28 11:00:11 EST 2012
selfserv with PID 7302 started at Wed Nov 28 11:00:11 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1996: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 7302 >/dev/null 2>/dev/null
selfserv with PID 7302 found at Wed Nov 28 11:00:11 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1997: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 7302 >/dev/null 2>/dev/null
selfserv with PID 7302 found at Wed Nov 28 11:00:11 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1998: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 7302 >/dev/null 2>/dev/null
selfserv with PID 7302 found at Wed Nov 28 11:00:11 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1999: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 7302 >/dev/null 2>/dev/null
selfserv with PID 7302 found at Wed Nov 28 11:00:12 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2000: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 7302 >/dev/null 2>/dev/null
selfserv with PID 7302 found at Wed Nov 28 11:00:12 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2001: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 7302 >/dev/null 2>/dev/null
selfserv with PID 7302 found at Wed Nov 28 11:00:12 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2002: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 7302 >/dev/null 2>/dev/null
selfserv with PID 7302 found at Wed Nov 28 11:00:12 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2003: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 7302 >/dev/null 2>/dev/null
selfserv with PID 7302 found at Wed Nov 28 11:00:12 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2004: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 7302 >/dev/null 2>/dev/null
selfserv with PID 7302 found at Wed Nov 28 11:00:12 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2005: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 7302 >/dev/null 2>/dev/null
selfserv with PID 7302 found at Wed Nov 28 11:00:12 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2006: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 7302 >/dev/null 2>/dev/null
selfserv with PID 7302 found at Wed Nov 28 11:00:12 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2007: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 7302 >/dev/null 2>/dev/null
selfserv with PID 7302 found at Wed Nov 28 11:00:12 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2008: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 7302 >/dev/null 2>/dev/null
selfserv with PID 7302 found at Wed Nov 28 11:00:12 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2009: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 7302 >/dev/null 2>/dev/null
selfserv with PID 7302 found at Wed Nov 28 11:00:13 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2010: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 7302 at Wed Nov 28 11:00:13 EST 2012
kill -USR1 7302
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 7302 killed at Wed Nov 28 11:00:13 EST 2012
ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Wed Nov 28 11:00:13 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:13 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 7687 >/dev/null 2>/dev/null
selfserv with PID 7687 found at Wed Nov 28 11:00:13 EST 2012
selfserv with PID 7687 started at Wed Nov 28 11:00:13 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2011: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 7687 >/dev/null 2>/dev/null
selfserv with PID 7687 found at Wed Nov 28 11:00:13 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2012: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 7687 >/dev/null 2>/dev/null
selfserv with PID 7687 found at Wed Nov 28 11:00:13 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2013: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 7687 >/dev/null 2>/dev/null
selfserv with PID 7687 found at Wed Nov 28 11:00:13 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2014: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 7687 >/dev/null 2>/dev/null
selfserv with PID 7687 found at Wed Nov 28 11:00:13 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2015: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 7687 at Wed Nov 28 11:00:13 EST 2012
kill -USR1 7687
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 7687 killed at Wed Nov 28 11:00:13 EST 2012
ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Wed Nov 28 11:00:13 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:13 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 7835 >/dev/null 2>/dev/null
selfserv with PID 7835 found at Wed Nov 28 11:00:13 EST 2012
selfserv with PID 7835 started at Wed Nov 28 11:00:13 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2016: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 7835 >/dev/null 2>/dev/null
selfserv with PID 7835 found at Wed Nov 28 11:00:13 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2017: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 7835 >/dev/null 2>/dev/null
selfserv with PID 7835 found at Wed Nov 28 11:00:13 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2018: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 7835 >/dev/null 2>/dev/null
selfserv with PID 7835 found at Wed Nov 28 11:00:13 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2019: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 7835 >/dev/null 2>/dev/null
selfserv with PID 7835 found at Wed Nov 28 11:00:13 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2020: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 7835 at Wed Nov 28 11:00:14 EST 2012
kill -USR1 7835
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 7835 killed at Wed Nov 28 11:00:14 EST 2012
ssl.sh: SSL Client Authentication Extended Test - server bypass/client normal  - with ECC ===============================
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:00:14 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:14 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 8034 >/dev/null 2>/dev/null
selfserv with PID 8034 found at Wed Nov 28 11:00:14 EST 2012
selfserv with PID 8034 started at Wed Nov 28 11:00:14 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2021: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 8034 at Wed Nov 28 11:00:14 EST 2012
kill -USR1 8034
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 8034 killed at Wed Nov 28 11:00:14 EST 2012
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Wed Nov 28 11:00:14 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:14 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 8091 >/dev/null 2>/dev/null
selfserv with PID 8091 found at Wed Nov 28 11:00:14 EST 2012
selfserv with PID 8091 started at Wed Nov 28 11:00:14 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -w bogus -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2022: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 8091 at Wed Nov 28 11:00:14 EST 2012
kill -USR1 8091
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 8091 killed at Wed Nov 28 11:00:14 EST 2012
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Wed Nov 28 11:00:14 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:14 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 8148 >/dev/null 2>/dev/null
selfserv with PID 8148 found at Wed Nov 28 11:00:14 EST 2012
selfserv with PID 8148 started at Wed Nov 28 11:00:14 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -w nss -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2023: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 8148 at Wed Nov 28 11:00:14 EST 2012
kill -USR1 8148
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 8148 killed at Wed Nov 28 11:00:14 EST 2012
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:00:14 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:14 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 8205 >/dev/null 2>/dev/null
selfserv with PID 8205 found at Wed Nov 28 11:00:14 EST 2012
selfserv with PID 8205 started at Wed Nov 28 11:00:14 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2024: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 8205 at Wed Nov 28 11:00:14 EST 2012
kill -USR1 8205
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 8205 killed at Wed Nov 28 11:00:14 EST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Wed Nov 28 11:00:14 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:14 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 8262 >/dev/null 2>/dev/null
selfserv with PID 8262 found at Wed Nov 28 11:00:14 EST 2012
selfserv with PID 8262 started at Wed Nov 28 11:00:14 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -w bogus -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2025: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 8262 at Wed Nov 28 11:00:15 EST 2012
kill -USR1 8262
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 8262 killed at Wed Nov 28 11:00:15 EST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Wed Nov 28 11:00:15 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:15 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 8319 >/dev/null 2>/dev/null
selfserv with PID 8319 found at Wed Nov 28 11:00:15 EST 2012
selfserv with PID 8319 started at Wed Nov 28 11:00:15 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -w nss -n ExtendedSSLUser   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2026: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 8319 at Wed Nov 28 11:00:15 EST 2012
kill -USR1 8319
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 8319 killed at Wed Nov 28 11:00:15 EST 2012
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:00:15 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:15 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 8376 >/dev/null 2>/dev/null
selfserv with PID 8376 found at Wed Nov 28 11:00:15 EST 2012
selfserv with PID 8376 started at Wed Nov 28 11:00:15 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2027: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 8376 at Wed Nov 28 11:00:15 EST 2012
kill -USR1 8376
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 8376 killed at Wed Nov 28 11:00:15 EST 2012
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Wed Nov 28 11:00:15 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:15 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 8433 >/dev/null 2>/dev/null
selfserv with PID 8433 found at Wed Nov 28 11:00:15 EST 2012
selfserv with PID 8433 started at Wed Nov 28 11:00:15 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V :ssl3 -n ExtendedSSLUser -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2028: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 8433 at Wed Nov 28 11:00:15 EST 2012
kill -USR1 8433
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 8433 killed at Wed Nov 28 11:00:15 EST 2012
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Wed Nov 28 11:00:15 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:15 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 8491 >/dev/null 2>/dev/null
selfserv with PID 8491 found at Wed Nov 28 11:00:15 EST 2012
selfserv with PID 8491 started at Wed Nov 28 11:00:15 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V :ssl3 -n ExtendedSSLUser -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2029: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 8491 at Wed Nov 28 11:00:15 EST 2012
kill -USR1 8491
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 8491 killed at Wed Nov 28 11:00:15 EST 2012
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:00:15 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:15 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 8548 >/dev/null 2>/dev/null
selfserv with PID 8548 found at Wed Nov 28 11:00:15 EST 2012
selfserv with PID 8548 started at Wed Nov 28 11:00:15 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2030: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 8548 at Wed Nov 28 11:00:15 EST 2012
kill -USR1 8548
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 8548 killed at Wed Nov 28 11:00:15 EST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Wed Nov 28 11:00:15 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:15 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 8605 >/dev/null 2>/dev/null
selfserv with PID 8605 found at Wed Nov 28 11:00:15 EST 2012
selfserv with PID 8605 started at Wed Nov 28 11:00:15 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V :ssl3 -n ExtendedSSLUser -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2031: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 8605 at Wed Nov 28 11:00:16 EST 2012
kill -USR1 8605
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 8605 killed at Wed Nov 28 11:00:16 EST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Wed Nov 28 11:00:16 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:16 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 8662 >/dev/null 2>/dev/null
selfserv with PID 8662 found at Wed Nov 28 11:00:16 EST 2012
selfserv with PID 8662 started at Wed Nov 28 11:00:16 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V :ssl3 -n ExtendedSSLUser -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2032: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 8662 at Wed Nov 28 11:00:16 EST 2012
kill -USR1 8662
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 8662 killed at Wed Nov 28 11:00:16 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:00:16 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:16 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 8719 >/dev/null 2>/dev/null
selfserv with PID 8719 found at Wed Nov 28 11:00:16 EST 2012
selfserv with PID 8719 started at Wed Nov 28 11:00:16 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2033: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 8719 at Wed Nov 28 11:00:16 EST 2012
kill -USR1 8719
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 8719 killed at Wed Nov 28 11:00:16 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:00:16 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:16 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 8776 >/dev/null 2>/dev/null
selfserv with PID 8776 found at Wed Nov 28 11:00:16 EST 2012
selfserv with PID 8776 started at Wed Nov 28 11:00:16 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3: -w bogus -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2034: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 8776 at Wed Nov 28 11:00:16 EST 2012
kill -USR1 8776
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 8776 killed at Wed Nov 28 11:00:16 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:00:16 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:16 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 8833 >/dev/null 2>/dev/null
selfserv with PID 8833 found at Wed Nov 28 11:00:16 EST 2012
selfserv with PID 8833 started at Wed Nov 28 11:00:16 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3: -w nss -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2035: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 8833 at Wed Nov 28 11:00:16 EST 2012
kill -USR1 8833
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 8833 killed at Wed Nov 28 11:00:16 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:00:16 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:16 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 8890 >/dev/null 2>/dev/null
selfserv with PID 8890 found at Wed Nov 28 11:00:16 EST 2012
selfserv with PID 8890 started at Wed Nov 28 11:00:16 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2036: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 8890 at Wed Nov 28 11:00:17 EST 2012
kill -USR1 8890
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 8890 killed at Wed Nov 28 11:00:17 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:00:17 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:17 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 8948 >/dev/null 2>/dev/null
selfserv with PID 8948 found at Wed Nov 28 11:00:17 EST 2012
selfserv with PID 8948 started at Wed Nov 28 11:00:17 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3: -w bogus -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2037: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 8948 at Wed Nov 28 11:00:17 EST 2012
kill -USR1 8948
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 8948 killed at Wed Nov 28 11:00:17 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:00:17 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:17 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 9005 >/dev/null 2>/dev/null
selfserv with PID 9005 found at Wed Nov 28 11:00:17 EST 2012
selfserv with PID 9005 started at Wed Nov 28 11:00:17 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3: -w nss -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2038: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9005 at Wed Nov 28 11:00:17 EST 2012
kill -USR1 9005
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 9005 killed at Wed Nov 28 11:00:17 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:00:17 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:17 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 9062 >/dev/null 2>/dev/null
selfserv with PID 9062 found at Wed Nov 28 11:00:17 EST 2012
selfserv with PID 9062 started at Wed Nov 28 11:00:17 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2039: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9062 at Wed Nov 28 11:00:17 EST 2012
kill -USR1 9062
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 9062 killed at Wed Nov 28 11:00:17 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:00:17 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:17 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 9119 >/dev/null 2>/dev/null
selfserv with PID 9119 found at Wed Nov 28 11:00:17 EST 2012
selfserv with PID 9119 started at Wed Nov 28 11:00:17 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2040: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9119 at Wed Nov 28 11:00:17 EST 2012
kill -USR1 9119
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 9119 killed at Wed Nov 28 11:00:17 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:00:17 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:17 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 9176 >/dev/null 2>/dev/null
selfserv with PID 9176 found at Wed Nov 28 11:00:17 EST 2012
selfserv with PID 9176 started at Wed Nov 28 11:00:17 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2041: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9176 at Wed Nov 28 11:00:17 EST 2012
kill -USR1 9176
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 9176 killed at Wed Nov 28 11:00:17 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:00:17 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:17 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 9233 >/dev/null 2>/dev/null
selfserv with PID 9233 found at Wed Nov 28 11:00:17 EST 2012
selfserv with PID 9233 started at Wed Nov 28 11:00:17 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2042: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 9233 at Wed Nov 28 11:00:18 EST 2012
kill -USR1 9233
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 9233 killed at Wed Nov 28 11:00:18 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:00:18 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:18 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 9290 >/dev/null 2>/dev/null
selfserv with PID 9290 found at Wed Nov 28 11:00:18 EST 2012
selfserv with PID 9290 started at Wed Nov 28 11:00:18 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2043: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 9290 at Wed Nov 28 11:00:18 EST 2012
kill -USR1 9290
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 9290 killed at Wed Nov 28 11:00:18 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:00:18 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:18 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 9347 >/dev/null 2>/dev/null
selfserv with PID 9347 found at Wed Nov 28 11:00:18 EST 2012
selfserv with PID 9347 started at Wed Nov 28 11:00:18 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2044: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9347 at Wed Nov 28 11:00:18 EST 2012
kill -USR1 9347
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 9347 killed at Wed Nov 28 11:00:18 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:00:18 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:18 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 9404 >/dev/null 2>/dev/null
selfserv with PID 9404 found at Wed Nov 28 11:00:18 EST 2012
selfserv with PID 9404 started at Wed Nov 28 11:00:18 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2045: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9404 at Wed Nov 28 11:00:18 EST 2012
kill -USR1 9404
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 9404 killed at Wed Nov 28 11:00:18 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:00:18 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:18 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 9461 >/dev/null 2>/dev/null
selfserv with PID 9461 found at Wed Nov 28 11:00:18 EST 2012
selfserv with PID 9461 started at Wed Nov 28 11:00:18 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2046: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9461 at Wed Nov 28 11:00:18 EST 2012
kill -USR1 9461
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 9461 killed at Wed Nov 28 11:00:18 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:00:18 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:18 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 9518 >/dev/null 2>/dev/null
selfserv with PID 9518 found at Wed Nov 28 11:00:18 EST 2012
selfserv with PID 9518 started at Wed Nov 28 11:00:18 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2047: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9518 at Wed Nov 28 11:00:18 EST 2012
kill -USR1 9518
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 9518 killed at Wed Nov 28 11:00:18 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:00:19 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:19 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 9575 >/dev/null 2>/dev/null
selfserv with PID 9575 found at Wed Nov 28 11:00:19 EST 2012
selfserv with PID 9575 started at Wed Nov 28 11:00:19 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2048: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 9575 at Wed Nov 28 11:00:19 EST 2012
kill -USR1 9575
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 9575 killed at Wed Nov 28 11:00:19 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:00:19 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:19 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 9632 >/dev/null 2>/dev/null
selfserv with PID 9632 found at Wed Nov 28 11:00:19 EST 2012
selfserv with PID 9632 started at Wed Nov 28 11:00:19 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2049: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 9632 at Wed Nov 28 11:00:19 EST 2012
kill -USR1 9632
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 9632 killed at Wed Nov 28 11:00:19 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:00:19 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:19 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 9689 >/dev/null 2>/dev/null
selfserv with PID 9689 found at Wed Nov 28 11:00:19 EST 2012
selfserv with PID 9689 started at Wed Nov 28 11:00:19 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2050: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9689 at Wed Nov 28 11:00:19 EST 2012
kill -USR1 9689
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 9689 killed at Wed Nov 28 11:00:19 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:00:19 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:19 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 9761 >/dev/null 2>/dev/null
selfserv with PID 9761 found at Wed Nov 28 11:00:19 EST 2012
selfserv with PID 9761 started at Wed Nov 28 11:00:19 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -w bogus -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2051: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9761 at Wed Nov 28 11:00:19 EST 2012
kill -USR1 9761
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 9761 killed at Wed Nov 28 11:00:19 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:00:19 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:19 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 9818 >/dev/null 2>/dev/null
selfserv with PID 9818 found at Wed Nov 28 11:00:19 EST 2012
selfserv with PID 9818 started at Wed Nov 28 11:00:19 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -w nss -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2052: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9818 at Wed Nov 28 11:00:19 EST 2012
kill -USR1 9818
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 9818 killed at Wed Nov 28 11:00:19 EST 2012
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:00:19 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:19 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 9875 >/dev/null 2>/dev/null
selfserv with PID 9875 found at Wed Nov 28 11:00:20 EST 2012
selfserv with PID 9875 started at Wed Nov 28 11:00:20 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -w bogus -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2053: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 9875 at Wed Nov 28 11:00:20 EST 2012
kill -USR1 9875
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 9875 killed at Wed Nov 28 11:00:20 EST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:00:20 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:20 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 9933 >/dev/null 2>/dev/null
selfserv with PID 9933 found at Wed Nov 28 11:00:20 EST 2012
selfserv with PID 9933 started at Wed Nov 28 11:00:20 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -w nss -n ExtendedSSLUser-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2054: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9933 at Wed Nov 28 11:00:20 EST 2012
kill -USR1 9933
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 9933 killed at Wed Nov 28 11:00:20 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:00:20 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:20 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 9990 >/dev/null 2>/dev/null
selfserv with PID 9990 found at Wed Nov 28 11:00:20 EST 2012
selfserv with PID 9990 started at Wed Nov 28 11:00:20 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V :ssl3 -n ExtendedSSLUser-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2055: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9990 at Wed Nov 28 11:00:20 EST 2012
kill -USR1 9990
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 9990 killed at Wed Nov 28 11:00:20 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:00:20 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:20 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 10047 >/dev/null 2>/dev/null
selfserv with PID 10047 found at Wed Nov 28 11:00:20 EST 2012
selfserv with PID 10047 started at Wed Nov 28 11:00:20 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V :ssl3 -n ExtendedSSLUser-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2056: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10047 at Wed Nov 28 11:00:20 EST 2012
kill -USR1 10047
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 10047 killed at Wed Nov 28 11:00:20 EST 2012
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:00:20 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:20 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 10104 >/dev/null 2>/dev/null
selfserv with PID 10104 found at Wed Nov 28 11:00:20 EST 2012
selfserv with PID 10104 started at Wed Nov 28 11:00:20 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V :ssl3 -n ExtendedSSLUser-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2057: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 10104 at Wed Nov 28 11:00:20 EST 2012
kill -USR1 10104
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 10104 killed at Wed Nov 28 11:00:20 EST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:00:20 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:20 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 10161 >/dev/null 2>/dev/null
selfserv with PID 10161 found at Wed Nov 28 11:00:20 EST 2012
selfserv with PID 10161 started at Wed Nov 28 11:00:20 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V :ssl3 -n ExtendedSSLUser-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2058: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10161 at Wed Nov 28 11:00:21 EST 2012
kill -USR1 10161
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 10161 killed at Wed Nov 28 11:00:21 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:00:21 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:21 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 10218 >/dev/null 2>/dev/null
selfserv with PID 10218 found at Wed Nov 28 11:00:21 EST 2012
selfserv with PID 10218 started at Wed Nov 28 11:00:21 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3: -w bogus -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2059: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10218 at Wed Nov 28 11:00:21 EST 2012
kill -USR1 10218
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 10218 killed at Wed Nov 28 11:00:21 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:00:21 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:21 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 10275 >/dev/null 2>/dev/null
selfserv with PID 10275 found at Wed Nov 28 11:00:21 EST 2012
selfserv with PID 10275 started at Wed Nov 28 11:00:21 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3: -w nss -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2060: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10275 at Wed Nov 28 11:00:21 EST 2012
kill -USR1 10275
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 10275 killed at Wed Nov 28 11:00:21 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:00:21 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:21 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 10332 >/dev/null 2>/dev/null
selfserv with PID 10332 found at Wed Nov 28 11:00:21 EST 2012
selfserv with PID 10332 started at Wed Nov 28 11:00:21 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3: -w bogus -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2061: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 10332 at Wed Nov 28 11:00:21 EST 2012
kill -USR1 10332
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 10332 killed at Wed Nov 28 11:00:21 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:00:21 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:21 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 10389 >/dev/null 2>/dev/null
selfserv with PID 10389 found at Wed Nov 28 11:00:21 EST 2012
selfserv with PID 10389 started at Wed Nov 28 11:00:21 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3: -w nss -n ExtendedSSLUser-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2062: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10389 at Wed Nov 28 11:00:21 EST 2012
kill -USR1 10389
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 10389 killed at Wed Nov 28 11:00:21 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:00:21 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:21 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 10446 >/dev/null 2>/dev/null
selfserv with PID 10446 found at Wed Nov 28 11:00:21 EST 2012
selfserv with PID 10446 started at Wed Nov 28 11:00:21 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2063: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10446 at Wed Nov 28 11:00:22 EST 2012
kill -USR1 10446
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 10446 killed at Wed Nov 28 11:00:22 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:00:22 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:22 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 10503 >/dev/null 2>/dev/null
selfserv with PID 10503 found at Wed Nov 28 11:00:22 EST 2012
selfserv with PID 10503 started at Wed Nov 28 11:00:22 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2064: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10503 at Wed Nov 28 11:00:22 EST 2012
kill -USR1 10503
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 10503 killed at Wed Nov 28 11:00:22 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:00:22 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:22 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 10560 >/dev/null 2>/dev/null
selfserv with PID 10560 found at Wed Nov 28 11:00:22 EST 2012
selfserv with PID 10560 started at Wed Nov 28 11:00:22 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2065: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 10560 at Wed Nov 28 11:00:22 EST 2012
kill -USR1 10560
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 10560 killed at Wed Nov 28 11:00:22 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:00:22 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:22 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 10617 >/dev/null 2>/dev/null
selfserv with PID 10617 found at Wed Nov 28 11:00:22 EST 2012
selfserv with PID 10617 started at Wed Nov 28 11:00:22 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2066: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10617 at Wed Nov 28 11:00:22 EST 2012
kill -USR1 10617
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 10617 killed at Wed Nov 28 11:00:22 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:00:22 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:22 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 10674 >/dev/null 2>/dev/null
selfserv with PID 10674 found at Wed Nov 28 11:00:22 EST 2012
selfserv with PID 10674 started at Wed Nov 28 11:00:22 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2067: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10674 at Wed Nov 28 11:00:22 EST 2012
kill -USR1 10674
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 10674 killed at Wed Nov 28 11:00:22 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:00:22 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:22 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 10731 >/dev/null 2>/dev/null
selfserv with PID 10731 found at Wed Nov 28 11:00:22 EST 2012
selfserv with PID 10731 started at Wed Nov 28 11:00:22 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2068: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10731 at Wed Nov 28 11:00:23 EST 2012
kill -USR1 10731
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 10731 killed at Wed Nov 28 11:00:23 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:00:23 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:23 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 10788 >/dev/null 2>/dev/null
selfserv with PID 10788 found at Wed Nov 28 11:00:23 EST 2012
selfserv with PID 10788 started at Wed Nov 28 11:00:23 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2069: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 10788 at Wed Nov 28 11:00:23 EST 2012
kill -USR1 10788
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 10788 killed at Wed Nov 28 11:00:23 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:00:23 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:23 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 10845 >/dev/null 2>/dev/null
selfserv with PID 10845 found at Wed Nov 28 11:00:23 EST 2012
selfserv with PID 10845 started at Wed Nov 28 11:00:23 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2070: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10845 at Wed Nov 28 11:00:23 EST 2012
kill -USR1 10845
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 10845 killed at Wed Nov 28 11:00:23 EST 2012
ssl.sh: skipping  TLS Server hello response without SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI for Extended Test
ssl.sh: skipping  TLS Server response with alert for Extended Test
ssl.sh: skipping  SSL3 Server hello response without SNI for Extended Test
ssl.sh: skipping  SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test
ssl.sh: skipping  TLS Server hello response without SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI: Change name on 2d HS for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test
ssl.sh: skipping  TLS Server response with alert for Extended Test
ssl.sh: SSL Stress Test Extended Test - server bypass/client normal  - with ECC ===============================
ssl.sh: skipping  Stress SSL2 RC4 128 with MD5 for Extended Test
ssl.sh: Stress SSL3 RC4 128 with MD5 ----
selfserv starting at Wed Nov 28 11:00:23 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:23 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 11019 >/dev/null 2>/dev/null
selfserv with PID 11019 found at Wed Nov 28 11:00:23 EST 2012
selfserv with PID 11019 started at Wed Nov 28 11:00:23 EST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -c 1000 -C c -V :ssl3 \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:00:23 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:00:23 EST 2012
ssl.sh: #2071: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 11019 at Wed Nov 28 11:00:23 EST 2012
kill -USR1 11019
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 11019 killed at Wed Nov 28 11:00:23 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 ----
selfserv starting at Wed Nov 28 11:00:23 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:23 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 11095 >/dev/null 2>/dev/null
selfserv with PID 11095 found at Wed Nov 28 11:00:23 EST 2012
selfserv with PID 11095 started at Wed Nov 28 11:00:23 EST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -c 1000 -C c \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:00:23 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:00:24 EST 2012
ssl.sh: #2072: Stress TLS  RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 11095 at Wed Nov 28 11:00:24 EST 2012
kill -USR1 11095
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 11095 killed at Wed Nov 28 11:00:24 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (false start) ----
selfserv starting at Wed Nov 28 11:00:24 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:24 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 11172 >/dev/null 2>/dev/null
selfserv with PID 11172 found at Wed Nov 28 11:00:24 EST 2012
selfserv with PID 11172 started at Wed Nov 28 11:00:24 EST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -c 1000 -C c -g \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:00:24 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:00:24 EST 2012
ssl.sh: #2073: Stress TLS  RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 11172 at Wed Nov 28 11:00:24 EST 2012
kill -USR1 11172
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 11172 killed at Wed Nov 28 11:00:24 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket) ----
selfserv starting at Wed Nov 28 11:00:24 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:24 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 11248 >/dev/null 2>/dev/null
selfserv with PID 11248 found at Wed Nov 28 11:00:24 EST 2012
selfserv with PID 11248 started at Wed Nov 28 11:00:24 EST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -V ssl3: -c 1000 -C c -u \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:00:24 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Wed Nov 28 11:00:24 EST 2012
ssl.sh: #2074: Stress TLS  RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 11248 at Wed Nov 28 11:00:24 EST 2012
kill -USR1 11248
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 11248 killed at Wed Nov 28 11:00:24 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (compression) ----
selfserv starting at Wed Nov 28 11:00:24 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:24 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 11324 >/dev/null 2>/dev/null
selfserv with PID 11324 found at Wed Nov 28 11:00:24 EST 2012
selfserv with PID 11324 started at Wed Nov 28 11:00:24 EST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -V ssl3: -c 1000 -C c -z \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:00:24 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:00:25 EST 2012
ssl.sh: #2075: Stress TLS  RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 11324 at Wed Nov 28 11:00:25 EST 2012
kill -USR1 11324
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 11324 killed at Wed Nov 28 11:00:25 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression) ----
selfserv starting at Wed Nov 28 11:00:25 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:25 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 11400 >/dev/null 2>/dev/null
selfserv with PID 11400 found at Wed Nov 28 11:00:25 EST 2012
selfserv with PID 11400 started at Wed Nov 28 11:00:25 EST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -V ssl3: -c 1000 -C c -u -z \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:00:25 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Wed Nov 28 11:00:25 EST 2012
ssl.sh: #2076: Stress TLS  RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 11400 at Wed Nov 28 11:00:25 EST 2012
kill -USR1 11400
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 11400 killed at Wed Nov 28 11:00:25 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) ----
selfserv starting at Wed Nov 28 11:00:25 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:25 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 11476 >/dev/null 2>/dev/null
selfserv with PID 11476 found at Wed Nov 28 11:00:25 EST 2012
selfserv with PID 11476 started at Wed Nov 28 11:00:25 EST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -V ssl3: -c 1000 -C c -u -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:00:25 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Wed Nov 28 11:00:26 EST 2012
ssl.sh: #2077: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 11476 at Wed Nov 28 11:00:26 EST 2012
kill -USR1 11476
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 11476 killed at Wed Nov 28 11:00:26 EST 2012
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test
ssl.sh: skipping  Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Wed Nov 28 11:00:26 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:26 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 11581 >/dev/null 2>/dev/null
selfserv with PID 11581 found at Wed Nov 28 11:00:26 EST 2012
selfserv with PID 11581 started at Wed Nov 28 11:00:26 EST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -c 100 -C c -V :ssl3 -N -n ExtendedSSLUser \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:00:26 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed Nov 28 11:00:26 EST 2012
ssl.sh: #2078: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 11581 at Wed Nov 28 11:00:26 EST 2012
kill -USR1 11581
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 11581 killed at Wed Nov 28 11:00:26 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Wed Nov 28 11:00:26 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:26 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 11658 >/dev/null 2>/dev/null
selfserv with PID 11658 found at Wed Nov 28 11:00:26 EST 2012
selfserv with PID 11658 started at Wed Nov 28 11:00:26 EST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -c 100 -C c -N -n ExtendedSSLUser \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:00:26 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed Nov 28 11:00:27 EST 2012
ssl.sh: #2079: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 11658 at Wed Nov 28 11:00:27 EST 2012
kill -USR1 11658
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 11658 killed at Wed Nov 28 11:00:27 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Wed Nov 28 11:00:27 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:27 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 11735 >/dev/null 2>/dev/null
selfserv with PID 11735 found at Wed Nov 28 11:00:27 EST 2012
selfserv with PID 11735 started at Wed Nov 28 11:00:27 EST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:00:27 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Wed Nov 28 11:00:27 EST 2012
ssl.sh: #2080: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 11735 at Wed Nov 28 11:00:27 EST 2012
kill -USR1 11735
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 11735 killed at Wed Nov 28 11:00:27 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Wed Nov 28 11:00:27 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:27 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 11811 >/dev/null 2>/dev/null
selfserv with PID 11811 found at Wed Nov 28 11:00:27 EST 2012
selfserv with PID 11811 started at Wed Nov 28 11:00:27 EST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:00:27 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:00:27 EST 2012
ssl.sh: #2081: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 11811 at Wed Nov 28 11:00:27 EST 2012
kill -USR1 11811
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 11811 killed at Wed Nov 28 11:00:27 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Wed Nov 28 11:00:27 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:27 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 11887 >/dev/null 2>/dev/null
selfserv with PID 11887 found at Wed Nov 28 11:00:27 EST 2012
selfserv with PID 11887 started at Wed Nov 28 11:00:27 EST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:00:27 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:00:27 EST 2012
ssl.sh: #2082: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 11887 at Wed Nov 28 11:00:27 EST 2012
kill -USR1 11887
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 11887 killed at Wed Nov 28 11:00:27 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Wed Nov 28 11:00:27 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:27 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 11963 >/dev/null 2>/dev/null
selfserv with PID 11963 found at Wed Nov 28 11:00:27 EST 2012
selfserv with PID 11963 started at Wed Nov 28 11:00:27 EST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:00:27 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Wed Nov 28 11:00:28 EST 2012
ssl.sh: #2083: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 11963 at Wed Nov 28 11:00:28 EST 2012
kill -USR1 11963
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 11963 killed at Wed Nov 28 11:00:28 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Wed Nov 28 11:00:28 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:28 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 12039 >/dev/null 2>/dev/null
selfserv with PID 12039 found at Wed Nov 28 11:00:28 EST 2012
selfserv with PID 12039 started at Wed Nov 28 11:00:28 EST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:00:28 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Wed Nov 28 11:00:28 EST 2012
ssl.sh: #2084: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 12039 at Wed Nov 28 11:00:28 EST 2012
kill -USR1 12039
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 12039 killed at Wed Nov 28 11:00:28 EST 2012
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Wed Nov 28 11:00:28 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C009 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:28 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 12144 >/dev/null 2>/dev/null
selfserv with PID 12144 found at Wed Nov 28 11:00:28 EST 2012
selfserv with PID 12144 started at Wed Nov 28 11:00:28 EST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -c 100 -C :C009 -N -V :ssl3 \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:00:28 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed Nov 28 11:00:29 EST 2012
ssl.sh: #2085: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 12144 at Wed Nov 28 11:00:29 EST 2012
kill -USR1 12144
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 12144 killed at Wed Nov 28 11:00:29 EST 2012
ssl.sh: Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Wed Nov 28 11:00:29 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C013 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:29 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 12219 >/dev/null 2>/dev/null
selfserv with PID 12219 found at Wed Nov 28 11:00:29 EST 2012
selfserv with PID 12219 started at Wed Nov 28 11:00:29 EST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -c 1000 -C :C013 -V :ssl3 \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:00:29 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:00:29 EST 2012
ssl.sh: #2086: Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 12219 at Wed Nov 28 11:00:29 EST 2012
kill -USR1 12219
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 12219 killed at Wed Nov 28 11:00:29 EST 2012
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) ----
selfserv starting at Wed Nov 28 11:00:29 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C004 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:29 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 12295 >/dev/null 2>/dev/null
selfserv with PID 12295 found at Wed Nov 28 11:00:29 EST 2012
selfserv with PID 12295 started at Wed Nov 28 11:00:29 EST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -V ssl3: -c 100 -C :C004 -N \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:00:29 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed Nov 28 11:00:30 EST 2012
ssl.sh: #2087: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 12295 at Wed Nov 28 11:00:30 EST 2012
kill -USR1 12295
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 12295 killed at Wed Nov 28 11:00:30 EST 2012
ssl.sh: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) ----
selfserv starting at Wed Nov 28 11:00:30 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c :C00E -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:30 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 12370 >/dev/null 2>/dev/null
selfserv with PID 12370 found at Wed Nov 28 11:00:30 EST 2012
selfserv with PID 12370 started at Wed Nov 28 11:00:30 EST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -V ssl3: -c 100 -C :C00E -N \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:00:30 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed Nov 28 11:00:31 EST 2012
ssl.sh: #2088: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 12370 at Wed Nov 28 11:00:31 EST 2012
kill -USR1 12370
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 12370 killed at Wed Nov 28 11:00:31 EST 2012
ssl.sh: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Wed Nov 28 11:00:31 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C013 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:31 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 12445 >/dev/null 2>/dev/null
selfserv with PID 12445 found at Wed Nov 28 11:00:31 EST 2012
selfserv with PID 12445 started at Wed Nov 28 11:00:31 EST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -V ssl3: -c 1000 -C :C013 \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:00:31 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:00:31 EST 2012
ssl.sh: #2089: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 12445 at Wed Nov 28 11:00:31 EST 2012
kill -USR1 12445
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 12445 killed at Wed Nov 28 11:00:31 EST 2012
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) ----
selfserv starting at Wed Nov 28 11:00:31 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C004 -u -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:31 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 12521 >/dev/null 2>/dev/null
selfserv with PID 12521 found at Wed Nov 28 11:00:31 EST 2012
selfserv with PID 12521 started at Wed Nov 28 11:00:31 EST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -V ssl3: -c 1000 -C :C004 -u \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:00:31 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Wed Nov 28 11:00:32 EST 2012
ssl.sh: #2090: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 12521 at Wed Nov 28 11:00:32 EST 2012
kill -USR1 12521
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 12521 killed at Wed Nov 28 11:00:32 EST 2012
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Wed Nov 28 11:00:32 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C009 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:32 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 12618 >/dev/null 2>/dev/null
selfserv with PID 12618 found at Wed Nov 28 11:00:32 EST 2012
selfserv with PID 12618 started at Wed Nov 28 11:00:32 EST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -c 10 -C :C009 -N -V :ssl3 -n ExtendedSSLUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:00:32 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Wed Nov 28 11:00:32 EST 2012
ssl.sh: #2091: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 12618 at Wed Nov 28 11:00:32 EST 2012
kill -USR1 12618
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 12618 killed at Wed Nov 28 11:00:32 EST 2012
ssl.sh: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) ----
selfserv starting at Wed Nov 28 11:00:32 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:32 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 12693 >/dev/null 2>/dev/null
selfserv with PID 12693 found at Wed Nov 28 11:00:32 EST 2012
selfserv with PID 12693 started at Wed Nov 28 11:00:32 EST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -c 100 -C :C013 -V :ssl3 -n ExtendedSSLUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:00:32 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:00:32 EST 2012
ssl.sh: #2092: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 12693 at Wed Nov 28 11:00:32 EST 2012
kill -USR1 12693
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 12693 killed at Wed Nov 28 11:00:32 EST 2012
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Wed Nov 28 11:00:32 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C004 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:32 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 12769 >/dev/null 2>/dev/null
selfserv with PID 12769 found at Wed Nov 28 11:00:32 EST 2012
selfserv with PID 12769 started at Wed Nov 28 11:00:32 EST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -c 10 -C :C004 -N -n ExtendedSSLUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:00:32 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Wed Nov 28 11:00:33 EST 2012
ssl.sh: #2093: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 12769 at Wed Nov 28 11:00:33 EST 2012
kill -USR1 12769
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 12769 killed at Wed Nov 28 11:00:33 EST 2012
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Wed Nov 28 11:00:33 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -r -r -c :C00E -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:33 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 12844 >/dev/null 2>/dev/null
selfserv with PID 12844 found at Wed Nov 28 11:00:33 EST 2012
selfserv with PID 12844 started at Wed Nov 28 11:00:33 EST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -c 10 -C :C00E -N -n ExtendedSSLUser-ecmixed \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:00:33 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Wed Nov 28 11:00:33 EST 2012
ssl.sh: #2094: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 12844 at Wed Nov 28 11:00:33 EST 2012
kill -USR1 12844
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 12844 killed at Wed Nov 28 11:00:33 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ----
selfserv starting at Wed Nov 28 11:00:33 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:33 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 12920 >/dev/null 2>/dev/null
selfserv with PID 12920 found at Wed Nov 28 11:00:33 EST 2012
selfserv with PID 12920 started at Wed Nov 28 11:00:33 EST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -c 100 -C :C013 -n ExtendedSSLUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:00:33 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:00:33 EST 2012
ssl.sh: #2095: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 12920 at Wed Nov 28 11:00:33 EST 2012
kill -USR1 12920
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 12920 killed at Wed Nov 28 11:00:33 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ----
selfserv starting at Wed Nov 28 11:00:33 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -u -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:33 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 12996 >/dev/null 2>/dev/null
selfserv with PID 12996 found at Wed Nov 28 11:00:33 EST 2012
selfserv with PID 12996 started at Wed Nov 28 11:00:33 EST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec -u \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:00:33 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Wed Nov 28 11:00:33 EST 2012
ssl.sh: #2096: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 12996 at Wed Nov 28 11:00:33 EST 2012
kill -USR1 12996
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 12996 killed at Wed Nov 28 11:00:33 EST 2012
ssl.sh: SSL Cipher Coverage  - server normal/client bypass  - with ECC ===============================
selfserv starting at Wed Nov 28 11:00:33 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:33 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 13065 >/dev/null 2>/dev/null
selfserv with PID 13065 found at Wed Nov 28 11:00:33 EST 2012
selfserv with PID 13065 started at Wed Nov 28 11:00:33 EST 2012
ssl.sh: running SSL2_RC4_128_WITH_MD5 ----------------------------
kill -0 13065 >/dev/null 2>/dev/null
selfserv with PID 13065 found at Wed Nov 28 11:00:34 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c A -V ssl2:ssl3 -O -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2097: SSL2_RC4_128_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_RC4_128_EXPORT40_WITH_MD5 ----------------------------
kill -0 13065 >/dev/null 2>/dev/null
selfserv with PID 13065 found at Wed Nov 28 11:00:34 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c B -V ssl2:ssl3 -O -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2098: SSL2_RC4_128_EXPORT40_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_RC2_128_CBC_WITH_MD5 ----------------------------
kill -0 13065 >/dev/null 2>/dev/null
selfserv with PID 13065 found at Wed Nov 28 11:00:34 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c C -V ssl2:ssl3 -O -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 128-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2099: SSL2_RC2_128_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 ----------------------------
kill -0 13065 >/dev/null 2>/dev/null
selfserv with PID 13065 found at Wed Nov 28 11:00:34 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c D -V ssl2:ssl3 -O -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2100: SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_DES_64_CBC_WITH_MD5 ----------------------------
kill -0 13065 >/dev/null 2>/dev/null
selfserv with PID 13065 found at Wed Nov 28 11:00:34 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c E -V ssl2:ssl3 -O -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 56-bit DES with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2101: SSL2_DES_64_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_DES_192_EDE3_CBC_WITH_MD5 ----------------------------
kill -0 13065 >/dev/null 2>/dev/null
selfserv with PID 13065 found at Wed Nov 28 11:00:34 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c F -V ssl2:ssl3 -O -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 112-bit 3DES with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2102: SSL2_DES_192_EDE3_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_RC4_128_EXPORT40_WITH_MD5 ----------------------------
kill -0 13065 >/dev/null 2>/dev/null
selfserv with PID 13065 found at Wed Nov 28 11:00:34 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c B -V ssl2:tls1.1 -O -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2103: SSL2_RC4_128_EXPORT40_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_RC2_128_CBC_WITH_MD5 ----------------------------
kill -0 13065 >/dev/null 2>/dev/null
selfserv with PID 13065 found at Wed Nov 28 11:00:34 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c C -V ssl2:tls1.1 -O -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 128-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2104: SSL2_RC2_128_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_DES_64_CBC_WITH_MD5 ----------------------------
kill -0 13065 >/dev/null 2>/dev/null
selfserv with PID 13065 found at Wed Nov 28 11:00:34 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c E -V ssl2:tls1.1 -O -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 56-bit DES with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2105: SSL2_DES_64_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 13065 >/dev/null 2>/dev/null
selfserv with PID 13065 found at Wed Nov 28 11:00:34 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c c -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2106: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 13065 >/dev/null 2>/dev/null
selfserv with PID 13065 found at Wed Nov 28 11:00:35 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c d -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2107: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 13065 >/dev/null 2>/dev/null
selfserv with PID 13065 found at Wed Nov 28 11:00:35 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c e -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2108: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 13065 >/dev/null 2>/dev/null
selfserv with PID 13065 found at Wed Nov 28 11:00:35 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c f -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2109: SSL3_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 13065 >/dev/null 2>/dev/null
selfserv with PID 13065 found at Wed Nov 28 11:00:35 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c g -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2110: SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ----------------------------
kill -0 13065 >/dev/null 2>/dev/null
selfserv with PID 13065 found at Wed Nov 28 11:00:35 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c i -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2111: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 13065 >/dev/null 2>/dev/null
selfserv with PID 13065 found at Wed Nov 28 11:00:35 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c j -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2112: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 13065 >/dev/null 2>/dev/null
selfserv with PID 13065 found at Wed Nov 28 11:00:35 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c k -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2113: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 13065 >/dev/null 2>/dev/null
selfserv with PID 13065 found at Wed Nov 28 11:00:35 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c l -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2114: SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 13065 >/dev/null 2>/dev/null
selfserv with PID 13065 found at Wed Nov 28 11:00:35 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c m -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2115: SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 13065 >/dev/null 2>/dev/null
selfserv with PID 13065 found at Wed Nov 28 11:00:35 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c n -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2116: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 13065 >/dev/null 2>/dev/null
selfserv with PID 13065 found at Wed Nov 28 11:00:35 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c v -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2117: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 13065 >/dev/null 2>/dev/null
selfserv with PID 13065 found at Wed Nov 28 11:00:35 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c y -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2118: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_SHA ----------------------------
kill -0 13065 >/dev/null 2>/dev/null
selfserv with PID 13065 found at Wed Nov 28 11:00:35 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c z -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2119: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 13065 >/dev/null 2>/dev/null
selfserv with PID 13065 found at Wed Nov 28 11:00:35 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c c -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2120: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 13065 >/dev/null 2>/dev/null
selfserv with PID 13065 found at Wed Nov 28 11:00:35 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c d -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2121: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 13065 >/dev/null 2>/dev/null
selfserv with PID 13065 found at Wed Nov 28 11:00:35 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c e -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2122: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 13065 >/dev/null 2>/dev/null
selfserv with PID 13065 found at Wed Nov 28 11:00:35 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c f -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2123: TLS_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 13065 >/dev/null 2>/dev/null
selfserv with PID 13065 found at Wed Nov 28 11:00:36 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c g -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2124: TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_MD5 ----------------------------
kill -0 13065 >/dev/null 2>/dev/null
selfserv with PID 13065 found at Wed Nov 28 11:00:36 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c i -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2125: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 13065 >/dev/null 2>/dev/null
selfserv with PID 13065 found at Wed Nov 28 11:00:36 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c j -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2126: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 13065 >/dev/null 2>/dev/null
selfserv with PID 13065 found at Wed Nov 28 11:00:36 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c k -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2127: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 13065 >/dev/null 2>/dev/null
selfserv with PID 13065 found at Wed Nov 28 11:00:36 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c l -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2128: TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 13065 >/dev/null 2>/dev/null
selfserv with PID 13065 found at Wed Nov 28 11:00:36 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c m -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2129: TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 13065 >/dev/null 2>/dev/null
selfserv with PID 13065 found at Wed Nov 28 11:00:36 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c n -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2130: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 13065 >/dev/null 2>/dev/null
selfserv with PID 13065 found at Wed Nov 28 11:00:36 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c v -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2131: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 13065 >/dev/null 2>/dev/null
selfserv with PID 13065 found at Wed Nov 28 11:00:36 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c y -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2132: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_SHA ----------------------------
kill -0 13065 >/dev/null 2>/dev/null
selfserv with PID 13065 found at Wed Nov 28 11:00:36 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c z -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2133: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 13065 >/dev/null 2>/dev/null
selfserv with PID 13065 found at Wed Nov 28 11:00:36 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c c -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2134: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 13065 >/dev/null 2>/dev/null
selfserv with PID 13065 found at Wed Nov 28 11:00:36 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c d -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2135: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 13065 >/dev/null 2>/dev/null
selfserv with PID 13065 found at Wed Nov 28 11:00:36 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c e -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2136: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ----------------------------
kill -0 13065 >/dev/null 2>/dev/null
selfserv with PID 13065 found at Wed Nov 28 11:00:36 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c i -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2137: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 13065 >/dev/null 2>/dev/null
selfserv with PID 13065 found at Wed Nov 28 11:00:36 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c j -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2138: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 13065 >/dev/null 2>/dev/null
selfserv with PID 13065 found at Wed Nov 28 11:00:36 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c k -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2139: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 13065 >/dev/null 2>/dev/null
selfserv with PID 13065 found at Wed Nov 28 11:00:36 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c l -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2140: TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 13065 >/dev/null 2>/dev/null
selfserv with PID 13065 found at Wed Nov 28 11:00:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c m -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2141: TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 13065 >/dev/null 2>/dev/null
selfserv with PID 13065 found at Wed Nov 28 11:00:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c n -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2142: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 13065 >/dev/null 2>/dev/null
selfserv with PID 13065 found at Wed Nov 28 11:00:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c v -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2143: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 13065 >/dev/null 2>/dev/null
selfserv with PID 13065 found at Wed Nov 28 11:00:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c y -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2144: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_SHA ----------------------------
kill -0 13065 >/dev/null 2>/dev/null
selfserv with PID 13065 found at Wed Nov 28 11:00:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c z -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2145: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 13065 >/dev/null 2>/dev/null
selfserv with PID 13065 found at Wed Nov 28 11:00:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2146: SSL3_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 13065 >/dev/null 2>/dev/null
selfserv with PID 13065 found at Wed Nov 28 11:00:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2147: SSL3_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 13065 >/dev/null 2>/dev/null
selfserv with PID 13065 found at Wed Nov 28 11:00:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2148: SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 13065 >/dev/null 2>/dev/null
selfserv with PID 13065 found at Wed Nov 28 11:00:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2149: SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 13065 >/dev/null 2>/dev/null
selfserv with PID 13065 found at Wed Nov 28 11:00:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2150: SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 13065 >/dev/null 2>/dev/null
selfserv with PID 13065 found at Wed Nov 28 11:00:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2151: SSL3_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 13065 >/dev/null 2>/dev/null
selfserv with PID 13065 found at Wed Nov 28 11:00:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2152: SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 13065 >/dev/null 2>/dev/null
selfserv with PID 13065 found at Wed Nov 28 11:00:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2153: SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 13065 >/dev/null 2>/dev/null
selfserv with PID 13065 found at Wed Nov 28 11:00:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2154: SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 13065 >/dev/null 2>/dev/null
selfserv with PID 13065 found at Wed Nov 28 11:00:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2155: SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 13065 at Wed Nov 28 11:00:38 EST 2012
kill -USR1 13065
selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 13065 killed at Wed Nov 28 11:00:38 EST 2012
ssl.sh: SSL3_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Wed Nov 28 11:00:38 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 14657 >/dev/null 2>/dev/null
selfserv with PID 14657 found at Wed Nov 28 11:00:38 EST 2012
selfserv with PID 14657 started at Wed Nov 28 11:00:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2156: SSL3_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 14657 >/dev/null 2>/dev/null
selfserv with PID 14657 found at Wed Nov 28 11:00:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2157: SSL3_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 14657 >/dev/null 2>/dev/null
selfserv with PID 14657 found at Wed Nov 28 11:00:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2158: SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 14657 >/dev/null 2>/dev/null
selfserv with PID 14657 found at Wed Nov 28 11:00:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2159: SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 14657 >/dev/null 2>/dev/null
selfserv with PID 14657 found at Wed Nov 28 11:00:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2160: SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 14657 at Wed Nov 28 11:00:38 EST 2012
kill -USR1 14657
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 14657 killed at Wed Nov 28 11:00:38 EST 2012
ssl.sh: SSL3_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Wed Nov 28 11:00:38 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 14805 >/dev/null 2>/dev/null
selfserv with PID 14805 found at Wed Nov 28 11:00:38 EST 2012
selfserv with PID 14805 started at Wed Nov 28 11:00:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2161: SSL3_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 14805 >/dev/null 2>/dev/null
selfserv with PID 14805 found at Wed Nov 28 11:00:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2162: SSL3_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 14805 >/dev/null 2>/dev/null
selfserv with PID 14805 found at Wed Nov 28 11:00:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2163: SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 14805 >/dev/null 2>/dev/null
selfserv with PID 14805 found at Wed Nov 28 11:00:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2164: SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 14805 >/dev/null 2>/dev/null
selfserv with PID 14805 found at Wed Nov 28 11:00:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2165: SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 14805 >/dev/null 2>/dev/null
selfserv with PID 14805 found at Wed Nov 28 11:00:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2166: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 14805 >/dev/null 2>/dev/null
selfserv with PID 14805 found at Wed Nov 28 11:00:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2167: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 14805 >/dev/null 2>/dev/null
selfserv with PID 14805 found at Wed Nov 28 11:00:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2168: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 14805 >/dev/null 2>/dev/null
selfserv with PID 14805 found at Wed Nov 28 11:00:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2169: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 14805 >/dev/null 2>/dev/null
selfserv with PID 14805 found at Wed Nov 28 11:00:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2170: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 14805 >/dev/null 2>/dev/null
selfserv with PID 14805 found at Wed Nov 28 11:00:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2171: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 14805 >/dev/null 2>/dev/null
selfserv with PID 14805 found at Wed Nov 28 11:00:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2172: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 14805 >/dev/null 2>/dev/null
selfserv with PID 14805 found at Wed Nov 28 11:00:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2173: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 14805 >/dev/null 2>/dev/null
selfserv with PID 14805 found at Wed Nov 28 11:00:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2174: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 14805 >/dev/null 2>/dev/null
selfserv with PID 14805 found at Wed Nov 28 11:00:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2175: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 14805 at Wed Nov 28 11:00:39 EST 2012
kill -USR1 14805
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 14805 killed at Wed Nov 28 11:00:40 EST 2012
ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Wed Nov 28 11:00:40 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 15204 >/dev/null 2>/dev/null
selfserv with PID 15204 found at Wed Nov 28 11:00:40 EST 2012
selfserv with PID 15204 started at Wed Nov 28 11:00:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2176: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 15204 >/dev/null 2>/dev/null
selfserv with PID 15204 found at Wed Nov 28 11:00:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2177: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 15204 >/dev/null 2>/dev/null
selfserv with PID 15204 found at Wed Nov 28 11:00:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2178: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 15204 >/dev/null 2>/dev/null
selfserv with PID 15204 found at Wed Nov 28 11:00:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2179: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 15204 >/dev/null 2>/dev/null
selfserv with PID 15204 found at Wed Nov 28 11:00:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2180: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 15204 at Wed Nov 28 11:00:40 EST 2012
kill -USR1 15204
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 15204 killed at Wed Nov 28 11:00:40 EST 2012
ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Wed Nov 28 11:00:40 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 15352 >/dev/null 2>/dev/null
selfserv with PID 15352 found at Wed Nov 28 11:00:40 EST 2012
selfserv with PID 15352 started at Wed Nov 28 11:00:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2181: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 15352 >/dev/null 2>/dev/null
selfserv with PID 15352 found at Wed Nov 28 11:00:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2182: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 15352 >/dev/null 2>/dev/null
selfserv with PID 15352 found at Wed Nov 28 11:00:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2183: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 15352 >/dev/null 2>/dev/null
selfserv with PID 15352 found at Wed Nov 28 11:00:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2184: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 15352 >/dev/null 2>/dev/null
selfserv with PID 15352 found at Wed Nov 28 11:00:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2185: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 15352 >/dev/null 2>/dev/null
selfserv with PID 15352 found at Wed Nov 28 11:00:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2186: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 15352 >/dev/null 2>/dev/null
selfserv with PID 15352 found at Wed Nov 28 11:00:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2187: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 15352 >/dev/null 2>/dev/null
selfserv with PID 15352 found at Wed Nov 28 11:00:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2188: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 15352 >/dev/null 2>/dev/null
selfserv with PID 15352 found at Wed Nov 28 11:00:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2189: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 15352 >/dev/null 2>/dev/null
selfserv with PID 15352 found at Wed Nov 28 11:00:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2190: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 15352 >/dev/null 2>/dev/null
selfserv with PID 15352 found at Wed Nov 28 11:00:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2191: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 15352 >/dev/null 2>/dev/null
selfserv with PID 15352 found at Wed Nov 28 11:00:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2192: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 15352 >/dev/null 2>/dev/null
selfserv with PID 15352 found at Wed Nov 28 11:00:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2193: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 15352 >/dev/null 2>/dev/null
selfserv with PID 15352 found at Wed Nov 28 11:00:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2194: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 15352 >/dev/null 2>/dev/null
selfserv with PID 15352 found at Wed Nov 28 11:00:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2195: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 15352 at Wed Nov 28 11:00:41 EST 2012
kill -USR1 15352
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 15352 killed at Wed Nov 28 11:00:41 EST 2012
ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Wed Nov 28 11:00:41 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 15737 >/dev/null 2>/dev/null
selfserv with PID 15737 found at Wed Nov 28 11:00:41 EST 2012
selfserv with PID 15737 started at Wed Nov 28 11:00:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2196: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 15737 >/dev/null 2>/dev/null
selfserv with PID 15737 found at Wed Nov 28 11:00:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2197: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 15737 >/dev/null 2>/dev/null
selfserv with PID 15737 found at Wed Nov 28 11:00:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2198: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 15737 >/dev/null 2>/dev/null
selfserv with PID 15737 found at Wed Nov 28 11:00:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2199: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 15737 >/dev/null 2>/dev/null
selfserv with PID 15737 found at Wed Nov 28 11:00:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2200: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 15737 at Wed Nov 28 11:00:42 EST 2012
kill -USR1 15737
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 15737 killed at Wed Nov 28 11:00:42 EST 2012
ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Wed Nov 28 11:00:42 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 15885 >/dev/null 2>/dev/null
selfserv with PID 15885 found at Wed Nov 28 11:00:42 EST 2012
selfserv with PID 15885 started at Wed Nov 28 11:00:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2201: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 15885 >/dev/null 2>/dev/null
selfserv with PID 15885 found at Wed Nov 28 11:00:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2202: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 15885 >/dev/null 2>/dev/null
selfserv with PID 15885 found at Wed Nov 28 11:00:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2203: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 15885 >/dev/null 2>/dev/null
selfserv with PID 15885 found at Wed Nov 28 11:00:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2204: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 15885 >/dev/null 2>/dev/null
selfserv with PID 15885 found at Wed Nov 28 11:00:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2205: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 15885 at Wed Nov 28 11:00:42 EST 2012
kill -USR1 15885
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 15885 killed at Wed Nov 28 11:00:42 EST 2012
ssl.sh: SSL Client Authentication  - server normal/client bypass  - with ECC ===============================
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:00:42 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 16084 >/dev/null 2>/dev/null
selfserv with PID 16084 found at Wed Nov 28 11:00:42 EST 2012
selfserv with PID 16084 started at Wed Nov 28 11:00:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2206: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 16084 at Wed Nov 28 11:00:42 EST 2012
kill -USR1 16084
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 16084 killed at Wed Nov 28 11:00:42 EST 2012
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Wed Nov 28 11:00:43 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 16141 >/dev/null 2>/dev/null
selfserv with PID 16141 found at Wed Nov 28 11:00:43 EST 2012
selfserv with PID 16141 started at Wed Nov 28 11:00:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -w bogus -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2207: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 16141 at Wed Nov 28 11:00:43 EST 2012
kill -USR1 16141
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 16141 killed at Wed Nov 28 11:00:43 EST 2012
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Wed Nov 28 11:00:43 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 16198 >/dev/null 2>/dev/null
selfserv with PID 16198 found at Wed Nov 28 11:00:43 EST 2012
selfserv with PID 16198 started at Wed Nov 28 11:00:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -w nss -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2208: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 16198 at Wed Nov 28 11:00:43 EST 2012
kill -USR1 16198
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 16198 killed at Wed Nov 28 11:00:43 EST 2012
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:00:43 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 16255 >/dev/null 2>/dev/null
selfserv with PID 16255 found at Wed Nov 28 11:00:43 EST 2012
selfserv with PID 16255 started at Wed Nov 28 11:00:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2209: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 16255 at Wed Nov 28 11:00:43 EST 2012
kill -USR1 16255
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 16255 killed at Wed Nov 28 11:00:43 EST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Wed Nov 28 11:00:43 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 16312 >/dev/null 2>/dev/null
selfserv with PID 16312 found at Wed Nov 28 11:00:43 EST 2012
selfserv with PID 16312 started at Wed Nov 28 11:00:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -w bogus -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2210: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 16312 at Wed Nov 28 11:00:43 EST 2012
kill -USR1 16312
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 16312 killed at Wed Nov 28 11:00:43 EST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Wed Nov 28 11:00:43 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 16369 >/dev/null 2>/dev/null
selfserv with PID 16369 found at Wed Nov 28 11:00:43 EST 2012
selfserv with PID 16369 started at Wed Nov 28 11:00:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -w nss -n TestUser   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2211: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 16369 at Wed Nov 28 11:00:43 EST 2012
kill -USR1 16369
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 16369 killed at Wed Nov 28 11:00:43 EST 2012
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:00:43 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 16426 >/dev/null 2>/dev/null
selfserv with PID 16426 found at Wed Nov 28 11:00:43 EST 2012
selfserv with PID 16426 started at Wed Nov 28 11:00:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2212: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 16426 at Wed Nov 28 11:00:44 EST 2012
kill -USR1 16426
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 16426 killed at Wed Nov 28 11:00:44 EST 2012
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Wed Nov 28 11:00:44 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 16483 >/dev/null 2>/dev/null
selfserv with PID 16483 found at Wed Nov 28 11:00:44 EST 2012
selfserv with PID 16483 started at Wed Nov 28 11:00:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V :ssl3 -n TestUser -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2213: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 16483 at Wed Nov 28 11:00:44 EST 2012
kill -USR1 16483
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 16483 killed at Wed Nov 28 11:00:44 EST 2012
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Wed Nov 28 11:00:44 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 16540 >/dev/null 2>/dev/null
selfserv with PID 16540 found at Wed Nov 28 11:00:44 EST 2012
selfserv with PID 16540 started at Wed Nov 28 11:00:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V :ssl3 -n TestUser -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2214: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 16540 at Wed Nov 28 11:00:44 EST 2012
kill -USR1 16540
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 16540 killed at Wed Nov 28 11:00:44 EST 2012
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:00:44 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 16597 >/dev/null 2>/dev/null
selfserv with PID 16597 found at Wed Nov 28 11:00:44 EST 2012
selfserv with PID 16597 started at Wed Nov 28 11:00:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2215: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 16597 at Wed Nov 28 11:00:44 EST 2012
kill -USR1 16597
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 16597 killed at Wed Nov 28 11:00:44 EST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Wed Nov 28 11:00:44 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 16654 >/dev/null 2>/dev/null
selfserv with PID 16654 found at Wed Nov 28 11:00:44 EST 2012
selfserv with PID 16654 started at Wed Nov 28 11:00:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V :ssl3 -n TestUser -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2216: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 16654 at Wed Nov 28 11:00:44 EST 2012
kill -USR1 16654
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 16654 killed at Wed Nov 28 11:00:44 EST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Wed Nov 28 11:00:44 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 16711 >/dev/null 2>/dev/null
selfserv with PID 16711 found at Wed Nov 28 11:00:44 EST 2012
selfserv with PID 16711 started at Wed Nov 28 11:00:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V :ssl3 -n TestUser -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2217: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 16711 at Wed Nov 28 11:00:45 EST 2012
kill -USR1 16711
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 16711 killed at Wed Nov 28 11:00:45 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:00:45 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:45 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 16768 >/dev/null 2>/dev/null
selfserv with PID 16768 found at Wed Nov 28 11:00:45 EST 2012
selfserv with PID 16768 started at Wed Nov 28 11:00:45 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2218: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 16768 at Wed Nov 28 11:00:45 EST 2012
kill -USR1 16768
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 16768 killed at Wed Nov 28 11:00:45 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:00:45 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:45 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 16825 >/dev/null 2>/dev/null
selfserv with PID 16825 found at Wed Nov 28 11:00:45 EST 2012
selfserv with PID 16825 started at Wed Nov 28 11:00:45 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3: -w bogus -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2219: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 16825 at Wed Nov 28 11:00:45 EST 2012
kill -USR1 16825
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 16825 killed at Wed Nov 28 11:00:45 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:00:45 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:45 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 16882 >/dev/null 2>/dev/null
selfserv with PID 16882 found at Wed Nov 28 11:00:45 EST 2012
selfserv with PID 16882 started at Wed Nov 28 11:00:45 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2220: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 16882 at Wed Nov 28 11:00:45 EST 2012
kill -USR1 16882
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 16882 killed at Wed Nov 28 11:00:45 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:00:45 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:45 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 16939 >/dev/null 2>/dev/null
selfserv with PID 16939 found at Wed Nov 28 11:00:45 EST 2012
selfserv with PID 16939 started at Wed Nov 28 11:00:45 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2221: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 16939 at Wed Nov 28 11:00:45 EST 2012
kill -USR1 16939
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 16939 killed at Wed Nov 28 11:00:45 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:00:45 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:45 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 16996 >/dev/null 2>/dev/null
selfserv with PID 16996 found at Wed Nov 28 11:00:45 EST 2012
selfserv with PID 16996 started at Wed Nov 28 11:00:45 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3: -w bogus -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2222: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 16996 at Wed Nov 28 11:00:45 EST 2012
kill -USR1 16996
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 16996 killed at Wed Nov 28 11:00:45 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:00:45 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:45 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 17053 >/dev/null 2>/dev/null
selfserv with PID 17053 found at Wed Nov 28 11:00:45 EST 2012
selfserv with PID 17053 started at Wed Nov 28 11:00:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2223: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17053 at Wed Nov 28 11:00:46 EST 2012
kill -USR1 17053
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 17053 killed at Wed Nov 28 11:00:46 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:00:46 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 17110 >/dev/null 2>/dev/null
selfserv with PID 17110 found at Wed Nov 28 11:00:46 EST 2012
selfserv with PID 17110 started at Wed Nov 28 11:00:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2224: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17110 at Wed Nov 28 11:00:46 EST 2012
kill -USR1 17110
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 17110 killed at Wed Nov 28 11:00:46 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:00:46 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 17167 >/dev/null 2>/dev/null
selfserv with PID 17167 found at Wed Nov 28 11:00:46 EST 2012
selfserv with PID 17167 started at Wed Nov 28 11:00:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w bogus -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2225: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17167 at Wed Nov 28 11:00:46 EST 2012
kill -USR1 17167
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 17167 killed at Wed Nov 28 11:00:46 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:00:46 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 17224 >/dev/null 2>/dev/null
selfserv with PID 17224 found at Wed Nov 28 11:00:46 EST 2012
selfserv with PID 17224 started at Wed Nov 28 11:00:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w nss -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2226: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17224 at Wed Nov 28 11:00:46 EST 2012
kill -USR1 17224
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 17224 killed at Wed Nov 28 11:00:46 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:00:46 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 17281 >/dev/null 2>/dev/null
selfserv with PID 17281 found at Wed Nov 28 11:00:46 EST 2012
selfserv with PID 17281 started at Wed Nov 28 11:00:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2227: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 17281 at Wed Nov 28 11:00:46 EST 2012
kill -USR1 17281
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 17281 killed at Wed Nov 28 11:00:46 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:00:46 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 17339 >/dev/null 2>/dev/null
selfserv with PID 17339 found at Wed Nov 28 11:00:46 EST 2012
selfserv with PID 17339 started at Wed Nov 28 11:00:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w bogus -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2228: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 17339 at Wed Nov 28 11:00:47 EST 2012
kill -USR1 17339
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 17339 killed at Wed Nov 28 11:00:47 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:00:47 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 17396 >/dev/null 2>/dev/null
selfserv with PID 17396 found at Wed Nov 28 11:00:47 EST 2012
selfserv with PID 17396 started at Wed Nov 28 11:00:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w nss -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2229: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17396 at Wed Nov 28 11:00:47 EST 2012
kill -USR1 17396
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 17396 killed at Wed Nov 28 11:00:47 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:00:47 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 17453 >/dev/null 2>/dev/null
selfserv with PID 17453 found at Wed Nov 28 11:00:47 EST 2012
selfserv with PID 17453 started at Wed Nov 28 11:00:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2230: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17453 at Wed Nov 28 11:00:47 EST 2012
kill -USR1 17453
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 17453 killed at Wed Nov 28 11:00:47 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:00:47 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 17510 >/dev/null 2>/dev/null
selfserv with PID 17510 found at Wed Nov 28 11:00:47 EST 2012
selfserv with PID 17510 started at Wed Nov 28 11:00:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2231: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17510 at Wed Nov 28 11:00:47 EST 2012
kill -USR1 17510
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 17510 killed at Wed Nov 28 11:00:47 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:00:47 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 17567 >/dev/null 2>/dev/null
selfserv with PID 17567 found at Wed Nov 28 11:00:47 EST 2012
selfserv with PID 17567 started at Wed Nov 28 11:00:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2232: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17567 at Wed Nov 28 11:00:47 EST 2012
kill -USR1 17567
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 17567 killed at Wed Nov 28 11:00:47 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:00:47 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 17624 >/dev/null 2>/dev/null
selfserv with PID 17624 found at Wed Nov 28 11:00:47 EST 2012
selfserv with PID 17624 started at Wed Nov 28 11:00:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2233: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 17624 at Wed Nov 28 11:00:47 EST 2012
kill -USR1 17624
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 17624 killed at Wed Nov 28 11:00:47 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:00:47 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 17681 >/dev/null 2>/dev/null
selfserv with PID 17681 found at Wed Nov 28 11:00:47 EST 2012
selfserv with PID 17681 started at Wed Nov 28 11:00:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2234: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 17681 at Wed Nov 28 11:00:48 EST 2012
kill -USR1 17681
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 17681 killed at Wed Nov 28 11:00:48 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:00:48 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 17738 >/dev/null 2>/dev/null
selfserv with PID 17738 found at Wed Nov 28 11:00:48 EST 2012
selfserv with PID 17738 started at Wed Nov 28 11:00:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2235: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17738 at Wed Nov 28 11:00:48 EST 2012
kill -USR1 17738
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 17738 killed at Wed Nov 28 11:00:48 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:00:48 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 17810 >/dev/null 2>/dev/null
selfserv with PID 17810 found at Wed Nov 28 11:00:48 EST 2012
selfserv with PID 17810 started at Wed Nov 28 11:00:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -w bogus -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2236: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17810 at Wed Nov 28 11:00:48 EST 2012
kill -USR1 17810
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 17810 killed at Wed Nov 28 11:00:48 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:00:48 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 17867 >/dev/null 2>/dev/null
selfserv with PID 17867 found at Wed Nov 28 11:00:48 EST 2012
selfserv with PID 17867 started at Wed Nov 28 11:00:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -w nss -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2237: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17867 at Wed Nov 28 11:00:48 EST 2012
kill -USR1 17867
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 17867 killed at Wed Nov 28 11:00:48 EST 2012
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:00:48 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 17924 >/dev/null 2>/dev/null
selfserv with PID 17924 found at Wed Nov 28 11:00:48 EST 2012
selfserv with PID 17924 started at Wed Nov 28 11:00:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -w bogus -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2238: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 17924 at Wed Nov 28 11:00:48 EST 2012
kill -USR1 17924
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 17924 killed at Wed Nov 28 11:00:48 EST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:00:48 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 17981 >/dev/null 2>/dev/null
selfserv with PID 17981 found at Wed Nov 28 11:00:48 EST 2012
selfserv with PID 17981 started at Wed Nov 28 11:00:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -w nss -n TestUser-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2239: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17981 at Wed Nov 28 11:00:48 EST 2012
kill -USR1 17981
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 17981 killed at Wed Nov 28 11:00:49 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:00:49 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:49 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 18038 >/dev/null 2>/dev/null
selfserv with PID 18038 found at Wed Nov 28 11:00:49 EST 2012
selfserv with PID 18038 started at Wed Nov 28 11:00:49 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V :ssl3 -n TestUser-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2240: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18038 at Wed Nov 28 11:00:49 EST 2012
kill -USR1 18038
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 18038 killed at Wed Nov 28 11:00:49 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:00:49 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:49 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 18095 >/dev/null 2>/dev/null
selfserv with PID 18095 found at Wed Nov 28 11:00:49 EST 2012
selfserv with PID 18095 started at Wed Nov 28 11:00:49 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V :ssl3 -n TestUser-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2241: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18095 at Wed Nov 28 11:00:49 EST 2012
kill -USR1 18095
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 18095 killed at Wed Nov 28 11:00:49 EST 2012
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:00:49 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:49 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 18152 >/dev/null 2>/dev/null
selfserv with PID 18152 found at Wed Nov 28 11:00:49 EST 2012
selfserv with PID 18152 started at Wed Nov 28 11:00:49 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V :ssl3 -n TestUser-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2242: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 18152 at Wed Nov 28 11:00:49 EST 2012
kill -USR1 18152
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 18152 killed at Wed Nov 28 11:00:49 EST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:00:49 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:49 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 18209 >/dev/null 2>/dev/null
selfserv with PID 18209 found at Wed Nov 28 11:00:49 EST 2012
selfserv with PID 18209 started at Wed Nov 28 11:00:49 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V :ssl3 -n TestUser-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2243: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18209 at Wed Nov 28 11:00:49 EST 2012
kill -USR1 18209
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 18209 killed at Wed Nov 28 11:00:49 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:00:49 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:49 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 18266 >/dev/null 2>/dev/null
selfserv with PID 18266 found at Wed Nov 28 11:00:49 EST 2012
selfserv with PID 18266 started at Wed Nov 28 11:00:49 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3: -w bogus -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2244: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18266 at Wed Nov 28 11:00:49 EST 2012
kill -USR1 18266
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 18266 killed at Wed Nov 28 11:00:49 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:00:50 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:50 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 18323 >/dev/null 2>/dev/null
selfserv with PID 18323 found at Wed Nov 28 11:00:50 EST 2012
selfserv with PID 18323 started at Wed Nov 28 11:00:50 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2245: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18323 at Wed Nov 28 11:00:50 EST 2012
kill -USR1 18323
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 18323 killed at Wed Nov 28 11:00:50 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:00:50 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:50 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 18380 >/dev/null 2>/dev/null
selfserv with PID 18380 found at Wed Nov 28 11:00:50 EST 2012
selfserv with PID 18380 started at Wed Nov 28 11:00:50 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3: -w bogus -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2246: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 18380 at Wed Nov 28 11:00:50 EST 2012
kill -USR1 18380
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 18380 killed at Wed Nov 28 11:00:50 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:00:50 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:50 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 18437 >/dev/null 2>/dev/null
selfserv with PID 18437 found at Wed Nov 28 11:00:50 EST 2012
selfserv with PID 18437 started at Wed Nov 28 11:00:50 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2247: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18437 at Wed Nov 28 11:00:50 EST 2012
kill -USR1 18437
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 18437 killed at Wed Nov 28 11:00:50 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:00:50 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:50 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 18494 >/dev/null 2>/dev/null
selfserv with PID 18494 found at Wed Nov 28 11:00:50 EST 2012
selfserv with PID 18494 started at Wed Nov 28 11:00:50 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w bogus -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2248: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18494 at Wed Nov 28 11:00:50 EST 2012
kill -USR1 18494
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 18494 killed at Wed Nov 28 11:00:50 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:00:50 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:50 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 18551 >/dev/null 2>/dev/null
selfserv with PID 18551 found at Wed Nov 28 11:00:50 EST 2012
selfserv with PID 18551 started at Wed Nov 28 11:00:50 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w nss -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2249: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18551 at Wed Nov 28 11:00:51 EST 2012
kill -USR1 18551
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 18551 killed at Wed Nov 28 11:00:51 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:00:51 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:51 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 18608 >/dev/null 2>/dev/null
selfserv with PID 18608 found at Wed Nov 28 11:00:51 EST 2012
selfserv with PID 18608 started at Wed Nov 28 11:00:51 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w bogus -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2250: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 18608 at Wed Nov 28 11:00:51 EST 2012
kill -USR1 18608
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 18608 killed at Wed Nov 28 11:00:51 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:00:51 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:51 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 18665 >/dev/null 2>/dev/null
selfserv with PID 18665 found at Wed Nov 28 11:00:51 EST 2012
selfserv with PID 18665 started at Wed Nov 28 11:00:51 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w nss -n TestUser-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2251: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18665 at Wed Nov 28 11:00:51 EST 2012
kill -USR1 18665
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 18665 killed at Wed Nov 28 11:00:51 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:00:51 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:51 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 18722 >/dev/null 2>/dev/null
selfserv with PID 18722 found at Wed Nov 28 11:00:51 EST 2012
selfserv with PID 18722 started at Wed Nov 28 11:00:51 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2252: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18722 at Wed Nov 28 11:00:51 EST 2012
kill -USR1 18722
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 18722 killed at Wed Nov 28 11:00:51 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:00:51 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:51 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 18779 >/dev/null 2>/dev/null
selfserv with PID 18779 found at Wed Nov 28 11:00:51 EST 2012
selfserv with PID 18779 started at Wed Nov 28 11:00:51 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2253: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18779 at Wed Nov 28 11:00:51 EST 2012
kill -USR1 18779
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 18779 killed at Wed Nov 28 11:00:51 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:00:51 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:51 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 18836 >/dev/null 2>/dev/null
selfserv with PID 18836 found at Wed Nov 28 11:00:51 EST 2012
selfserv with PID 18836 started at Wed Nov 28 11:00:51 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2254: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 18836 at Wed Nov 28 11:00:52 EST 2012
kill -USR1 18836
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 18836 killed at Wed Nov 28 11:00:52 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:00:52 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:52 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 18893 >/dev/null 2>/dev/null
selfserv with PID 18893 found at Wed Nov 28 11:00:52 EST 2012
selfserv with PID 18893 started at Wed Nov 28 11:00:52 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2255: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18893 at Wed Nov 28 11:00:52 EST 2012
kill -USR1 18893
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 18893 killed at Wed Nov 28 11:00:52 EST 2012
ssl.sh: TLS Server hello response without SNI ----
selfserv starting at Wed Nov 28 11:00:52 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:52 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 18971 >/dev/null 2>/dev/null
selfserv with PID 18971 found at Wed Nov 28 11:00:52 EST 2012
selfserv with PID 18971 started at Wed Nov 28 11:00:52 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2256: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18971 at Wed Nov 28 11:00:52 EST 2012
kill -USR1 18971
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 18971 killed at Wed Nov 28 11:00:52 EST 2012
ssl.sh: TLS Server hello response with SNI ----
selfserv starting at Wed Nov 28 11:00:52 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:52 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 19034 >/dev/null 2>/dev/null
selfserv with PID 19034 found at Wed Nov 28 11:00:52 EST 2012
selfserv with PID 19034 started at Wed Nov 28 11:00:52 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser -a buildnss02-sni.usersys.redhat.com  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02-sni.usersys.redhat.com,E=buildnss02-sni.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2257: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19034 at Wed Nov 28 11:00:52 EST 2012
kill -USR1 19034
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 19034 killed at Wed Nov 28 11:00:52 EST 2012
ssl.sh: TLS Server response with alert ----
selfserv starting at Wed Nov 28 11:00:52 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:52 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 19097 >/dev/null 2>/dev/null
selfserv with PID 19097 found at Wed Nov 28 11:00:52 EST 2012
selfserv with PID 19097 started at Wed Nov 28 11:00:52 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser -a buildnss02-sni1.usersys.redhat.com  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 254
ssl.sh: #2258: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 19097 at Wed Nov 28 11:00:52 EST 2012
kill -USR1 19097
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 19097 killed at Wed Nov 28 11:00:52 EST 2012
ssl.sh: SSL3 Server hello response without SNI ----
selfserv starting at Wed Nov 28 11:00:52 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:52 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 19160 >/dev/null 2>/dev/null
selfserv with PID 19160 found at Wed Nov 28 11:00:52 EST 2012
selfserv with PID 19160 started at Wed Nov 28 11:00:52 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:ssl3 -w nss -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2259: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19160 at Wed Nov 28 11:00:52 EST 2012
kill -USR1 19160
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 19160 killed at Wed Nov 28 11:00:52 EST 2012
ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ----
selfserv starting at Wed Nov 28 11:00:53 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:53 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 19223 >/dev/null 2>/dev/null
selfserv with PID 19223 found at Wed Nov 28 11:00:53 EST 2012
selfserv with PID 19223 started at Wed Nov 28 11:00:53 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:ssl3 -w nss -n TestUser -a buildnss02-sni.usersys.redhat.com  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12271:
SSL peer cannot verify your certificate.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: authentication of server cert failed: Unable to communicate securely with peer: requested domain name does not match the server's certificate.
tstclnt: exiting with return code 254
ssl.sh: #2260: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 19223 at Wed Nov 28 11:00:53 EST 2012
kill -USR1 19223
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 19223 killed at Wed Nov 28 11:00:53 EST 2012
ssl.sh: TLS Server hello response without SNI ----
selfserv starting at Wed Nov 28 11:00:53 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:53 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 19286 >/dev/null 2>/dev/null
selfserv with PID 19286 found at Wed Nov 28 11:00:53 EST 2012
selfserv with PID 19286 started at Wed Nov 28 11:00:53 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2261: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19286 at Wed Nov 28 11:00:53 EST 2012
kill -USR1 19286
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 19286 killed at Wed Nov 28 11:00:53 EST 2012
ssl.sh: TLS Server hello response with SNI ----
selfserv starting at Wed Nov 28 11:00:53 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:53 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 19349 >/dev/null 2>/dev/null
selfserv with PID 19349 found at Wed Nov 28 11:00:53 EST 2012
selfserv with PID 19349 started at Wed Nov 28 11:00:53 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser -a buildnss02-sni.usersys.redhat.com  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02-sni.usersys.redhat.com,E=buildnss02-sni.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02-sni.usersys.redhat.com,E=buildnss02-sni.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2262: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19349 at Wed Nov 28 11:00:53 EST 2012
kill -USR1 19349
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 19349 killed at Wed Nov 28 11:00:53 EST 2012
ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ----
selfserv starting at Wed Nov 28 11:00:53 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:53 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 19412 >/dev/null 2>/dev/null
selfserv with PID 19412 found at Wed Nov 28 11:00:53 EST 2012
selfserv with PID 19412 started at Wed Nov 28 11:00:53 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser -a buildnss02-sni.usersys.redhat.com -a buildnss02.usersys.redhat.com  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02-sni.usersys.redhat.com,E=buildnss02-sni.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: Cannot communicate securely with peer: no common encryption algorithm(s).
tstclnt: exiting with return code 1
ssl.sh: #2263: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 19412 at Wed Nov 28 11:00:53 EST 2012
kill -USR1 19412
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 19412 killed at Wed Nov 28 11:00:53 EST 2012
ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ----
selfserv starting at Wed Nov 28 11:00:53 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:53 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 19475 >/dev/null 2>/dev/null
selfserv with PID 19475 found at Wed Nov 28 11:00:53 EST 2012
selfserv with PID 19475 started at Wed Nov 28 11:00:53 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser -a buildnss02-sni.usersys.redhat.com -a buildnss02-sni1.usersys.redhat.com  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02-sni.usersys.redhat.com,E=buildnss02-sni.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 1
ssl.sh: #2264: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 19475 at Wed Nov 28 11:00:53 EST 2012
kill -USR1 19475
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 19475 killed at Wed Nov 28 11:00:53 EST 2012
ssl.sh: TLS Server response with alert ----
selfserv starting at Wed Nov 28 11:00:53 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:53 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 19538 >/dev/null 2>/dev/null
selfserv with PID 19538 found at Wed Nov 28 11:00:54 EST 2012
selfserv with PID 19538 started at Wed Nov 28 11:00:54 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser -a buildnss02-sni1.usersys.redhat.com  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 254
ssl.sh: #2265: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 19538 at Wed Nov 28 11:00:54 EST 2012
kill -USR1 19538
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 19538 killed at Wed Nov 28 11:00:54 EST 2012
ssl.sh: SSL Stress Test  - server normal/client bypass  - with ECC ===============================
ssl.sh: Stress SSL2 RC4 128 with MD5 ----
selfserv starting at Wed Nov 28 11:00:54 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:54 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 19670 >/dev/null 2>/dev/null
selfserv with PID 19670 found at Wed Nov 28 11:00:54 EST 2012
selfserv with PID 19670 started at Wed Nov 28 11:00:54 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 1000 -C A \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:00:54 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: SSL2 - 1 server certificates tested.
strsclnt completed at Wed Nov 28 11:00:54 EST 2012
ssl.sh: #2266: Stress SSL2 RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 19670 at Wed Nov 28 11:00:54 EST 2012
kill -USR1 19670
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 19670 killed at Wed Nov 28 11:00:54 EST 2012
ssl.sh: Stress SSL3 RC4 128 with MD5 ----
selfserv starting at Wed Nov 28 11:00:54 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:54 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 19746 >/dev/null 2>/dev/null
selfserv with PID 19746 found at Wed Nov 28 11:00:54 EST 2012
selfserv with PID 19746 started at Wed Nov 28 11:00:54 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 1000 -C c -V :ssl3 \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:00:54 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:00:54 EST 2012
ssl.sh: #2267: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 19746 at Wed Nov 28 11:00:54 EST 2012
kill -USR1 19746
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 19746 killed at Wed Nov 28 11:00:54 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 ----
selfserv starting at Wed Nov 28 11:00:54 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:54 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 19822 >/dev/null 2>/dev/null
selfserv with PID 19822 found at Wed Nov 28 11:00:54 EST 2012
selfserv with PID 19822 started at Wed Nov 28 11:00:54 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 1000 -C c \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:00:54 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:00:55 EST 2012
ssl.sh: #2268: Stress TLS  RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 19822 at Wed Nov 28 11:00:55 EST 2012
kill -USR1 19822
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 19822 killed at Wed Nov 28 11:00:55 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (false start) ----
selfserv starting at Wed Nov 28 11:00:55 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:55 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 19899 >/dev/null 2>/dev/null
selfserv with PID 19899 found at Wed Nov 28 11:00:55 EST 2012
selfserv with PID 19899 started at Wed Nov 28 11:00:55 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 1000 -C c -g \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:00:55 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:00:55 EST 2012
ssl.sh: #2269: Stress TLS  RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 19899 at Wed Nov 28 11:00:55 EST 2012
kill -USR1 19899
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 19899 killed at Wed Nov 28 11:00:55 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket) ----
selfserv starting at Wed Nov 28 11:00:55 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:55 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 19975 >/dev/null 2>/dev/null
selfserv with PID 19975 found at Wed Nov 28 11:00:55 EST 2012
selfserv with PID 19975 started at Wed Nov 28 11:00:55 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:00:55 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Wed Nov 28 11:00:55 EST 2012
ssl.sh: #2270: Stress TLS  RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 19975 at Wed Nov 28 11:00:55 EST 2012
kill -USR1 19975
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 19975 killed at Wed Nov 28 11:00:55 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (compression) ----
selfserv starting at Wed Nov 28 11:00:55 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:55 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 20051 >/dev/null 2>/dev/null
selfserv with PID 20051 found at Wed Nov 28 11:00:55 EST 2012
selfserv with PID 20051 started at Wed Nov 28 11:00:55 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -z \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:00:55 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:00:56 EST 2012
ssl.sh: #2271: Stress TLS  RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 20051 at Wed Nov 28 11:00:56 EST 2012
kill -USR1 20051
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 20051 killed at Wed Nov 28 11:00:56 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression) ----
selfserv starting at Wed Nov 28 11:00:56 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:56 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 20127 >/dev/null 2>/dev/null
selfserv with PID 20127 found at Wed Nov 28 11:00:56 EST 2012
selfserv with PID 20127 started at Wed Nov 28 11:00:56 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u -z \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:00:56 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Wed Nov 28 11:00:56 EST 2012
ssl.sh: #2272: Stress TLS  RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 20127 at Wed Nov 28 11:00:56 EST 2012
kill -USR1 20127
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 20127 killed at Wed Nov 28 11:00:56 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) ----
selfserv starting at Wed Nov 28 11:00:56 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:56 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 20204 >/dev/null 2>/dev/null
selfserv with PID 20204 found at Wed Nov 28 11:00:56 EST 2012
selfserv with PID 20204 started at Wed Nov 28 11:00:56 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:00:56 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Wed Nov 28 11:00:57 EST 2012
ssl.sh: #2273: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 20204 at Wed Nov 28 11:00:57 EST 2012
kill -USR1 20204
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 20204 killed at Wed Nov 28 11:00:57 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI) ----
selfserv starting at Wed Nov 28 11:00:57 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:57 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 20286 >/dev/null 2>/dev/null
selfserv with PID 20286 found at Wed Nov 28 11:00:57 EST 2012
selfserv with PID 20286 started at Wed Nov 28 11:00:57 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:00:57 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Wed Nov 28 11:00:57 EST 2012
ssl.sh: #2274: Stress TLS RC4 128 with MD5 (session ticket, SNI) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 20286 at Wed Nov 28 11:00:57 EST 2012
kill -USR1 20286
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 20286 killed at Wed Nov 28 11:00:57 EST 2012
ssl.sh: Stress SSL2 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Wed Nov 28 11:00:57 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:57 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 20383 >/dev/null 2>/dev/null
selfserv with PID 20383 found at Wed Nov 28 11:00:57 EST 2012
selfserv with PID 20383 started at Wed Nov 28 11:00:57 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 100 -C A -N -n TestUser \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:00:57 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: SSL2 - 100 server certificates tested.
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed Nov 28 11:00:58 EST 2012
ssl.sh: #2275: Stress SSL2 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 20383 at Wed Nov 28 11:00:58 EST 2012
kill -USR1 20383
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 20383 killed at Wed Nov 28 11:00:58 EST 2012
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Wed Nov 28 11:00:58 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:58 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 20458 >/dev/null 2>/dev/null
selfserv with PID 20458 found at Wed Nov 28 11:00:58 EST 2012
selfserv with PID 20458 started at Wed Nov 28 11:00:58 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 100 -C c -V :ssl3 -N -n TestUser \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:00:58 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed Nov 28 11:00:58 EST 2012
ssl.sh: #2276: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 20458 at Wed Nov 28 11:00:58 EST 2012
kill -USR1 20458
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 20458 killed at Wed Nov 28 11:00:58 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Wed Nov 28 11:00:58 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:58 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 20534 >/dev/null 2>/dev/null
selfserv with PID 20534 found at Wed Nov 28 11:00:58 EST 2012
selfserv with PID 20534 started at Wed Nov 28 11:00:58 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 100 -C c -N -n TestUser \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:00:58 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed Nov 28 11:00:58 EST 2012
ssl.sh: #2277: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 20534 at Wed Nov 28 11:00:58 EST 2012
kill -USR1 20534
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 20534 killed at Wed Nov 28 11:00:58 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Wed Nov 28 11:00:58 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:58 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 20609 >/dev/null 2>/dev/null
selfserv with PID 20609 found at Wed Nov 28 11:00:58 EST 2012
selfserv with PID 20609 started at Wed Nov 28 11:00:58 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:00:58 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Wed Nov 28 11:00:59 EST 2012
ssl.sh: #2278: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 20609 at Wed Nov 28 11:00:59 EST 2012
kill -USR1 20609
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 20609 killed at Wed Nov 28 11:00:59 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Wed Nov 28 11:00:59 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:59 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 20685 >/dev/null 2>/dev/null
selfserv with PID 20685 found at Wed Nov 28 11:00:59 EST 2012
selfserv with PID 20685 started at Wed Nov 28 11:00:59 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -z \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:00:59 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:00:59 EST 2012
ssl.sh: #2279: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 20685 at Wed Nov 28 11:00:59 EST 2012
kill -USR1 20685
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 20685 killed at Wed Nov 28 11:00:59 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Wed Nov 28 11:00:59 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:59 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 20761 >/dev/null 2>/dev/null
selfserv with PID 20761 found at Wed Nov 28 11:00:59 EST 2012
selfserv with PID 20761 started at Wed Nov 28 11:00:59 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:00:59 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:00:59 EST 2012
ssl.sh: #2280: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 20761 at Wed Nov 28 11:00:59 EST 2012
kill -USR1 20761
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 20761 killed at Wed Nov 28 11:00:59 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Wed Nov 28 11:00:59 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:59 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 20837 >/dev/null 2>/dev/null
selfserv with PID 20837 found at Wed Nov 28 11:00:59 EST 2012
selfserv with PID 20837 started at Wed Nov 28 11:00:59 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u -z \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:00:59 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Wed Nov 28 11:00:59 EST 2012
ssl.sh: #2281: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 20837 at Wed Nov 28 11:00:59 EST 2012
kill -USR1 20837
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 20837 killed at Wed Nov 28 11:00:59 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Wed Nov 28 11:00:59 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:00:59 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 20913 >/dev/null 2>/dev/null
selfserv with PID 20913 found at Wed Nov 28 11:00:59 EST 2012
selfserv with PID 20913 started at Wed Nov 28 11:00:59 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:00:59 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Wed Nov 28 11:00:59 EST 2012
ssl.sh: #2282: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 20913 at Wed Nov 28 11:01:00 EST 2012
kill -USR1 20913
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 20913 killed at Wed Nov 28 11:01:00 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ----
selfserv starting at Wed Nov 28 11:01:00 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:00 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 20995 >/dev/null 2>/dev/null
selfserv with PID 20995 found at Wed Nov 28 11:01:00 EST 2012
selfserv with PID 20995 started at Wed Nov 28 11:01:00 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:01:00 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Wed Nov 28 11:01:00 EST 2012
ssl.sh: #2283: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 20995 at Wed Nov 28 11:01:00 EST 2012
kill -USR1 20995
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 20995 killed at Wed Nov 28 11:01:00 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ----
selfserv starting at Wed Nov 28 11:01:00 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -a buildnss02-sni.usersys.redhat.com -k buildnss02-sni.usersys.redhat.com -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:00 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 21077 >/dev/null 2>/dev/null
selfserv with PID 21077 found at Wed Nov 28 11:01:00 EST 2012
selfserv with PID 21077 started at Wed Nov 28 11:01:00 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u -a buildnss02-sni.usersys.redhat.com \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:01:00 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Wed Nov 28 11:01:00 EST 2012
ssl.sh: #2284: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 21077 at Wed Nov 28 11:01:00 EST 2012
kill -USR1 21077
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 21077 killed at Wed Nov 28 11:01:00 EST 2012
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Wed Nov 28 11:01:00 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C009 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:00 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 21174 >/dev/null 2>/dev/null
selfserv with PID 21174 found at Wed Nov 28 11:01:00 EST 2012
selfserv with PID 21174 started at Wed Nov 28 11:01:00 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 100 -C :C009 -N -V :ssl3 \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:01:00 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed Nov 28 11:01:01 EST 2012
ssl.sh: #2285: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 21174 at Wed Nov 28 11:01:01 EST 2012
kill -USR1 21174
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 21174 killed at Wed Nov 28 11:01:01 EST 2012
ssl.sh: Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Wed Nov 28 11:01:01 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C013 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:01 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 21269 >/dev/null 2>/dev/null
selfserv with PID 21269 found at Wed Nov 28 11:01:02 EST 2012
selfserv with PID 21269 started at Wed Nov 28 11:01:02 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 1000 -C :C013 -V :ssl3 \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:01:02 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:01:02 EST 2012
ssl.sh: #2286: Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 21269 at Wed Nov 28 11:01:03 EST 2012
kill -USR1 21269
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 21269 killed at Wed Nov 28 11:01:03 EST 2012
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) ----
selfserv starting at Wed Nov 28 11:01:03 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C004 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:03 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 21345 >/dev/null 2>/dev/null
selfserv with PID 21345 found at Wed Nov 28 11:01:03 EST 2012
selfserv with PID 21345 started at Wed Nov 28 11:01:03 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C004 -N \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:01:03 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed Nov 28 11:01:04 EST 2012
ssl.sh: #2287: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 21345 at Wed Nov 28 11:01:04 EST 2012
kill -USR1 21345
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 21345 killed at Wed Nov 28 11:01:04 EST 2012
ssl.sh: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) ----
selfserv starting at Wed Nov 28 11:01:04 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c :C00E -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:04 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 21420 >/dev/null 2>/dev/null
selfserv with PID 21420 found at Wed Nov 28 11:01:04 EST 2012
selfserv with PID 21420 started at Wed Nov 28 11:01:04 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C00E -N \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:01:04 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed Nov 28 11:01:05 EST 2012
ssl.sh: #2288: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 21420 at Wed Nov 28 11:01:05 EST 2012
kill -USR1 21420
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 21420 killed at Wed Nov 28 11:01:05 EST 2012
ssl.sh: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Wed Nov 28 11:01:05 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C013 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:05 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 21495 >/dev/null 2>/dev/null
selfserv with PID 21495 found at Wed Nov 28 11:01:05 EST 2012
selfserv with PID 21495 started at Wed Nov 28 11:01:05 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :C013 \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:01:05 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:01:05 EST 2012
ssl.sh: #2289: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 21495 at Wed Nov 28 11:01:05 EST 2012
kill -USR1 21495
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 21495 killed at Wed Nov 28 11:01:05 EST 2012
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) ----
selfserv starting at Wed Nov 28 11:01:05 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C004 -u -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:05 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 21571 >/dev/null 2>/dev/null
selfserv with PID 21571 found at Wed Nov 28 11:01:05 EST 2012
selfserv with PID 21571 started at Wed Nov 28 11:01:05 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :C004 -u \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:01:05 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Wed Nov 28 11:01:05 EST 2012
ssl.sh: #2290: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 21571 at Wed Nov 28 11:01:05 EST 2012
kill -USR1 21571
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 21571 killed at Wed Nov 28 11:01:05 EST 2012
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Wed Nov 28 11:01:05 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C009 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:05 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 21668 >/dev/null 2>/dev/null
selfserv with PID 21668 found at Wed Nov 28 11:01:05 EST 2012
selfserv with PID 21668 started at Wed Nov 28 11:01:05 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 10 -C :C009 -N -V :ssl3 -n TestUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:01:05 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Wed Nov 28 11:01:06 EST 2012
ssl.sh: #2291: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 21668 at Wed Nov 28 11:01:06 EST 2012
kill -USR1 21668
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 21668 killed at Wed Nov 28 11:01:06 EST 2012
ssl.sh: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) ----
selfserv starting at Wed Nov 28 11:01:06 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:06 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 21743 >/dev/null 2>/dev/null
selfserv with PID 21743 found at Wed Nov 28 11:01:06 EST 2012
selfserv with PID 21743 started at Wed Nov 28 11:01:06 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 100 -C :C013 -V :ssl3 -n TestUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:01:06 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:01:06 EST 2012
ssl.sh: #2292: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 21743 at Wed Nov 28 11:01:06 EST 2012
kill -USR1 21743
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 21743 killed at Wed Nov 28 11:01:06 EST 2012
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Wed Nov 28 11:01:06 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C004 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:06 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 21819 >/dev/null 2>/dev/null
selfserv with PID 21819 found at Wed Nov 28 11:01:06 EST 2012
selfserv with PID 21819 started at Wed Nov 28 11:01:06 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 10 -C :C004 -N -n TestUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:01:06 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Wed Nov 28 11:01:06 EST 2012
ssl.sh: #2293: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 21819 at Wed Nov 28 11:01:06 EST 2012
kill -USR1 21819
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 21819 killed at Wed Nov 28 11:01:06 EST 2012
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Wed Nov 28 11:01:06 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -r -r -c :C00E -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:06 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 21894 >/dev/null 2>/dev/null
selfserv with PID 21894 found at Wed Nov 28 11:01:06 EST 2012
selfserv with PID 21894 started at Wed Nov 28 11:01:06 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 10 -C :C00E -N -n TestUser-ecmixed \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:01:06 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Wed Nov 28 11:01:07 EST 2012
ssl.sh: #2294: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 21894 at Wed Nov 28 11:01:07 EST 2012
kill -USR1 21894
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 21894 killed at Wed Nov 28 11:01:07 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ----
selfserv starting at Wed Nov 28 11:01:07 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:07 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 21969 >/dev/null 2>/dev/null
selfserv with PID 21969 found at Wed Nov 28 11:01:07 EST 2012
selfserv with PID 21969 started at Wed Nov 28 11:01:07 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 100 -C :C013 -n TestUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:01:07 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:01:07 EST 2012
ssl.sh: #2295: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 21969 at Wed Nov 28 11:01:07 EST 2012
kill -USR1 21969
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 21969 killed at Wed Nov 28 11:01:07 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ----
selfserv starting at Wed Nov 28 11:01:07 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -u -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:07 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 22045 >/dev/null 2>/dev/null
selfserv with PID 22045 found at Wed Nov 28 11:01:07 EST 2012
selfserv with PID 22045 started at Wed Nov 28 11:01:07 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec -u \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:01:07 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Wed Nov 28 11:01:07 EST 2012
ssl.sh: #2296: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 22045 at Wed Nov 28 11:01:07 EST 2012
kill -USR1 22045
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 22045 killed at Wed Nov 28 11:01:07 EST 2012
ssl.sh: SSL Cipher Coverage Extended Test - server normal/client bypass  - with ECC ===============================
selfserv starting at Wed Nov 28 11:01:07 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:07 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 22108 >/dev/null 2>/dev/null
selfserv with PID 22108 found at Wed Nov 28 11:01:07 EST 2012
selfserv with PID 22108 started at Wed Nov 28 11:01:07 EST 2012
ssl.sh: skipping  SSL2_RC4_128_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC2_128_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_DES_64_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_DES_192_EDE3_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC2_128_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_DES_64_CBC_WITH_MD5 for Extended Test
ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 22108 >/dev/null 2>/dev/null
selfserv with PID 22108 found at Wed Nov 28 11:01:07 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c c -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2297: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 22108 >/dev/null 2>/dev/null
selfserv with PID 22108 found at Wed Nov 28 11:01:07 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c d -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2298: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 22108 >/dev/null 2>/dev/null
selfserv with PID 22108 found at Wed Nov 28 11:01:07 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c e -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2299: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 22108 >/dev/null 2>/dev/null
selfserv with PID 22108 found at Wed Nov 28 11:01:07 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c f -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2300: SSL3_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 22108 >/dev/null 2>/dev/null
selfserv with PID 22108 found at Wed Nov 28 11:01:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c g -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2301: SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ----------------------------
kill -0 22108 >/dev/null 2>/dev/null
selfserv with PID 22108 found at Wed Nov 28 11:01:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c i -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2302: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 22108 >/dev/null 2>/dev/null
selfserv with PID 22108 found at Wed Nov 28 11:01:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c j -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2303: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 22108 >/dev/null 2>/dev/null
selfserv with PID 22108 found at Wed Nov 28 11:01:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c k -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2304: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 22108 >/dev/null 2>/dev/null
selfserv with PID 22108 found at Wed Nov 28 11:01:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c l -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2305: SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 22108 >/dev/null 2>/dev/null
selfserv with PID 22108 found at Wed Nov 28 11:01:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c m -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2306: SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 22108 >/dev/null 2>/dev/null
selfserv with PID 22108 found at Wed Nov 28 11:01:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c n -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2307: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 22108 >/dev/null 2>/dev/null
selfserv with PID 22108 found at Wed Nov 28 11:01:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c v -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2308: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 22108 >/dev/null 2>/dev/null
selfserv with PID 22108 found at Wed Nov 28 11:01:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c y -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2309: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_SHA ----------------------------
kill -0 22108 >/dev/null 2>/dev/null
selfserv with PID 22108 found at Wed Nov 28 11:01:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c z -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2310: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 22108 >/dev/null 2>/dev/null
selfserv with PID 22108 found at Wed Nov 28 11:01:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c c -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2311: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 22108 >/dev/null 2>/dev/null
selfserv with PID 22108 found at Wed Nov 28 11:01:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c d -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2312: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 22108 >/dev/null 2>/dev/null
selfserv with PID 22108 found at Wed Nov 28 11:01:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c e -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2313: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 22108 >/dev/null 2>/dev/null
selfserv with PID 22108 found at Wed Nov 28 11:01:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c f -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2314: TLS_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 22108 >/dev/null 2>/dev/null
selfserv with PID 22108 found at Wed Nov 28 11:01:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c g -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2315: TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_MD5 ----------------------------
kill -0 22108 >/dev/null 2>/dev/null
selfserv with PID 22108 found at Wed Nov 28 11:01:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c i -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2316: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 22108 >/dev/null 2>/dev/null
selfserv with PID 22108 found at Wed Nov 28 11:01:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c j -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2317: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 22108 >/dev/null 2>/dev/null
selfserv with PID 22108 found at Wed Nov 28 11:01:09 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c k -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2318: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 22108 >/dev/null 2>/dev/null
selfserv with PID 22108 found at Wed Nov 28 11:01:09 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c l -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2319: TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 22108 >/dev/null 2>/dev/null
selfserv with PID 22108 found at Wed Nov 28 11:01:09 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c m -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2320: TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 22108 >/dev/null 2>/dev/null
selfserv with PID 22108 found at Wed Nov 28 11:01:09 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c n -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2321: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 22108 >/dev/null 2>/dev/null
selfserv with PID 22108 found at Wed Nov 28 11:01:09 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c v -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2322: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 22108 >/dev/null 2>/dev/null
selfserv with PID 22108 found at Wed Nov 28 11:01:09 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c y -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2323: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_SHA ----------------------------
kill -0 22108 >/dev/null 2>/dev/null
selfserv with PID 22108 found at Wed Nov 28 11:01:09 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c z -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2324: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 22108 >/dev/null 2>/dev/null
selfserv with PID 22108 found at Wed Nov 28 11:01:09 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c c -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2325: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 22108 >/dev/null 2>/dev/null
selfserv with PID 22108 found at Wed Nov 28 11:01:09 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c d -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2326: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 22108 >/dev/null 2>/dev/null
selfserv with PID 22108 found at Wed Nov 28 11:01:09 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c e -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2327: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ----------------------------
kill -0 22108 >/dev/null 2>/dev/null
selfserv with PID 22108 found at Wed Nov 28 11:01:09 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c i -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2328: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 22108 >/dev/null 2>/dev/null
selfserv with PID 22108 found at Wed Nov 28 11:01:09 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c j -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2329: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 22108 >/dev/null 2>/dev/null
selfserv with PID 22108 found at Wed Nov 28 11:01:09 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c k -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2330: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 22108 >/dev/null 2>/dev/null
selfserv with PID 22108 found at Wed Nov 28 11:01:09 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c l -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2331: TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 22108 >/dev/null 2>/dev/null
selfserv with PID 22108 found at Wed Nov 28 11:01:09 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c m -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2332: TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 22108 >/dev/null 2>/dev/null
selfserv with PID 22108 found at Wed Nov 28 11:01:09 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c n -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2333: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 22108 >/dev/null 2>/dev/null
selfserv with PID 22108 found at Wed Nov 28 11:01:10 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c v -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2334: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 22108 >/dev/null 2>/dev/null
selfserv with PID 22108 found at Wed Nov 28 11:01:10 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c y -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2335: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_SHA ----------------------------
kill -0 22108 >/dev/null 2>/dev/null
selfserv with PID 22108 found at Wed Nov 28 11:01:10 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c z -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2336: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 22108 >/dev/null 2>/dev/null
selfserv with PID 22108 found at Wed Nov 28 11:01:10 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2337: SSL3_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 22108 >/dev/null 2>/dev/null
selfserv with PID 22108 found at Wed Nov 28 11:01:10 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2338: SSL3_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 22108 >/dev/null 2>/dev/null
selfserv with PID 22108 found at Wed Nov 28 11:01:10 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2339: SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 22108 >/dev/null 2>/dev/null
selfserv with PID 22108 found at Wed Nov 28 11:01:10 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2340: SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 22108 >/dev/null 2>/dev/null
selfserv with PID 22108 found at Wed Nov 28 11:01:10 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2341: SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 22108 >/dev/null 2>/dev/null
selfserv with PID 22108 found at Wed Nov 28 11:01:10 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2342: SSL3_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 22108 >/dev/null 2>/dev/null
selfserv with PID 22108 found at Wed Nov 28 11:01:10 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2343: SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 22108 >/dev/null 2>/dev/null
selfserv with PID 22108 found at Wed Nov 28 11:01:10 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2344: SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 22108 >/dev/null 2>/dev/null
selfserv with PID 22108 found at Wed Nov 28 11:01:11 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2345: SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 22108 >/dev/null 2>/dev/null
selfserv with PID 22108 found at Wed Nov 28 11:01:11 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2346: SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 22108 at Wed Nov 28 11:01:11 EST 2012
kill -USR1 22108
selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 22108 killed at Wed Nov 28 11:01:11 EST 2012
ssl.sh: SSL3_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Wed Nov 28 11:01:11 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:11 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23527 >/dev/null 2>/dev/null
selfserv with PID 23527 found at Wed Nov 28 11:01:11 EST 2012
selfserv with PID 23527 started at Wed Nov 28 11:01:11 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2347: SSL3_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 23527 >/dev/null 2>/dev/null
selfserv with PID 23527 found at Wed Nov 28 11:01:11 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2348: SSL3_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 23527 >/dev/null 2>/dev/null
selfserv with PID 23527 found at Wed Nov 28 11:01:11 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2349: SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 23527 >/dev/null 2>/dev/null
selfserv with PID 23527 found at Wed Nov 28 11:01:11 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2350: SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 23527 >/dev/null 2>/dev/null
selfserv with PID 23527 found at Wed Nov 28 11:01:11 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2351: SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 23527 at Wed Nov 28 11:01:11 EST 2012
kill -USR1 23527
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23527 killed at Wed Nov 28 11:01:11 EST 2012
ssl.sh: SSL3_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Wed Nov 28 11:01:11 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:11 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23675 >/dev/null 2>/dev/null
selfserv with PID 23675 found at Wed Nov 28 11:01:11 EST 2012
selfserv with PID 23675 started at Wed Nov 28 11:01:11 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2352: SSL3_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 23675 >/dev/null 2>/dev/null
selfserv with PID 23675 found at Wed Nov 28 11:01:11 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2353: SSL3_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 23675 >/dev/null 2>/dev/null
selfserv with PID 23675 found at Wed Nov 28 11:01:12 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2354: SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 23675 >/dev/null 2>/dev/null
selfserv with PID 23675 found at Wed Nov 28 11:01:12 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2355: SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 23675 >/dev/null 2>/dev/null
selfserv with PID 23675 found at Wed Nov 28 11:01:12 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2356: SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 23675 >/dev/null 2>/dev/null
selfserv with PID 23675 found at Wed Nov 28 11:01:12 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2357: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 23675 >/dev/null 2>/dev/null
selfserv with PID 23675 found at Wed Nov 28 11:01:12 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2358: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 23675 >/dev/null 2>/dev/null
selfserv with PID 23675 found at Wed Nov 28 11:01:12 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2359: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 23675 >/dev/null 2>/dev/null
selfserv with PID 23675 found at Wed Nov 28 11:01:12 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2360: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 23675 >/dev/null 2>/dev/null
selfserv with PID 23675 found at Wed Nov 28 11:01:12 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2361: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 23675 >/dev/null 2>/dev/null
selfserv with PID 23675 found at Wed Nov 28 11:01:12 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2362: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 23675 >/dev/null 2>/dev/null
selfserv with PID 23675 found at Wed Nov 28 11:01:12 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2363: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 23675 >/dev/null 2>/dev/null
selfserv with PID 23675 found at Wed Nov 28 11:01:12 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2364: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 23675 >/dev/null 2>/dev/null
selfserv with PID 23675 found at Wed Nov 28 11:01:13 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2365: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 23675 >/dev/null 2>/dev/null
selfserv with PID 23675 found at Wed Nov 28 11:01:13 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2366: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 23675 at Wed Nov 28 11:01:13 EST 2012
kill -USR1 23675
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23675 killed at Wed Nov 28 11:01:13 EST 2012
ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Wed Nov 28 11:01:13 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:13 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24074 >/dev/null 2>/dev/null
selfserv with PID 24074 found at Wed Nov 28 11:01:13 EST 2012
selfserv with PID 24074 started at Wed Nov 28 11:01:13 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2367: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 24074 >/dev/null 2>/dev/null
selfserv with PID 24074 found at Wed Nov 28 11:01:13 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2368: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 24074 >/dev/null 2>/dev/null
selfserv with PID 24074 found at Wed Nov 28 11:01:13 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2369: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 24074 >/dev/null 2>/dev/null
selfserv with PID 24074 found at Wed Nov 28 11:01:13 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2370: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 24074 >/dev/null 2>/dev/null
selfserv with PID 24074 found at Wed Nov 28 11:01:13 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2371: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 24074 at Wed Nov 28 11:01:13 EST 2012
kill -USR1 24074
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24074 killed at Wed Nov 28 11:01:13 EST 2012
ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Wed Nov 28 11:01:13 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:13 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24222 >/dev/null 2>/dev/null
selfserv with PID 24222 found at Wed Nov 28 11:01:13 EST 2012
selfserv with PID 24222 started at Wed Nov 28 11:01:13 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2372: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 24222 >/dev/null 2>/dev/null
selfserv with PID 24222 found at Wed Nov 28 11:01:13 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2373: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 24222 >/dev/null 2>/dev/null
selfserv with PID 24222 found at Wed Nov 28 11:01:13 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2374: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 24222 >/dev/null 2>/dev/null
selfserv with PID 24222 found at Wed Nov 28 11:01:13 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2375: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 24222 >/dev/null 2>/dev/null
selfserv with PID 24222 found at Wed Nov 28 11:01:14 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2376: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 24222 >/dev/null 2>/dev/null
selfserv with PID 24222 found at Wed Nov 28 11:01:14 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2377: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 24222 >/dev/null 2>/dev/null
selfserv with PID 24222 found at Wed Nov 28 11:01:14 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2378: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 24222 >/dev/null 2>/dev/null
selfserv with PID 24222 found at Wed Nov 28 11:01:14 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2379: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 24222 >/dev/null 2>/dev/null
selfserv with PID 24222 found at Wed Nov 28 11:01:14 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2380: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 24222 >/dev/null 2>/dev/null
selfserv with PID 24222 found at Wed Nov 28 11:01:14 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2381: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 24222 >/dev/null 2>/dev/null
selfserv with PID 24222 found at Wed Nov 28 11:01:14 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2382: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 24222 >/dev/null 2>/dev/null
selfserv with PID 24222 found at Wed Nov 28 11:01:14 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2383: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 24222 >/dev/null 2>/dev/null
selfserv with PID 24222 found at Wed Nov 28 11:01:14 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2384: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 24222 >/dev/null 2>/dev/null
selfserv with PID 24222 found at Wed Nov 28 11:01:14 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2385: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 24222 >/dev/null 2>/dev/null
selfserv with PID 24222 found at Wed Nov 28 11:01:14 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2386: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 24222 at Wed Nov 28 11:01:15 EST 2012
kill -USR1 24222
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24222 killed at Wed Nov 28 11:01:15 EST 2012
ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Wed Nov 28 11:01:15 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:15 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24607 >/dev/null 2>/dev/null
selfserv with PID 24607 found at Wed Nov 28 11:01:15 EST 2012
selfserv with PID 24607 started at Wed Nov 28 11:01:15 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2387: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 24607 >/dev/null 2>/dev/null
selfserv with PID 24607 found at Wed Nov 28 11:01:15 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2388: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 24607 >/dev/null 2>/dev/null
selfserv with PID 24607 found at Wed Nov 28 11:01:15 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2389: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 24607 >/dev/null 2>/dev/null
selfserv with PID 24607 found at Wed Nov 28 11:01:15 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2390: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 24607 >/dev/null 2>/dev/null
selfserv with PID 24607 found at Wed Nov 28 11:01:15 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2391: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 24607 at Wed Nov 28 11:01:15 EST 2012
kill -USR1 24607
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24607 killed at Wed Nov 28 11:01:15 EST 2012
ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Wed Nov 28 11:01:15 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:15 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24755 >/dev/null 2>/dev/null
selfserv with PID 24755 found at Wed Nov 28 11:01:15 EST 2012
selfserv with PID 24755 started at Wed Nov 28 11:01:15 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2392: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 24755 >/dev/null 2>/dev/null
selfserv with PID 24755 found at Wed Nov 28 11:01:15 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2393: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 24755 >/dev/null 2>/dev/null
selfserv with PID 24755 found at Wed Nov 28 11:01:15 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2394: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 24755 >/dev/null 2>/dev/null
selfserv with PID 24755 found at Wed Nov 28 11:01:15 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2395: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 24755 >/dev/null 2>/dev/null
selfserv with PID 24755 found at Wed Nov 28 11:01:15 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2396: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24755 at Wed Nov 28 11:01:15 EST 2012
kill -USR1 24755
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24755 killed at Wed Nov 28 11:01:15 EST 2012
ssl.sh: SSL Client Authentication Extended Test - server normal/client bypass  - with ECC ===============================
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:01:15 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:15 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24954 >/dev/null 2>/dev/null
selfserv with PID 24954 found at Wed Nov 28 11:01:16 EST 2012
selfserv with PID 24954 started at Wed Nov 28 11:01:16 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2397: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24954 at Wed Nov 28 11:01:16 EST 2012
kill -USR1 24954
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24954 killed at Wed Nov 28 11:01:16 EST 2012
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Wed Nov 28 11:01:16 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:16 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25011 >/dev/null 2>/dev/null
selfserv with PID 25011 found at Wed Nov 28 11:01:16 EST 2012
selfserv with PID 25011 started at Wed Nov 28 11:01:16 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -w bogus -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2398: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25011 at Wed Nov 28 11:01:16 EST 2012
kill -USR1 25011
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25011 killed at Wed Nov 28 11:01:16 EST 2012
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Wed Nov 28 11:01:16 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:16 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25068 >/dev/null 2>/dev/null
selfserv with PID 25068 found at Wed Nov 28 11:01:16 EST 2012
selfserv with PID 25068 started at Wed Nov 28 11:01:16 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -w nss -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2399: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25068 at Wed Nov 28 11:01:16 EST 2012
kill -USR1 25068
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25068 killed at Wed Nov 28 11:01:16 EST 2012
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:01:16 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:16 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25125 >/dev/null 2>/dev/null
selfserv with PID 25125 found at Wed Nov 28 11:01:16 EST 2012
selfserv with PID 25125 started at Wed Nov 28 11:01:16 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2400: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25125 at Wed Nov 28 11:01:16 EST 2012
kill -USR1 25125
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25125 killed at Wed Nov 28 11:01:16 EST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Wed Nov 28 11:01:16 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:16 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25182 >/dev/null 2>/dev/null
selfserv with PID 25182 found at Wed Nov 28 11:01:16 EST 2012
selfserv with PID 25182 started at Wed Nov 28 11:01:16 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -w bogus -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2401: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25182 at Wed Nov 28 11:01:16 EST 2012
kill -USR1 25182
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25182 killed at Wed Nov 28 11:01:16 EST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Wed Nov 28 11:01:16 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:16 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25239 >/dev/null 2>/dev/null
selfserv with PID 25239 found at Wed Nov 28 11:01:16 EST 2012
selfserv with PID 25239 started at Wed Nov 28 11:01:16 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -w nss -n ExtendedSSLUser   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2402: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25239 at Wed Nov 28 11:01:16 EST 2012
kill -USR1 25239
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25239 killed at Wed Nov 28 11:01:16 EST 2012
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:01:17 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:17 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25296 >/dev/null 2>/dev/null
selfserv with PID 25296 found at Wed Nov 28 11:01:17 EST 2012
selfserv with PID 25296 started at Wed Nov 28 11:01:17 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2403: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25296 at Wed Nov 28 11:01:17 EST 2012
kill -USR1 25296
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25296 killed at Wed Nov 28 11:01:17 EST 2012
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Wed Nov 28 11:01:17 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:17 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25353 >/dev/null 2>/dev/null
selfserv with PID 25353 found at Wed Nov 28 11:01:17 EST 2012
selfserv with PID 25353 started at Wed Nov 28 11:01:17 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V :ssl3 -n ExtendedSSLUser -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2404: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25353 at Wed Nov 28 11:01:17 EST 2012
kill -USR1 25353
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25353 killed at Wed Nov 28 11:01:17 EST 2012
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Wed Nov 28 11:01:17 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:17 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25410 >/dev/null 2>/dev/null
selfserv with PID 25410 found at Wed Nov 28 11:01:17 EST 2012
selfserv with PID 25410 started at Wed Nov 28 11:01:17 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V :ssl3 -n ExtendedSSLUser -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2405: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25410 at Wed Nov 28 11:01:17 EST 2012
kill -USR1 25410
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25410 killed at Wed Nov 28 11:01:17 EST 2012
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:01:17 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:17 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25467 >/dev/null 2>/dev/null
selfserv with PID 25467 found at Wed Nov 28 11:01:17 EST 2012
selfserv with PID 25467 started at Wed Nov 28 11:01:17 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2406: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25467 at Wed Nov 28 11:01:17 EST 2012
kill -USR1 25467
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25467 killed at Wed Nov 28 11:01:17 EST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Wed Nov 28 11:01:17 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:17 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25524 >/dev/null 2>/dev/null
selfserv with PID 25524 found at Wed Nov 28 11:01:17 EST 2012
selfserv with PID 25524 started at Wed Nov 28 11:01:17 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V :ssl3 -n ExtendedSSLUser -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2407: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25524 at Wed Nov 28 11:01:17 EST 2012
kill -USR1 25524
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25524 killed at Wed Nov 28 11:01:17 EST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Wed Nov 28 11:01:17 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:17 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25581 >/dev/null 2>/dev/null
selfserv with PID 25581 found at Wed Nov 28 11:01:17 EST 2012
selfserv with PID 25581 started at Wed Nov 28 11:01:17 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V :ssl3 -n ExtendedSSLUser -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2408: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25581 at Wed Nov 28 11:01:18 EST 2012
kill -USR1 25581
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25581 killed at Wed Nov 28 11:01:18 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:01:18 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:18 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25638 >/dev/null 2>/dev/null
selfserv with PID 25638 found at Wed Nov 28 11:01:18 EST 2012
selfserv with PID 25638 started at Wed Nov 28 11:01:18 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2409: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25638 at Wed Nov 28 11:01:18 EST 2012
kill -USR1 25638
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25638 killed at Wed Nov 28 11:01:18 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:01:18 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:18 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25695 >/dev/null 2>/dev/null
selfserv with PID 25695 found at Wed Nov 28 11:01:18 EST 2012
selfserv with PID 25695 started at Wed Nov 28 11:01:18 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3: -w bogus -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2410: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25695 at Wed Nov 28 11:01:18 EST 2012
kill -USR1 25695
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25695 killed at Wed Nov 28 11:01:18 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:01:18 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:18 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25752 >/dev/null 2>/dev/null
selfserv with PID 25752 found at Wed Nov 28 11:01:18 EST 2012
selfserv with PID 25752 started at Wed Nov 28 11:01:18 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3: -w nss -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2411: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25752 at Wed Nov 28 11:01:18 EST 2012
kill -USR1 25752
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25752 killed at Wed Nov 28 11:01:18 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:01:18 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:18 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25809 >/dev/null 2>/dev/null
selfserv with PID 25809 found at Wed Nov 28 11:01:18 EST 2012
selfserv with PID 25809 started at Wed Nov 28 11:01:18 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2412: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25809 at Wed Nov 28 11:01:18 EST 2012
kill -USR1 25809
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25809 killed at Wed Nov 28 11:01:18 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:01:18 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:18 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25866 >/dev/null 2>/dev/null
selfserv with PID 25866 found at Wed Nov 28 11:01:18 EST 2012
selfserv with PID 25866 started at Wed Nov 28 11:01:18 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3: -w bogus -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2413: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25866 at Wed Nov 28 11:01:18 EST 2012
kill -USR1 25866
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25866 killed at Wed Nov 28 11:01:18 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:01:19 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:19 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25923 >/dev/null 2>/dev/null
selfserv with PID 25923 found at Wed Nov 28 11:01:19 EST 2012
selfserv with PID 25923 started at Wed Nov 28 11:01:19 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3: -w nss -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2414: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25923 at Wed Nov 28 11:01:19 EST 2012
kill -USR1 25923
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25923 killed at Wed Nov 28 11:01:19 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:01:19 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:19 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25980 >/dev/null 2>/dev/null
selfserv with PID 25980 found at Wed Nov 28 11:01:19 EST 2012
selfserv with PID 25980 started at Wed Nov 28 11:01:19 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2415: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25980 at Wed Nov 28 11:01:19 EST 2012
kill -USR1 25980
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25980 killed at Wed Nov 28 11:01:19 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:01:19 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:19 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 26037 >/dev/null 2>/dev/null
selfserv with PID 26037 found at Wed Nov 28 11:01:19 EST 2012
selfserv with PID 26037 started at Wed Nov 28 11:01:19 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2416: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26037 at Wed Nov 28 11:01:19 EST 2012
kill -USR1 26037
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 26037 killed at Wed Nov 28 11:01:19 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:01:19 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:19 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 26094 >/dev/null 2>/dev/null
selfserv with PID 26094 found at Wed Nov 28 11:01:19 EST 2012
selfserv with PID 26094 started at Wed Nov 28 11:01:19 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2417: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26094 at Wed Nov 28 11:01:19 EST 2012
kill -USR1 26094
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 26094 killed at Wed Nov 28 11:01:19 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:01:19 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:19 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 26151 >/dev/null 2>/dev/null
selfserv with PID 26151 found at Wed Nov 28 11:01:19 EST 2012
selfserv with PID 26151 started at Wed Nov 28 11:01:19 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2418: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26151 at Wed Nov 28 11:01:19 EST 2012
kill -USR1 26151
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 26151 killed at Wed Nov 28 11:01:19 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:01:19 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:19 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 26208 >/dev/null 2>/dev/null
selfserv with PID 26208 found at Wed Nov 28 11:01:19 EST 2012
selfserv with PID 26208 started at Wed Nov 28 11:01:19 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2419: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26208 at Wed Nov 28 11:01:20 EST 2012
kill -USR1 26208
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 26208 killed at Wed Nov 28 11:01:20 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:01:20 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:20 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 26265 >/dev/null 2>/dev/null
selfserv with PID 26265 found at Wed Nov 28 11:01:20 EST 2012
selfserv with PID 26265 started at Wed Nov 28 11:01:20 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2420: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26265 at Wed Nov 28 11:01:20 EST 2012
kill -USR1 26265
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 26265 killed at Wed Nov 28 11:01:20 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:01:20 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:20 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 26322 >/dev/null 2>/dev/null
selfserv with PID 26322 found at Wed Nov 28 11:01:20 EST 2012
selfserv with PID 26322 started at Wed Nov 28 11:01:20 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2421: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26322 at Wed Nov 28 11:01:20 EST 2012
kill -USR1 26322
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 26322 killed at Wed Nov 28 11:01:20 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:01:20 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:20 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 26379 >/dev/null 2>/dev/null
selfserv with PID 26379 found at Wed Nov 28 11:01:20 EST 2012
selfserv with PID 26379 started at Wed Nov 28 11:01:20 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2422: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26379 at Wed Nov 28 11:01:20 EST 2012
kill -USR1 26379
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 26379 killed at Wed Nov 28 11:01:20 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:01:20 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:20 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 26436 >/dev/null 2>/dev/null
selfserv with PID 26436 found at Wed Nov 28 11:01:20 EST 2012
selfserv with PID 26436 started at Wed Nov 28 11:01:20 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2423: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26436 at Wed Nov 28 11:01:20 EST 2012
kill -USR1 26436
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 26436 killed at Wed Nov 28 11:01:20 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:01:20 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:20 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 26493 >/dev/null 2>/dev/null
selfserv with PID 26493 found at Wed Nov 28 11:01:20 EST 2012
selfserv with PID 26493 started at Wed Nov 28 11:01:20 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2424: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26493 at Wed Nov 28 11:01:20 EST 2012
kill -USR1 26493
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 26493 killed at Wed Nov 28 11:01:20 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:01:20 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:20 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 26551 >/dev/null 2>/dev/null
selfserv with PID 26551 found at Wed Nov 28 11:01:20 EST 2012
selfserv with PID 26551 started at Wed Nov 28 11:01:20 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2425: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26551 at Wed Nov 28 11:01:21 EST 2012
kill -USR1 26551
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 26551 killed at Wed Nov 28 11:01:21 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:01:21 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:21 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 26608 >/dev/null 2>/dev/null
selfserv with PID 26608 found at Wed Nov 28 11:01:21 EST 2012
selfserv with PID 26608 started at Wed Nov 28 11:01:21 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2426: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26608 at Wed Nov 28 11:01:21 EST 2012
kill -USR1 26608
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 26608 killed at Wed Nov 28 11:01:21 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:01:21 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:21 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 26680 >/dev/null 2>/dev/null
selfserv with PID 26680 found at Wed Nov 28 11:01:21 EST 2012
selfserv with PID 26680 started at Wed Nov 28 11:01:21 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -w bogus -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2427: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26680 at Wed Nov 28 11:01:21 EST 2012
kill -USR1 26680
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 26680 killed at Wed Nov 28 11:01:21 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:01:21 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:21 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 26737 >/dev/null 2>/dev/null
selfserv with PID 26737 found at Wed Nov 28 11:01:21 EST 2012
selfserv with PID 26737 started at Wed Nov 28 11:01:21 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -w nss -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2428: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26737 at Wed Nov 28 11:01:21 EST 2012
kill -USR1 26737
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 26737 killed at Wed Nov 28 11:01:21 EST 2012
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:01:21 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:21 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 26794 >/dev/null 2>/dev/null
selfserv with PID 26794 found at Wed Nov 28 11:01:21 EST 2012
selfserv with PID 26794 started at Wed Nov 28 11:01:21 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -w bogus -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2429: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26794 at Wed Nov 28 11:01:21 EST 2012
kill -USR1 26794
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 26794 killed at Wed Nov 28 11:01:21 EST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:01:21 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:21 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 26851 >/dev/null 2>/dev/null
selfserv with PID 26851 found at Wed Nov 28 11:01:21 EST 2012
selfserv with PID 26851 started at Wed Nov 28 11:01:21 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -w nss -n ExtendedSSLUser-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2430: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26851 at Wed Nov 28 11:01:22 EST 2012
kill -USR1 26851
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 26851 killed at Wed Nov 28 11:01:22 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:01:22 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:22 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 26908 >/dev/null 2>/dev/null
selfserv with PID 26908 found at Wed Nov 28 11:01:22 EST 2012
selfserv with PID 26908 started at Wed Nov 28 11:01:22 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V :ssl3 -n ExtendedSSLUser-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2431: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26908 at Wed Nov 28 11:01:22 EST 2012
kill -USR1 26908
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 26908 killed at Wed Nov 28 11:01:22 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:01:22 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:22 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 26965 >/dev/null 2>/dev/null
selfserv with PID 26965 found at Wed Nov 28 11:01:22 EST 2012
selfserv with PID 26965 started at Wed Nov 28 11:01:22 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V :ssl3 -n ExtendedSSLUser-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2432: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26965 at Wed Nov 28 11:01:22 EST 2012
kill -USR1 26965
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 26965 killed at Wed Nov 28 11:01:22 EST 2012
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:01:22 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:22 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 27022 >/dev/null 2>/dev/null
selfserv with PID 27022 found at Wed Nov 28 11:01:22 EST 2012
selfserv with PID 27022 started at Wed Nov 28 11:01:22 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V :ssl3 -n ExtendedSSLUser-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2433: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 27022 at Wed Nov 28 11:01:22 EST 2012
kill -USR1 27022
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 27022 killed at Wed Nov 28 11:01:22 EST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:01:22 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:22 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 27079 >/dev/null 2>/dev/null
selfserv with PID 27079 found at Wed Nov 28 11:01:22 EST 2012
selfserv with PID 27079 started at Wed Nov 28 11:01:22 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V :ssl3 -n ExtendedSSLUser-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2434: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27079 at Wed Nov 28 11:01:22 EST 2012
kill -USR1 27079
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 27079 killed at Wed Nov 28 11:01:22 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:01:22 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:22 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 27136 >/dev/null 2>/dev/null
selfserv with PID 27136 found at Wed Nov 28 11:01:22 EST 2012
selfserv with PID 27136 started at Wed Nov 28 11:01:22 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3: -w bogus -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2435: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27136 at Wed Nov 28 11:01:23 EST 2012
kill -USR1 27136
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 27136 killed at Wed Nov 28 11:01:23 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:01:23 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:23 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 27193 >/dev/null 2>/dev/null
selfserv with PID 27193 found at Wed Nov 28 11:01:23 EST 2012
selfserv with PID 27193 started at Wed Nov 28 11:01:23 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3: -w nss -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2436: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27193 at Wed Nov 28 11:01:23 EST 2012
kill -USR1 27193
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 27193 killed at Wed Nov 28 11:01:23 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:01:23 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:23 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 27250 >/dev/null 2>/dev/null
selfserv with PID 27250 found at Wed Nov 28 11:01:23 EST 2012
selfserv with PID 27250 started at Wed Nov 28 11:01:23 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3: -w bogus -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2437: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 27250 at Wed Nov 28 11:01:23 EST 2012
kill -USR1 27250
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 27250 killed at Wed Nov 28 11:01:23 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:01:23 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:23 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 27307 >/dev/null 2>/dev/null
selfserv with PID 27307 found at Wed Nov 28 11:01:23 EST 2012
selfserv with PID 27307 started at Wed Nov 28 11:01:23 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3: -w nss -n ExtendedSSLUser-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2438: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27307 at Wed Nov 28 11:01:23 EST 2012
kill -USR1 27307
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 27307 killed at Wed Nov 28 11:01:23 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:01:23 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:23 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 27364 >/dev/null 2>/dev/null
selfserv with PID 27364 found at Wed Nov 28 11:01:23 EST 2012
selfserv with PID 27364 started at Wed Nov 28 11:01:23 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2439: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27364 at Wed Nov 28 11:01:23 EST 2012
kill -USR1 27364
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 27364 killed at Wed Nov 28 11:01:23 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:01:23 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:23 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 27421 >/dev/null 2>/dev/null
selfserv with PID 27421 found at Wed Nov 28 11:01:23 EST 2012
selfserv with PID 27421 started at Wed Nov 28 11:01:23 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2440: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27421 at Wed Nov 28 11:01:24 EST 2012
kill -USR1 27421
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 27421 killed at Wed Nov 28 11:01:24 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:01:24 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:24 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 27478 >/dev/null 2>/dev/null
selfserv with PID 27478 found at Wed Nov 28 11:01:24 EST 2012
selfserv with PID 27478 started at Wed Nov 28 11:01:24 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2441: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 27478 at Wed Nov 28 11:01:24 EST 2012
kill -USR1 27478
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 27478 killed at Wed Nov 28 11:01:24 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:01:24 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:24 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 27535 >/dev/null 2>/dev/null
selfserv with PID 27535 found at Wed Nov 28 11:01:24 EST 2012
selfserv with PID 27535 started at Wed Nov 28 11:01:24 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2442: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27535 at Wed Nov 28 11:01:24 EST 2012
kill -USR1 27535
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 27535 killed at Wed Nov 28 11:01:24 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:01:24 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:24 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 27592 >/dev/null 2>/dev/null
selfserv with PID 27592 found at Wed Nov 28 11:01:24 EST 2012
selfserv with PID 27592 started at Wed Nov 28 11:01:24 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2443: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27592 at Wed Nov 28 11:01:24 EST 2012
kill -USR1 27592
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 27592 killed at Wed Nov 28 11:01:24 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:01:24 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:24 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 27649 >/dev/null 2>/dev/null
selfserv with PID 27649 found at Wed Nov 28 11:01:24 EST 2012
selfserv with PID 27649 started at Wed Nov 28 11:01:24 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2444: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27649 at Wed Nov 28 11:01:24 EST 2012
kill -USR1 27649
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 27649 killed at Wed Nov 28 11:01:24 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:01:25 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:25 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 27706 >/dev/null 2>/dev/null
selfserv with PID 27706 found at Wed Nov 28 11:01:25 EST 2012
selfserv with PID 27706 started at Wed Nov 28 11:01:25 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2445: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 27706 at Wed Nov 28 11:01:25 EST 2012
kill -USR1 27706
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 27706 killed at Wed Nov 28 11:01:25 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:01:25 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:25 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 27763 >/dev/null 2>/dev/null
selfserv with PID 27763 found at Wed Nov 28 11:01:25 EST 2012
selfserv with PID 27763 started at Wed Nov 28 11:01:25 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2446: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27763 at Wed Nov 28 11:01:25 EST 2012
kill -USR1 27763
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 27763 killed at Wed Nov 28 11:01:25 EST 2012
ssl.sh: skipping  TLS Server hello response without SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI for Extended Test
ssl.sh: skipping  TLS Server response with alert for Extended Test
ssl.sh: skipping  SSL3 Server hello response without SNI for Extended Test
ssl.sh: skipping  SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test
ssl.sh: skipping  TLS Server hello response without SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI: Change name on 2d HS for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test
ssl.sh: skipping  TLS Server response with alert for Extended Test
ssl.sh: SSL Stress Test Extended Test - server normal/client bypass  - with ECC ===============================
ssl.sh: skipping  Stress SSL2 RC4 128 with MD5 for Extended Test
ssl.sh: Stress SSL3 RC4 128 with MD5 ----
selfserv starting at Wed Nov 28 11:01:25 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:25 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 27934 >/dev/null 2>/dev/null
selfserv with PID 27934 found at Wed Nov 28 11:01:25 EST 2012
selfserv with PID 27934 started at Wed Nov 28 11:01:25 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 1000 -C c -V :ssl3 \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:01:25 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:01:25 EST 2012
ssl.sh: #2447: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27934 at Wed Nov 28 11:01:25 EST 2012
kill -USR1 27934
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 27934 killed at Wed Nov 28 11:01:25 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 ----
selfserv starting at Wed Nov 28 11:01:25 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:25 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 28010 >/dev/null 2>/dev/null
selfserv with PID 28010 found at Wed Nov 28 11:01:25 EST 2012
selfserv with PID 28010 started at Wed Nov 28 11:01:25 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 1000 -C c \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:01:25 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:01:26 EST 2012
ssl.sh: #2448: Stress TLS  RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28010 at Wed Nov 28 11:01:26 EST 2012
kill -USR1 28010
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 28010 killed at Wed Nov 28 11:01:26 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (false start) ----
selfserv starting at Wed Nov 28 11:01:26 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:26 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 28086 >/dev/null 2>/dev/null
selfserv with PID 28086 found at Wed Nov 28 11:01:26 EST 2012
selfserv with PID 28086 started at Wed Nov 28 11:01:26 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 1000 -C c -g \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:01:26 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:01:26 EST 2012
ssl.sh: #2449: Stress TLS  RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28086 at Wed Nov 28 11:01:26 EST 2012
kill -USR1 28086
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 28086 killed at Wed Nov 28 11:01:26 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket) ----
selfserv starting at Wed Nov 28 11:01:26 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:26 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 28162 >/dev/null 2>/dev/null
selfserv with PID 28162 found at Wed Nov 28 11:01:26 EST 2012
selfserv with PID 28162 started at Wed Nov 28 11:01:26 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:01:26 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Wed Nov 28 11:01:26 EST 2012
ssl.sh: #2450: Stress TLS  RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28162 at Wed Nov 28 11:01:26 EST 2012
kill -USR1 28162
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 28162 killed at Wed Nov 28 11:01:26 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (compression) ----
selfserv starting at Wed Nov 28 11:01:26 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:26 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 28238 >/dev/null 2>/dev/null
selfserv with PID 28238 found at Wed Nov 28 11:01:26 EST 2012
selfserv with PID 28238 started at Wed Nov 28 11:01:26 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -z \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:01:27 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:01:27 EST 2012
ssl.sh: #2451: Stress TLS  RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28238 at Wed Nov 28 11:01:27 EST 2012
kill -USR1 28238
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 28238 killed at Wed Nov 28 11:01:27 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression) ----
selfserv starting at Wed Nov 28 11:01:27 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:27 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 28314 >/dev/null 2>/dev/null
selfserv with PID 28314 found at Wed Nov 28 11:01:27 EST 2012
selfserv with PID 28314 started at Wed Nov 28 11:01:27 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u -z \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:01:27 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Wed Nov 28 11:01:27 EST 2012
ssl.sh: #2452: Stress TLS  RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28314 at Wed Nov 28 11:01:27 EST 2012
kill -USR1 28314
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 28314 killed at Wed Nov 28 11:01:27 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) ----
selfserv starting at Wed Nov 28 11:01:27 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:27 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 28390 >/dev/null 2>/dev/null
selfserv with PID 28390 found at Wed Nov 28 11:01:27 EST 2012
selfserv with PID 28390 started at Wed Nov 28 11:01:27 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:01:27 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Wed Nov 28 11:01:28 EST 2012
ssl.sh: #2453: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28390 at Wed Nov 28 11:01:28 EST 2012
kill -USR1 28390
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 28390 killed at Wed Nov 28 11:01:28 EST 2012
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test
ssl.sh: skipping  Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Wed Nov 28 11:01:28 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:28 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 28495 >/dev/null 2>/dev/null
selfserv with PID 28495 found at Wed Nov 28 11:01:28 EST 2012
selfserv with PID 28495 started at Wed Nov 28 11:01:28 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 100 -C c -V :ssl3 -N -n ExtendedSSLUser \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:01:28 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed Nov 28 11:01:28 EST 2012
ssl.sh: #2454: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28495 at Wed Nov 28 11:01:28 EST 2012
kill -USR1 28495
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 28495 killed at Wed Nov 28 11:01:28 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Wed Nov 28 11:01:28 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:28 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 28570 >/dev/null 2>/dev/null
selfserv with PID 28570 found at Wed Nov 28 11:01:28 EST 2012
selfserv with PID 28570 started at Wed Nov 28 11:01:28 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 100 -C c -N -n ExtendedSSLUser \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:01:28 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed Nov 28 11:01:29 EST 2012
ssl.sh: #2455: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28570 at Wed Nov 28 11:01:29 EST 2012
kill -USR1 28570
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 28570 killed at Wed Nov 28 11:01:29 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Wed Nov 28 11:01:29 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:29 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 28645 >/dev/null 2>/dev/null
selfserv with PID 28645 found at Wed Nov 28 11:01:29 EST 2012
selfserv with PID 28645 started at Wed Nov 28 11:01:29 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:01:29 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Wed Nov 28 11:01:29 EST 2012
ssl.sh: #2456: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28645 at Wed Nov 28 11:01:29 EST 2012
kill -USR1 28645
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 28645 killed at Wed Nov 28 11:01:29 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Wed Nov 28 11:01:29 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:29 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 28721 >/dev/null 2>/dev/null
selfserv with PID 28721 found at Wed Nov 28 11:01:29 EST 2012
selfserv with PID 28721 started at Wed Nov 28 11:01:29 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:01:29 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:01:29 EST 2012
ssl.sh: #2457: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28721 at Wed Nov 28 11:01:29 EST 2012
kill -USR1 28721
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 28721 killed at Wed Nov 28 11:01:29 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Wed Nov 28 11:01:29 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:29 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 28797 >/dev/null 2>/dev/null
selfserv with PID 28797 found at Wed Nov 28 11:01:29 EST 2012
selfserv with PID 28797 started at Wed Nov 28 11:01:29 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:01:29 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:01:29 EST 2012
ssl.sh: #2458: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28797 at Wed Nov 28 11:01:29 EST 2012
kill -USR1 28797
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 28797 killed at Wed Nov 28 11:01:29 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Wed Nov 28 11:01:29 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:29 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 28873 >/dev/null 2>/dev/null
selfserv with PID 28873 found at Wed Nov 28 11:01:29 EST 2012
selfserv with PID 28873 started at Wed Nov 28 11:01:29 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:01:29 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Wed Nov 28 11:01:30 EST 2012
ssl.sh: #2459: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28873 at Wed Nov 28 11:01:30 EST 2012
kill -USR1 28873
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 28873 killed at Wed Nov 28 11:01:30 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Wed Nov 28 11:01:30 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:30 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 28950 >/dev/null 2>/dev/null
selfserv with PID 28950 found at Wed Nov 28 11:01:30 EST 2012
selfserv with PID 28950 started at Wed Nov 28 11:01:30 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:01:30 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Wed Nov 28 11:01:30 EST 2012
ssl.sh: #2460: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28950 at Wed Nov 28 11:01:30 EST 2012
kill -USR1 28950
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 28950 killed at Wed Nov 28 11:01:30 EST 2012
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Wed Nov 28 11:01:30 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C009 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:30 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 29055 >/dev/null 2>/dev/null
selfserv with PID 29055 found at Wed Nov 28 11:01:30 EST 2012
selfserv with PID 29055 started at Wed Nov 28 11:01:30 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 100 -C :C009 -N -V :ssl3 \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:01:30 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed Nov 28 11:01:31 EST 2012
ssl.sh: #2461: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29055 at Wed Nov 28 11:01:31 EST 2012
kill -USR1 29055
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 29055 killed at Wed Nov 28 11:01:31 EST 2012
ssl.sh: Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Wed Nov 28 11:01:31 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C013 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:31 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 29130 >/dev/null 2>/dev/null
selfserv with PID 29130 found at Wed Nov 28 11:01:31 EST 2012
selfserv with PID 29130 started at Wed Nov 28 11:01:31 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 1000 -C :C013 -V :ssl3 \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:01:31 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:01:31 EST 2012
ssl.sh: #2462: Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29130 at Wed Nov 28 11:01:31 EST 2012
kill -USR1 29130
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 29130 killed at Wed Nov 28 11:01:31 EST 2012
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) ----
selfserv starting at Wed Nov 28 11:01:31 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C004 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:31 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 29206 >/dev/null 2>/dev/null
selfserv with PID 29206 found at Wed Nov 28 11:01:31 EST 2012
selfserv with PID 29206 started at Wed Nov 28 11:01:31 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C004 -N \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:01:31 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed Nov 28 11:01:32 EST 2012
ssl.sh: #2463: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29206 at Wed Nov 28 11:01:32 EST 2012
kill -USR1 29206
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 29206 killed at Wed Nov 28 11:01:32 EST 2012
ssl.sh: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) ----
selfserv starting at Wed Nov 28 11:01:32 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c :C00E -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:32 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 29281 >/dev/null 2>/dev/null
selfserv with PID 29281 found at Wed Nov 28 11:01:32 EST 2012
selfserv with PID 29281 started at Wed Nov 28 11:01:32 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C00E -N \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:01:32 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed Nov 28 11:01:33 EST 2012
ssl.sh: #2464: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29281 at Wed Nov 28 11:01:33 EST 2012
kill -USR1 29281
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 29281 killed at Wed Nov 28 11:01:33 EST 2012
ssl.sh: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Wed Nov 28 11:01:33 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C013 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:33 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 29356 >/dev/null 2>/dev/null
selfserv with PID 29356 found at Wed Nov 28 11:01:33 EST 2012
selfserv with PID 29356 started at Wed Nov 28 11:01:33 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :C013 \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:01:33 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:01:33 EST 2012
ssl.sh: #2465: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29356 at Wed Nov 28 11:01:33 EST 2012
kill -USR1 29356
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 29356 killed at Wed Nov 28 11:01:33 EST 2012
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) ----
selfserv starting at Wed Nov 28 11:01:33 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C004 -u -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:33 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 29432 >/dev/null 2>/dev/null
selfserv with PID 29432 found at Wed Nov 28 11:01:33 EST 2012
selfserv with PID 29432 started at Wed Nov 28 11:01:33 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :C004 -u \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:01:33 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Wed Nov 28 11:01:33 EST 2012
ssl.sh: #2466: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29432 at Wed Nov 28 11:01:33 EST 2012
kill -USR1 29432
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 29432 killed at Wed Nov 28 11:01:34 EST 2012
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Wed Nov 28 11:01:34 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C009 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:34 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 29529 >/dev/null 2>/dev/null
selfserv with PID 29529 found at Wed Nov 28 11:01:34 EST 2012
selfserv with PID 29529 started at Wed Nov 28 11:01:34 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 10 -C :C009 -N -V :ssl3 -n ExtendedSSLUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:01:34 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Wed Nov 28 11:01:34 EST 2012
ssl.sh: #2467: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29529 at Wed Nov 28 11:01:34 EST 2012
kill -USR1 29529
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 29529 killed at Wed Nov 28 11:01:34 EST 2012
ssl.sh: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) ----
selfserv starting at Wed Nov 28 11:01:34 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:34 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 29604 >/dev/null 2>/dev/null
selfserv with PID 29604 found at Wed Nov 28 11:01:34 EST 2012
selfserv with PID 29604 started at Wed Nov 28 11:01:34 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 100 -C :C013 -V :ssl3 -n ExtendedSSLUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:01:34 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:01:34 EST 2012
ssl.sh: #2468: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29604 at Wed Nov 28 11:01:34 EST 2012
kill -USR1 29604
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 29604 killed at Wed Nov 28 11:01:34 EST 2012
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Wed Nov 28 11:01:34 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C004 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:34 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 29680 >/dev/null 2>/dev/null
selfserv with PID 29680 found at Wed Nov 28 11:01:34 EST 2012
selfserv with PID 29680 started at Wed Nov 28 11:01:34 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 10 -C :C004 -N -n ExtendedSSLUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:01:34 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Wed Nov 28 11:01:35 EST 2012
ssl.sh: #2469: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29680 at Wed Nov 28 11:01:35 EST 2012
kill -USR1 29680
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 29680 killed at Wed Nov 28 11:01:35 EST 2012
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Wed Nov 28 11:01:35 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -r -r -c :C00E -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:35 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 29755 >/dev/null 2>/dev/null
selfserv with PID 29755 found at Wed Nov 28 11:01:35 EST 2012
selfserv with PID 29755 started at Wed Nov 28 11:01:35 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 10 -C :C00E -N -n ExtendedSSLUser-ecmixed \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:01:35 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Wed Nov 28 11:01:35 EST 2012
ssl.sh: #2470: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29755 at Wed Nov 28 11:01:35 EST 2012
kill -USR1 29755
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 29755 killed at Wed Nov 28 11:01:35 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ----
selfserv starting at Wed Nov 28 11:01:35 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:35 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 29830 >/dev/null 2>/dev/null
selfserv with PID 29830 found at Wed Nov 28 11:01:35 EST 2012
selfserv with PID 29830 started at Wed Nov 28 11:01:35 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 100 -C :C013 -n ExtendedSSLUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:01:35 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:01:35 EST 2012
ssl.sh: #2471: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29830 at Wed Nov 28 11:01:35 EST 2012
kill -USR1 29830
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 29830 killed at Wed Nov 28 11:01:35 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ----
selfserv starting at Wed Nov 28 11:01:35 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -u -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:35 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 29906 >/dev/null 2>/dev/null
selfserv with PID 29906 found at Wed Nov 28 11:01:35 EST 2012
selfserv with PID 29906 started at Wed Nov 28 11:01:35 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec -u \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:01:35 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Wed Nov 28 11:01:35 EST 2012
ssl.sh: #2472: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29906 at Wed Nov 28 11:01:35 EST 2012
kill -USR1 29906
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 29906 killed at Wed Nov 28 11:01:35 EST 2012
ssl.sh: SSL - FIPS mode on for server ===============================
ssl.sh: Turning FIPS on for the  server
modutil -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/server -fips true -force
FIPS mode enabled.
ssl.sh: #2473:  (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED
modutil -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/server -list
ssl.sh: #2474:  (modutil -list) produced a returncode of 0, expected is 0 - PASSED
  1. NSS Internal FIPS PKCS #11 Module
ssl.sh: #2475:  (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED
ssl.sh: Turning FIPS on for the extended  server
modutil -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/ext_server -fips true -force
FIPS mode enabled.
ssl.sh: #2476:  (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED
modutil -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/ext_server -list
ssl.sh: #2477:  (modutil -list) produced a returncode of 0, expected is 0 - PASSED
  1. NSS Internal FIPS PKCS #11 Module
ssl.sh: #2478:  (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED
ssl.sh: SSL Cipher Coverage  - server fips/client normal  - with ECC ===============================
selfserv starting at Wed Nov 28 11:01:36 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:36 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 30037 >/dev/null 2>/dev/null
selfserv with PID 30037 found at Wed Nov 28 11:01:36 EST 2012
selfserv with PID 30037 started at Wed Nov 28 11:01:36 EST 2012
ssl.sh: skipping  SSL2_RC4_128_WITH_MD5 (non-FIPS only)
ssl.sh: skipping  SSL2_RC4_128_EXPORT40_WITH_MD5 (non-FIPS only)
ssl.sh: skipping  SSL2_RC2_128_CBC_WITH_MD5 (non-FIPS only)
ssl.sh: skipping  SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 (non-FIPS only)
ssl.sh: skipping  SSL2_DES_64_CBC_WITH_MD5 (non-FIPS only)
ssl.sh: skipping  SSL2_DES_192_EDE3_CBC_WITH_MD5 (non-FIPS only)
ssl.sh: skipping  SSL2_RC4_128_EXPORT40_WITH_MD5 (non-FIPS only)
ssl.sh: skipping  SSL2_RC2_128_CBC_WITH_MD5 (non-FIPS only)
ssl.sh: skipping  SSL2_DES_64_CBC_WITH_MD5 (non-FIPS only)
ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 30037 >/dev/null 2>/dev/null
selfserv with PID 30037 found at Wed Nov 28 11:01:36 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c c -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2479: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 30037 >/dev/null 2>/dev/null
selfserv with PID 30037 found at Wed Nov 28 11:01:36 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c d -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2480: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 30037 >/dev/null 2>/dev/null
selfserv with PID 30037 found at Wed Nov 28 11:01:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c e -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2481: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ----------------------------
kill -0 30037 >/dev/null 2>/dev/null
selfserv with PID 30037 found at Wed Nov 28 11:01:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c i -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2482: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 30037 >/dev/null 2>/dev/null
selfserv with PID 30037 found at Wed Nov 28 11:01:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c j -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2483: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 30037 >/dev/null 2>/dev/null
selfserv with PID 30037 found at Wed Nov 28 11:01:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c k -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2484: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 30037 >/dev/null 2>/dev/null
selfserv with PID 30037 found at Wed Nov 28 11:01:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c n -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2485: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 30037 >/dev/null 2>/dev/null
selfserv with PID 30037 found at Wed Nov 28 11:01:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c v -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2486: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 30037 >/dev/null 2>/dev/null
selfserv with PID 30037 found at Wed Nov 28 11:01:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c y -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2487: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_SHA ----------------------------
kill -0 30037 >/dev/null 2>/dev/null
selfserv with PID 30037 found at Wed Nov 28 11:01:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c z -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2488: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 30037 >/dev/null 2>/dev/null
selfserv with PID 30037 found at Wed Nov 28 11:01:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c c -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2489: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 30037 >/dev/null 2>/dev/null
selfserv with PID 30037 found at Wed Nov 28 11:01:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c d -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2490: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 30037 >/dev/null 2>/dev/null
selfserv with PID 30037 found at Wed Nov 28 11:01:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c e -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2491: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running TLS_RSA_WITH_NULL_MD5 ----------------------------
kill -0 30037 >/dev/null 2>/dev/null
selfserv with PID 30037 found at Wed Nov 28 11:01:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c i -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2492: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 30037 >/dev/null 2>/dev/null
selfserv with PID 30037 found at Wed Nov 28 11:01:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c j -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2493: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 30037 >/dev/null 2>/dev/null
selfserv with PID 30037 found at Wed Nov 28 11:01:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c k -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2494: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 30037 >/dev/null 2>/dev/null
selfserv with PID 30037 found at Wed Nov 28 11:01:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c n -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2495: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 30037 >/dev/null 2>/dev/null
selfserv with PID 30037 found at Wed Nov 28 11:01:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c v -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2496: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 30037 >/dev/null 2>/dev/null
selfserv with PID 30037 found at Wed Nov 28 11:01:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c y -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2497: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_SHA ----------------------------
kill -0 30037 >/dev/null 2>/dev/null
selfserv with PID 30037 found at Wed Nov 28 11:01:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c z -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2498: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 30037 >/dev/null 2>/dev/null
selfserv with PID 30037 found at Wed Nov 28 11:01:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c c -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2499: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 30037 >/dev/null 2>/dev/null
selfserv with PID 30037 found at Wed Nov 28 11:01:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c d -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2500: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 30037 >/dev/null 2>/dev/null
selfserv with PID 30037 found at Wed Nov 28 11:01:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c e -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2501: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  f    TLS11_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping  g    TLS11_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ----------------------------
kill -0 30037 >/dev/null 2>/dev/null
selfserv with PID 30037 found at Wed Nov 28 11:01:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c i -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2502: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 30037 >/dev/null 2>/dev/null
selfserv with PID 30037 found at Wed Nov 28 11:01:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c j -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2503: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 30037 >/dev/null 2>/dev/null
selfserv with PID 30037 found at Wed Nov 28 11:01:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c k -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2504: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 30037 >/dev/null 2>/dev/null
selfserv with PID 30037 found at Wed Nov 28 11:01:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c n -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2505: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 30037 >/dev/null 2>/dev/null
selfserv with PID 30037 found at Wed Nov 28 11:01:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c v -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2506: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 30037 >/dev/null 2>/dev/null
selfserv with PID 30037 found at Wed Nov 28 11:01:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c y -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2507: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_SHA ----------------------------
kill -0 30037 >/dev/null 2>/dev/null
selfserv with PID 30037 found at Wed Nov 28 11:01:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c z -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2508: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 30037 >/dev/null 2>/dev/null
selfserv with PID 30037 found at Wed Nov 28 11:01:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2509: SSL3_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 30037 >/dev/null 2>/dev/null
selfserv with PID 30037 found at Wed Nov 28 11:01:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2510: SSL3_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 30037 >/dev/null 2>/dev/null
selfserv with PID 30037 found at Wed Nov 28 11:01:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2511: SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 30037 >/dev/null 2>/dev/null
selfserv with PID 30037 found at Wed Nov 28 11:01:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2512: SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 30037 >/dev/null 2>/dev/null
selfserv with PID 30037 found at Wed Nov 28 11:01:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2513: SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 30037 >/dev/null 2>/dev/null
selfserv with PID 30037 found at Wed Nov 28 11:01:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2514: SSL3_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 30037 >/dev/null 2>/dev/null
selfserv with PID 30037 found at Wed Nov 28 11:01:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2515: SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 30037 >/dev/null 2>/dev/null
selfserv with PID 30037 found at Wed Nov 28 11:01:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2516: SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 30037 >/dev/null 2>/dev/null
selfserv with PID 30037 found at Wed Nov 28 11:01:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2517: SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 30037 >/dev/null 2>/dev/null
selfserv with PID 30037 found at Wed Nov 28 11:01:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2518: SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 30037 at Wed Nov 28 11:01:39 EST 2012
kill -USR1 30037
selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 30037 killed at Wed Nov 28 11:01:39 EST 2012
ssl.sh: SSL3_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Wed Nov 28 11:01:39 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 31260 >/dev/null 2>/dev/null
selfserv with PID 31260 found at Wed Nov 28 11:01:39 EST 2012
selfserv with PID 31260 started at Wed Nov 28 11:01:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2519: SSL3_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 31260 >/dev/null 2>/dev/null
selfserv with PID 31260 found at Wed Nov 28 11:01:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2520: SSL3_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 31260 >/dev/null 2>/dev/null
selfserv with PID 31260 found at Wed Nov 28 11:01:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2521: SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 31260 >/dev/null 2>/dev/null
selfserv with PID 31260 found at Wed Nov 28 11:01:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2522: SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 31260 >/dev/null 2>/dev/null
selfserv with PID 31260 found at Wed Nov 28 11:01:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2523: SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 31260 at Wed Nov 28 11:01:40 EST 2012
kill -USR1 31260
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 31260 killed at Wed Nov 28 11:01:40 EST 2012
ssl.sh: SSL3_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Wed Nov 28 11:01:40 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 31408 >/dev/null 2>/dev/null
selfserv with PID 31408 found at Wed Nov 28 11:01:40 EST 2012
selfserv with PID 31408 started at Wed Nov 28 11:01:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2524: SSL3_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 31408 >/dev/null 2>/dev/null
selfserv with PID 31408 found at Wed Nov 28 11:01:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2525: SSL3_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 31408 >/dev/null 2>/dev/null
selfserv with PID 31408 found at Wed Nov 28 11:01:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2526: SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 31408 >/dev/null 2>/dev/null
selfserv with PID 31408 found at Wed Nov 28 11:01:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2527: SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 31408 >/dev/null 2>/dev/null
selfserv with PID 31408 found at Wed Nov 28 11:01:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2528: SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 31408 >/dev/null 2>/dev/null
selfserv with PID 31408 found at Wed Nov 28 11:01:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2529: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 31408 >/dev/null 2>/dev/null
selfserv with PID 31408 found at Wed Nov 28 11:01:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2530: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 31408 >/dev/null 2>/dev/null
selfserv with PID 31408 found at Wed Nov 28 11:01:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2531: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 31408 >/dev/null 2>/dev/null
selfserv with PID 31408 found at Wed Nov 28 11:01:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2532: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 31408 >/dev/null 2>/dev/null
selfserv with PID 31408 found at Wed Nov 28 11:01:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2533: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 31408 >/dev/null 2>/dev/null
selfserv with PID 31408 found at Wed Nov 28 11:01:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2534: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 31408 >/dev/null 2>/dev/null
selfserv with PID 31408 found at Wed Nov 28 11:01:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2535: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 31408 >/dev/null 2>/dev/null
selfserv with PID 31408 found at Wed Nov 28 11:01:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2536: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 31408 >/dev/null 2>/dev/null
selfserv with PID 31408 found at Wed Nov 28 11:01:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2537: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 31408 >/dev/null 2>/dev/null
selfserv with PID 31408 found at Wed Nov 28 11:01:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2538: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 31408 at Wed Nov 28 11:01:42 EST 2012
kill -USR1 31408
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 31408 killed at Wed Nov 28 11:01:42 EST 2012
ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Wed Nov 28 11:01:42 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 31807 >/dev/null 2>/dev/null
selfserv with PID 31807 found at Wed Nov 28 11:01:42 EST 2012
selfserv with PID 31807 started at Wed Nov 28 11:01:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2539: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 31807 >/dev/null 2>/dev/null
selfserv with PID 31807 found at Wed Nov 28 11:01:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2540: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 31807 >/dev/null 2>/dev/null
selfserv with PID 31807 found at Wed Nov 28 11:01:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2541: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 31807 >/dev/null 2>/dev/null
selfserv with PID 31807 found at Wed Nov 28 11:01:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2542: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 31807 >/dev/null 2>/dev/null
selfserv with PID 31807 found at Wed Nov 28 11:01:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2543: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 31807 at Wed Nov 28 11:01:42 EST 2012
kill -USR1 31807
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 31807 killed at Wed Nov 28 11:01:42 EST 2012
ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Wed Nov 28 11:01:42 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 31955 >/dev/null 2>/dev/null
selfserv with PID 31955 found at Wed Nov 28 11:01:42 EST 2012
selfserv with PID 31955 started at Wed Nov 28 11:01:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2544: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 31955 >/dev/null 2>/dev/null
selfserv with PID 31955 found at Wed Nov 28 11:01:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2545: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 31955 >/dev/null 2>/dev/null
selfserv with PID 31955 found at Wed Nov 28 11:01:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2546: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 31955 >/dev/null 2>/dev/null
selfserv with PID 31955 found at Wed Nov 28 11:01:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2547: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 31955 >/dev/null 2>/dev/null
selfserv with PID 31955 found at Wed Nov 28 11:01:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2548: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 31955 >/dev/null 2>/dev/null
selfserv with PID 31955 found at Wed Nov 28 11:01:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2549: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 31955 >/dev/null 2>/dev/null
selfserv with PID 31955 found at Wed Nov 28 11:01:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2550: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 31955 >/dev/null 2>/dev/null
selfserv with PID 31955 found at Wed Nov 28 11:01:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2551: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 31955 >/dev/null 2>/dev/null
selfserv with PID 31955 found at Wed Nov 28 11:01:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2552: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 31955 >/dev/null 2>/dev/null
selfserv with PID 31955 found at Wed Nov 28 11:01:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2553: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 31955 >/dev/null 2>/dev/null
selfserv with PID 31955 found at Wed Nov 28 11:01:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2554: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 31955 >/dev/null 2>/dev/null
selfserv with PID 31955 found at Wed Nov 28 11:01:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2555: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 31955 >/dev/null 2>/dev/null
selfserv with PID 31955 found at Wed Nov 28 11:01:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2556: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 31955 >/dev/null 2>/dev/null
selfserv with PID 31955 found at Wed Nov 28 11:01:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2557: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 31955 >/dev/null 2>/dev/null
selfserv with PID 31955 found at Wed Nov 28 11:01:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2558: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 31955 at Wed Nov 28 11:01:44 EST 2012
kill -USR1 31955
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 31955 killed at Wed Nov 28 11:01:44 EST 2012
ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Wed Nov 28 11:01:44 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 32340 >/dev/null 2>/dev/null
selfserv with PID 32340 found at Wed Nov 28 11:01:44 EST 2012
selfserv with PID 32340 started at Wed Nov 28 11:01:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2559: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 32340 >/dev/null 2>/dev/null
selfserv with PID 32340 found at Wed Nov 28 11:01:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2560: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 32340 >/dev/null 2>/dev/null
selfserv with PID 32340 found at Wed Nov 28 11:01:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2561: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 32340 >/dev/null 2>/dev/null
selfserv with PID 32340 found at Wed Nov 28 11:01:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2562: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 32340 >/dev/null 2>/dev/null
selfserv with PID 32340 found at Wed Nov 28 11:01:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2563: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 32340 at Wed Nov 28 11:01:44 EST 2012
kill -USR1 32340
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 32340 killed at Wed Nov 28 11:01:44 EST 2012
ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Wed Nov 28 11:01:44 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 32488 >/dev/null 2>/dev/null
selfserv with PID 32488 found at Wed Nov 28 11:01:44 EST 2012
selfserv with PID 32488 started at Wed Nov 28 11:01:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2564: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 32488 >/dev/null 2>/dev/null
selfserv with PID 32488 found at Wed Nov 28 11:01:45 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2565: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 32488 >/dev/null 2>/dev/null
selfserv with PID 32488 found at Wed Nov 28 11:01:45 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2566: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 32488 >/dev/null 2>/dev/null
selfserv with PID 32488 found at Wed Nov 28 11:01:45 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2567: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 32488 >/dev/null 2>/dev/null
selfserv with PID 32488 found at Wed Nov 28 11:01:45 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2568: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32488 at Wed Nov 28 11:01:45 EST 2012
kill -USR1 32488
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 32488 killed at Wed Nov 28 11:01:45 EST 2012
ssl.sh: SSL Client Authentication  - server fips/client normal  - with ECC ===============================
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:01:45 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:45 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 32687 >/dev/null 2>/dev/null
selfserv with PID 32687 found at Wed Nov 28 11:01:45 EST 2012
selfserv with PID 32687 started at Wed Nov 28 11:01:45 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2569: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32687 at Wed Nov 28 11:01:45 EST 2012
kill -USR1 32687
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 32687 killed at Wed Nov 28 11:01:45 EST 2012
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Wed Nov 28 11:01:45 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:45 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 32744 >/dev/null 2>/dev/null
selfserv with PID 32744 found at Wed Nov 28 11:01:45 EST 2012
selfserv with PID 32744 started at Wed Nov 28 11:01:45 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -w bogus -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2570: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32744 at Wed Nov 28 11:01:46 EST 2012
kill -USR1 32744
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 32744 killed at Wed Nov 28 11:01:46 EST 2012
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Wed Nov 28 11:01:46 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 336 >/dev/null 2>/dev/null
selfserv with PID 336 found at Wed Nov 28 11:01:46 EST 2012
selfserv with PID 336 started at Wed Nov 28 11:01:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -w nss -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2571: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 336 at Wed Nov 28 11:01:46 EST 2012
kill -USR1 336
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 336 killed at Wed Nov 28 11:01:46 EST 2012
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:01:46 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 395 >/dev/null 2>/dev/null
selfserv with PID 395 found at Wed Nov 28 11:01:46 EST 2012
selfserv with PID 395 started at Wed Nov 28 11:01:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2572: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 395 at Wed Nov 28 11:01:46 EST 2012
kill -USR1 395
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 395 killed at Wed Nov 28 11:01:46 EST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Wed Nov 28 11:01:46 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 458 >/dev/null 2>/dev/null
selfserv with PID 458 found at Wed Nov 28 11:01:46 EST 2012
selfserv with PID 458 started at Wed Nov 28 11:01:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -w bogus -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2573: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 458 at Wed Nov 28 11:01:47 EST 2012
kill -USR1 458
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 458 killed at Wed Nov 28 11:01:47 EST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Wed Nov 28 11:01:47 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 528 >/dev/null 2>/dev/null
selfserv with PID 528 found at Wed Nov 28 11:01:47 EST 2012
selfserv with PID 528 started at Wed Nov 28 11:01:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -w nss -n TestUser   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2574: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 528 at Wed Nov 28 11:01:47 EST 2012
kill -USR1 528
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 528 killed at Wed Nov 28 11:01:47 EST 2012
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:01:47 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 600 >/dev/null 2>/dev/null
selfserv with PID 600 found at Wed Nov 28 11:01:47 EST 2012
selfserv with PID 600 started at Wed Nov 28 11:01:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2575: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 600 at Wed Nov 28 11:01:47 EST 2012
kill -USR1 600
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 600 killed at Wed Nov 28 11:01:47 EST 2012
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Wed Nov 28 11:01:47 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 668 >/dev/null 2>/dev/null
selfserv with PID 668 found at Wed Nov 28 11:01:47 EST 2012
selfserv with PID 668 started at Wed Nov 28 11:01:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V :ssl3 -n TestUser -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2576: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 668 at Wed Nov 28 11:01:47 EST 2012
kill -USR1 668
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 668 killed at Wed Nov 28 11:01:47 EST 2012
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Wed Nov 28 11:01:47 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 732 >/dev/null 2>/dev/null
selfserv with PID 732 found at Wed Nov 28 11:01:47 EST 2012
selfserv with PID 732 started at Wed Nov 28 11:01:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V :ssl3 -n TestUser -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2577: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 732 at Wed Nov 28 11:01:48 EST 2012
kill -USR1 732
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 732 killed at Wed Nov 28 11:01:48 EST 2012
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:01:48 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 790 >/dev/null 2>/dev/null
selfserv with PID 790 found at Wed Nov 28 11:01:48 EST 2012
selfserv with PID 790 started at Wed Nov 28 11:01:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2578: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 790 at Wed Nov 28 11:01:48 EST 2012
kill -USR1 790
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 790 killed at Wed Nov 28 11:01:48 EST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Wed Nov 28 11:01:48 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 865 >/dev/null 2>/dev/null
selfserv with PID 865 found at Wed Nov 28 11:01:48 EST 2012
selfserv with PID 865 started at Wed Nov 28 11:01:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V :ssl3 -n TestUser -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2579: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 865 at Wed Nov 28 11:01:48 EST 2012
kill -USR1 865
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 865 killed at Wed Nov 28 11:01:48 EST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Wed Nov 28 11:01:48 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 957 >/dev/null 2>/dev/null
selfserv with PID 957 found at Wed Nov 28 11:01:48 EST 2012
selfserv with PID 957 started at Wed Nov 28 11:01:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V :ssl3 -n TestUser -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2580: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 957 at Wed Nov 28 11:01:49 EST 2012
kill -USR1 957
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 957 killed at Wed Nov 28 11:01:49 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:01:49 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:49 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 1017 >/dev/null 2>/dev/null
selfserv with PID 1017 found at Wed Nov 28 11:01:49 EST 2012
selfserv with PID 1017 started at Wed Nov 28 11:01:49 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2581: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1017 at Wed Nov 28 11:01:49 EST 2012
kill -USR1 1017
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 1017 killed at Wed Nov 28 11:01:49 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:01:49 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:49 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 1074 >/dev/null 2>/dev/null
selfserv with PID 1074 found at Wed Nov 28 11:01:49 EST 2012
selfserv with PID 1074 started at Wed Nov 28 11:01:49 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w bogus -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2582: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1074 at Wed Nov 28 11:01:49 EST 2012
kill -USR1 1074
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 1074 killed at Wed Nov 28 11:01:49 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:01:49 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:49 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 1131 >/dev/null 2>/dev/null
selfserv with PID 1131 found at Wed Nov 28 11:01:49 EST 2012
selfserv with PID 1131 started at Wed Nov 28 11:01:49 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2583: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1131 at Wed Nov 28 11:01:49 EST 2012
kill -USR1 1131
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 1131 killed at Wed Nov 28 11:01:49 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:01:49 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:49 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 1188 >/dev/null 2>/dev/null
selfserv with PID 1188 found at Wed Nov 28 11:01:49 EST 2012
selfserv with PID 1188 started at Wed Nov 28 11:01:49 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2584: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1188 at Wed Nov 28 11:01:50 EST 2012
kill -USR1 1188
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 1188 killed at Wed Nov 28 11:01:50 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:01:50 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:50 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 1245 >/dev/null 2>/dev/null
selfserv with PID 1245 found at Wed Nov 28 11:01:50 EST 2012
selfserv with PID 1245 started at Wed Nov 28 11:01:50 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w bogus -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2585: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1245 at Wed Nov 28 11:01:50 EST 2012
kill -USR1 1245
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 1245 killed at Wed Nov 28 11:01:50 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:01:50 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:50 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 1302 >/dev/null 2>/dev/null
selfserv with PID 1302 found at Wed Nov 28 11:01:50 EST 2012
selfserv with PID 1302 started at Wed Nov 28 11:01:50 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2586: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1302 at Wed Nov 28 11:01:50 EST 2012
kill -USR1 1302
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 1302 killed at Wed Nov 28 11:01:50 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:01:50 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:50 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 1359 >/dev/null 2>/dev/null
selfserv with PID 1359 found at Wed Nov 28 11:01:50 EST 2012
selfserv with PID 1359 started at Wed Nov 28 11:01:50 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2587: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1359 at Wed Nov 28 11:01:51 EST 2012
kill -USR1 1359
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 1359 killed at Wed Nov 28 11:01:51 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:01:51 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:51 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 1416 >/dev/null 2>/dev/null
selfserv with PID 1416 found at Wed Nov 28 11:01:51 EST 2012
selfserv with PID 1416 started at Wed Nov 28 11:01:51 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:tls1.0 -w bogus -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2588: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1416 at Wed Nov 28 11:01:51 EST 2012
kill -USR1 1416
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 1416 killed at Wed Nov 28 11:01:51 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:01:51 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:51 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 1473 >/dev/null 2>/dev/null
selfserv with PID 1473 found at Wed Nov 28 11:01:51 EST 2012
selfserv with PID 1473 started at Wed Nov 28 11:01:51 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2589: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1473 at Wed Nov 28 11:01:51 EST 2012
kill -USR1 1473
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 1473 killed at Wed Nov 28 11:01:51 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:01:51 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:51 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 1530 >/dev/null 2>/dev/null
selfserv with PID 1530 found at Wed Nov 28 11:01:51 EST 2012
selfserv with PID 1530 started at Wed Nov 28 11:01:51 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2590: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1530 at Wed Nov 28 11:01:51 EST 2012
kill -USR1 1530
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 1530 killed at Wed Nov 28 11:01:51 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:01:51 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:51 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 1587 >/dev/null 2>/dev/null
selfserv with PID 1587 found at Wed Nov 28 11:01:52 EST 2012
selfserv with PID 1587 started at Wed Nov 28 11:01:52 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:tls1.0 -w bogus -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2591: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1587 at Wed Nov 28 11:01:52 EST 2012
kill -USR1 1587
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 1587 killed at Wed Nov 28 11:01:52 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:01:52 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:52 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 1644 >/dev/null 2>/dev/null
selfserv with PID 1644 found at Wed Nov 28 11:01:52 EST 2012
selfserv with PID 1644 started at Wed Nov 28 11:01:52 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2592: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1644 at Wed Nov 28 11:01:52 EST 2012
kill -USR1 1644
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 1644 killed at Wed Nov 28 11:01:52 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:01:52 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:52 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 1701 >/dev/null 2>/dev/null
selfserv with PID 1701 found at Wed Nov 28 11:01:52 EST 2012
selfserv with PID 1701 started at Wed Nov 28 11:01:52 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2593: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1701 at Wed Nov 28 11:01:52 EST 2012
kill -USR1 1701
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 1701 killed at Wed Nov 28 11:01:52 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:01:52 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:52 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 1758 >/dev/null 2>/dev/null
selfserv with PID 1758 found at Wed Nov 28 11:01:52 EST 2012
selfserv with PID 1758 started at Wed Nov 28 11:01:52 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2594: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1758 at Wed Nov 28 11:01:53 EST 2012
kill -USR1 1758
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 1758 killed at Wed Nov 28 11:01:53 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:01:53 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:53 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 1815 >/dev/null 2>/dev/null
selfserv with PID 1815 found at Wed Nov 28 11:01:53 EST 2012
selfserv with PID 1815 started at Wed Nov 28 11:01:53 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2595: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1815 at Wed Nov 28 11:01:53 EST 2012
kill -USR1 1815
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 1815 killed at Wed Nov 28 11:01:53 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:01:53 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:53 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 1873 >/dev/null 2>/dev/null
selfserv with PID 1873 found at Wed Nov 28 11:01:53 EST 2012
selfserv with PID 1873 started at Wed Nov 28 11:01:53 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2596: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1873 at Wed Nov 28 11:01:53 EST 2012
kill -USR1 1873
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 1873 killed at Wed Nov 28 11:01:53 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:01:53 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:53 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 1930 >/dev/null 2>/dev/null
selfserv with PID 1930 found at Wed Nov 28 11:01:53 EST 2012
selfserv with PID 1930 started at Wed Nov 28 11:01:53 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2597: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1930 at Wed Nov 28 11:01:53 EST 2012
kill -USR1 1930
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 1930 killed at Wed Nov 28 11:01:53 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:01:53 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:53 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 1987 >/dev/null 2>/dev/null
selfserv with PID 1987 found at Wed Nov 28 11:01:53 EST 2012
selfserv with PID 1987 started at Wed Nov 28 11:01:53 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2598: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1987 at Wed Nov 28 11:01:54 EST 2012
kill -USR1 1987
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 1987 killed at Wed Nov 28 11:01:54 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:01:54 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:54 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 2059 >/dev/null 2>/dev/null
selfserv with PID 2059 found at Wed Nov 28 11:01:54 EST 2012
selfserv with PID 2059 started at Wed Nov 28 11:01:54 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -w bogus -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2599: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2059 at Wed Nov 28 11:01:54 EST 2012
kill -USR1 2059
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 2059 killed at Wed Nov 28 11:01:54 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:01:54 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:54 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 2116 >/dev/null 2>/dev/null
selfserv with PID 2116 found at Wed Nov 28 11:01:54 EST 2012
selfserv with PID 2116 started at Wed Nov 28 11:01:54 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -w nss -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2600: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2116 at Wed Nov 28 11:01:54 EST 2012
kill -USR1 2116
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 2116 killed at Wed Nov 28 11:01:54 EST 2012
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:01:54 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:54 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 2174 >/dev/null 2>/dev/null
selfserv with PID 2174 found at Wed Nov 28 11:01:54 EST 2012
selfserv with PID 2174 started at Wed Nov 28 11:01:54 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -w bogus -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2601: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2174 at Wed Nov 28 11:01:55 EST 2012
kill -USR1 2174
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 2174 killed at Wed Nov 28 11:01:55 EST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:01:55 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:55 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 2231 >/dev/null 2>/dev/null
selfserv with PID 2231 found at Wed Nov 28 11:01:55 EST 2012
selfserv with PID 2231 started at Wed Nov 28 11:01:55 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -w nss -n TestUser-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2602: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2231 at Wed Nov 28 11:01:55 EST 2012
kill -USR1 2231
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 2231 killed at Wed Nov 28 11:01:55 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:01:55 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:55 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 2289 >/dev/null 2>/dev/null
selfserv with PID 2289 found at Wed Nov 28 11:01:55 EST 2012
selfserv with PID 2289 started at Wed Nov 28 11:01:55 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V :ssl3 -n TestUser-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2603: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2289 at Wed Nov 28 11:01:55 EST 2012
kill -USR1 2289
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 2289 killed at Wed Nov 28 11:01:55 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:01:55 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:55 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 2346 >/dev/null 2>/dev/null
selfserv with PID 2346 found at Wed Nov 28 11:01:55 EST 2012
selfserv with PID 2346 started at Wed Nov 28 11:01:55 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V :ssl3 -n TestUser-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2604: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2346 at Wed Nov 28 11:01:56 EST 2012
kill -USR1 2346
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 2346 killed at Wed Nov 28 11:01:56 EST 2012
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:01:56 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:56 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 2403 >/dev/null 2>/dev/null
selfserv with PID 2403 found at Wed Nov 28 11:01:56 EST 2012
selfserv with PID 2403 started at Wed Nov 28 11:01:56 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V :ssl3 -n TestUser-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2605: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2403 at Wed Nov 28 11:01:56 EST 2012
kill -USR1 2403
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 2403 killed at Wed Nov 28 11:01:56 EST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:01:56 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:56 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 2460 >/dev/null 2>/dev/null
selfserv with PID 2460 found at Wed Nov 28 11:01:56 EST 2012
selfserv with PID 2460 started at Wed Nov 28 11:01:56 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V :ssl3 -n TestUser-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2606: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2460 at Wed Nov 28 11:01:56 EST 2012
kill -USR1 2460
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 2460 killed at Wed Nov 28 11:01:56 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:01:56 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:56 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 2517 >/dev/null 2>/dev/null
selfserv with PID 2517 found at Wed Nov 28 11:01:56 EST 2012
selfserv with PID 2517 started at Wed Nov 28 11:01:56 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w bogus -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2607: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2517 at Wed Nov 28 11:01:57 EST 2012
kill -USR1 2517
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 2517 killed at Wed Nov 28 11:01:57 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:01:57 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:57 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 2574 >/dev/null 2>/dev/null
selfserv with PID 2574 found at Wed Nov 28 11:01:57 EST 2012
selfserv with PID 2574 started at Wed Nov 28 11:01:57 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2608: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2574 at Wed Nov 28 11:01:57 EST 2012
kill -USR1 2574
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 2574 killed at Wed Nov 28 11:01:57 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:01:57 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:57 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 2632 >/dev/null 2>/dev/null
selfserv with PID 2632 found at Wed Nov 28 11:01:57 EST 2012
selfserv with PID 2632 started at Wed Nov 28 11:01:57 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w bogus -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2609: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2632 at Wed Nov 28 11:01:57 EST 2012
kill -USR1 2632
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 2632 killed at Wed Nov 28 11:01:57 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:01:57 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:57 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 2689 >/dev/null 2>/dev/null
selfserv with PID 2689 found at Wed Nov 28 11:01:57 EST 2012
selfserv with PID 2689 started at Wed Nov 28 11:01:57 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2610: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2689 at Wed Nov 28 11:01:58 EST 2012
kill -USR1 2689
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 2689 killed at Wed Nov 28 11:01:58 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:01:58 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:58 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 2746 >/dev/null 2>/dev/null
selfserv with PID 2746 found at Wed Nov 28 11:01:58 EST 2012
selfserv with PID 2746 started at Wed Nov 28 11:01:58 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:tls1.0 -w bogus -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2611: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2746 at Wed Nov 28 11:01:58 EST 2012
kill -USR1 2746
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 2746 killed at Wed Nov 28 11:01:58 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:01:58 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:58 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 2803 >/dev/null 2>/dev/null
selfserv with PID 2803 found at Wed Nov 28 11:01:58 EST 2012
selfserv with PID 2803 started at Wed Nov 28 11:01:58 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2612: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2803 at Wed Nov 28 11:01:58 EST 2012
kill -USR1 2803
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 2803 killed at Wed Nov 28 11:01:58 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:01:58 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:58 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 2860 >/dev/null 2>/dev/null
selfserv with PID 2860 found at Wed Nov 28 11:01:58 EST 2012
selfserv with PID 2860 started at Wed Nov 28 11:01:58 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:tls1.0 -w bogus -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2613: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2860 at Wed Nov 28 11:01:59 EST 2012
kill -USR1 2860
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 2860 killed at Wed Nov 28 11:01:59 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:01:59 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:59 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 2917 >/dev/null 2>/dev/null
selfserv with PID 2917 found at Wed Nov 28 11:01:59 EST 2012
selfserv with PID 2917 started at Wed Nov 28 11:01:59 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n TestUser-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2614: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2917 at Wed Nov 28 11:01:59 EST 2012
kill -USR1 2917
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 2917 killed at Wed Nov 28 11:01:59 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:01:59 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:59 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 2974 >/dev/null 2>/dev/null
selfserv with PID 2974 found at Wed Nov 28 11:01:59 EST 2012
selfserv with PID 2974 started at Wed Nov 28 11:01:59 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2615: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2974 at Wed Nov 28 11:01:59 EST 2012
kill -USR1 2974
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 2974 killed at Wed Nov 28 11:01:59 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:01:59 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:01:59 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 3032 >/dev/null 2>/dev/null
selfserv with PID 3032 found at Wed Nov 28 11:01:59 EST 2012
selfserv with PID 3032 started at Wed Nov 28 11:01:59 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2616: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3032 at Wed Nov 28 11:02:00 EST 2012
kill -USR1 3032
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 3032 killed at Wed Nov 28 11:02:00 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:02:00 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:00 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 3090 >/dev/null 2>/dev/null
selfserv with PID 3090 found at Wed Nov 28 11:02:00 EST 2012
selfserv with PID 3090 started at Wed Nov 28 11:02:00 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2617: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3090 at Wed Nov 28 11:02:00 EST 2012
kill -USR1 3090
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 3090 killed at Wed Nov 28 11:02:00 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:02:00 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:00 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 3147 >/dev/null 2>/dev/null
selfserv with PID 3147 found at Wed Nov 28 11:02:00 EST 2012
selfserv with PID 3147 started at Wed Nov 28 11:02:00 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2618: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3147 at Wed Nov 28 11:02:00 EST 2012
kill -USR1 3147
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 3147 killed at Wed Nov 28 11:02:00 EST 2012
ssl.sh: TLS Server hello response without SNI ----
selfserv starting at Wed Nov 28 11:02:00 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:00 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 3226 >/dev/null 2>/dev/null
selfserv with PID 3226 found at Wed Nov 28 11:02:00 EST 2012
selfserv with PID 3226 started at Wed Nov 28 11:02:00 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2619: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3226 at Wed Nov 28 11:02:00 EST 2012
kill -USR1 3226
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 3226 killed at Wed Nov 28 11:02:00 EST 2012
ssl.sh: TLS Server hello response with SNI ----
selfserv starting at Wed Nov 28 11:02:00 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:00 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 3289 >/dev/null 2>/dev/null
selfserv with PID 3289 found at Wed Nov 28 11:02:00 EST 2012
selfserv with PID 3289 started at Wed Nov 28 11:02:00 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser -a buildnss02-sni.usersys.redhat.com  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02-sni.usersys.redhat.com,E=buildnss02-sni.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2620: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3289 at Wed Nov 28 11:02:01 EST 2012
kill -USR1 3289
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 3289 killed at Wed Nov 28 11:02:01 EST 2012
ssl.sh: TLS Server response with alert ----
selfserv starting at Wed Nov 28 11:02:01 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:01 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 3352 >/dev/null 2>/dev/null
selfserv with PID 3352 found at Wed Nov 28 11:02:01 EST 2012
selfserv with PID 3352 started at Wed Nov 28 11:02:01 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser -a buildnss02-sni1.usersys.redhat.com  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 254
ssl.sh: #2621: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3352 at Wed Nov 28 11:02:01 EST 2012
kill -USR1 3352
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 3352 killed at Wed Nov 28 11:02:01 EST 2012
ssl.sh: SSL3 Server hello response without SNI ----
selfserv starting at Wed Nov 28 11:02:01 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:01 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 3417 >/dev/null 2>/dev/null
selfserv with PID 3417 found at Wed Nov 28 11:02:01 EST 2012
selfserv with PID 3417 started at Wed Nov 28 11:02:01 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:ssl3 -w nss -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2622: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3417 at Wed Nov 28 11:02:01 EST 2012
kill -USR1 3417
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 3417 killed at Wed Nov 28 11:02:01 EST 2012
ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ----
selfserv starting at Wed Nov 28 11:02:01 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:01 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 3488 >/dev/null 2>/dev/null
selfserv with PID 3488 found at Wed Nov 28 11:02:01 EST 2012
selfserv with PID 3488 started at Wed Nov 28 11:02:01 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:ssl3 -w nss -n TestUser -a buildnss02-sni.usersys.redhat.com  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12271:
SSL peer cannot verify your certificate.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: authentication of server cert failed: Unable to communicate securely with peer: requested domain name does not match the server's certificate.
tstclnt: exiting with return code 254
ssl.sh: #2623: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3488 at Wed Nov 28 11:02:02 EST 2012
kill -USR1 3488
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 3488 killed at Wed Nov 28 11:02:02 EST 2012
ssl.sh: TLS Server hello response without SNI ----
selfserv starting at Wed Nov 28 11:02:02 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:02 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 3551 >/dev/null 2>/dev/null
selfserv with PID 3551 found at Wed Nov 28 11:02:02 EST 2012
selfserv with PID 3551 started at Wed Nov 28 11:02:02 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2624: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3551 at Wed Nov 28 11:02:02 EST 2012
kill -USR1 3551
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 3551 killed at Wed Nov 28 11:02:02 EST 2012
ssl.sh: TLS Server hello response with SNI ----
selfserv starting at Wed Nov 28 11:02:02 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:02 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 3614 >/dev/null 2>/dev/null
selfserv with PID 3614 found at Wed Nov 28 11:02:02 EST 2012
selfserv with PID 3614 started at Wed Nov 28 11:02:02 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser -a buildnss02-sni.usersys.redhat.com  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02-sni.usersys.redhat.com,E=buildnss02-sni.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02-sni.usersys.redhat.com,E=buildnss02-sni.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2625: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3614 at Wed Nov 28 11:02:02 EST 2012
kill -USR1 3614
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 3614 killed at Wed Nov 28 11:02:02 EST 2012
ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ----
selfserv starting at Wed Nov 28 11:02:02 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:02 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 3677 >/dev/null 2>/dev/null
selfserv with PID 3677 found at Wed Nov 28 11:02:02 EST 2012
selfserv with PID 3677 started at Wed Nov 28 11:02:02 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser -a buildnss02-sni.usersys.redhat.com -a buildnss02.usersys.redhat.com  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02-sni.usersys.redhat.com,E=buildnss02-sni.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: Cannot communicate securely with peer: no common encryption algorithm(s).
tstclnt: exiting with return code 1
ssl.sh: #2626: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3677 at Wed Nov 28 11:02:02 EST 2012
kill -USR1 3677
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 3677 killed at Wed Nov 28 11:02:02 EST 2012
ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ----
selfserv starting at Wed Nov 28 11:02:03 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:03 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 3740 >/dev/null 2>/dev/null
selfserv with PID 3740 found at Wed Nov 28 11:02:03 EST 2012
selfserv with PID 3740 started at Wed Nov 28 11:02:03 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser -a buildnss02-sni.usersys.redhat.com -a buildnss02-sni1.usersys.redhat.com  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02-sni.usersys.redhat.com,E=buildnss02-sni.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 1
ssl.sh: #2627: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3740 at Wed Nov 28 11:02:03 EST 2012
kill -USR1 3740
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 3740 killed at Wed Nov 28 11:02:03 EST 2012
ssl.sh: TLS Server response with alert ----
selfserv starting at Wed Nov 28 11:02:03 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:03 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 3803 >/dev/null 2>/dev/null
selfserv with PID 3803 found at Wed Nov 28 11:02:03 EST 2012
selfserv with PID 3803 started at Wed Nov 28 11:02:03 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser -a buildnss02-sni1.usersys.redhat.com  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 254
ssl.sh: #2628: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3803 at Wed Nov 28 11:02:03 EST 2012
kill -USR1 3803
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 3803 killed at Wed Nov 28 11:02:03 EST 2012
ssl.sh: SSL Stress Test  - server fips/client normal  - with ECC ===============================
ssl.sh: skipping  Stress SSL2 RC4 128 with MD5 (non-FIPS only)
ssl.sh: Stress SSL3 RC4 128 with MD5 ----
selfserv starting at Wed Nov 28 11:02:03 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:03 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 3939 >/dev/null 2>/dev/null
selfserv with PID 3939 found at Wed Nov 28 11:02:03 EST 2012
selfserv with PID 3939 started at Wed Nov 28 11:02:03 EST 2012
strsclnt -q -p 8546 -d ../client  -w nss -c 1000 -C c -V :ssl3 \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:02:03 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:02:04 EST 2012
ssl.sh: #2629: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 3939 at Wed Nov 28 11:02:04 EST 2012
kill -USR1 3939
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 3939 killed at Wed Nov 28 11:02:04 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 ----
selfserv starting at Wed Nov 28 11:02:04 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:04 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 4015 >/dev/null 2>/dev/null
selfserv with PID 4015 found at Wed Nov 28 11:02:04 EST 2012
selfserv with PID 4015 started at Wed Nov 28 11:02:04 EST 2012
strsclnt -q -p 8546 -d ../client  -w nss -c 1000 -C c \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:02:04 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:02:04 EST 2012
ssl.sh: #2630: Stress TLS  RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 4015 at Wed Nov 28 11:02:04 EST 2012
kill -USR1 4015
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 4015 killed at Wed Nov 28 11:02:04 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (false start) ----
selfserv starting at Wed Nov 28 11:02:04 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:04 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 4091 >/dev/null 2>/dev/null
selfserv with PID 4091 found at Wed Nov 28 11:02:04 EST 2012
selfserv with PID 4091 started at Wed Nov 28 11:02:04 EST 2012
strsclnt -q -p 8546 -d ../client  -w nss -c 1000 -C c -g \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:02:04 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:02:05 EST 2012
ssl.sh: #2631: Stress TLS  RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 4091 at Wed Nov 28 11:02:05 EST 2012
kill -USR1 4091
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 4091 killed at Wed Nov 28 11:02:05 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket) ----
selfserv starting at Wed Nov 28 11:02:05 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:05 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 4167 >/dev/null 2>/dev/null
selfserv with PID 4167 found at Wed Nov 28 11:02:05 EST 2012
selfserv with PID 4167 started at Wed Nov 28 11:02:05 EST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V ssl3: -c 1000 -C c -u \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:02:05 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Wed Nov 28 11:02:05 EST 2012
ssl.sh: #2632: Stress TLS  RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 4167 at Wed Nov 28 11:02:05 EST 2012
kill -USR1 4167
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 4167 killed at Wed Nov 28 11:02:05 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (compression) ----
selfserv starting at Wed Nov 28 11:02:05 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:05 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 4243 >/dev/null 2>/dev/null
selfserv with PID 4243 found at Wed Nov 28 11:02:05 EST 2012
selfserv with PID 4243 started at Wed Nov 28 11:02:05 EST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V ssl3: -c 1000 -C c -z \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:02:05 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:02:06 EST 2012
ssl.sh: #2633: Stress TLS  RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 4243 at Wed Nov 28 11:02:06 EST 2012
kill -USR1 4243
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 4243 killed at Wed Nov 28 11:02:06 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression) ----
selfserv starting at Wed Nov 28 11:02:06 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:06 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 4319 >/dev/null 2>/dev/null
selfserv with PID 4319 found at Wed Nov 28 11:02:06 EST 2012
selfserv with PID 4319 started at Wed Nov 28 11:02:06 EST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V ssl3: -c 1000 -C c -u -z \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:02:06 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Wed Nov 28 11:02:06 EST 2012
ssl.sh: #2634: Stress TLS  RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 4319 at Wed Nov 28 11:02:06 EST 2012
kill -USR1 4319
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 4319 killed at Wed Nov 28 11:02:06 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) ----
selfserv starting at Wed Nov 28 11:02:06 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:06 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 4395 >/dev/null 2>/dev/null
selfserv with PID 4395 found at Wed Nov 28 11:02:08 EST 2012
selfserv with PID 4395 started at Wed Nov 28 11:02:08 EST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V ssl3: -c 1000 -C c -u -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:02:08 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Wed Nov 28 11:02:08 EST 2012
ssl.sh: #2635: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 4395 at Wed Nov 28 11:02:08 EST 2012
kill -USR1 4395
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 4395 killed at Wed Nov 28 11:02:08 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI) ----
selfserv starting at Wed Nov 28 11:02:09 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:09 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 4477 >/dev/null 2>/dev/null
selfserv with PID 4477 found at Wed Nov 28 11:02:09 EST 2012
selfserv with PID 4477 started at Wed Nov 28 11:02:09 EST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V tls1.0: -c 1000 -C c -u \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:02:09 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Wed Nov 28 11:02:09 EST 2012
ssl.sh: #2636: Stress TLS RC4 128 with MD5 (session ticket, SNI) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 4477 at Wed Nov 28 11:02:09 EST 2012
kill -USR1 4477
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 4477 killed at Wed Nov 28 11:02:09 EST 2012
ssl.sh: skipping  Stress SSL2 RC4 128 with MD5 (no reuse, client auth) (non-FIPS only)
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Wed Nov 28 11:02:09 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:09 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 4578 >/dev/null 2>/dev/null
selfserv with PID 4578 found at Wed Nov 28 11:02:09 EST 2012
selfserv with PID 4578 started at Wed Nov 28 11:02:09 EST 2012
strsclnt -q -p 8546 -d ../client  -w nss -c 100 -C c -V :ssl3 -N -n TestUser \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:02:09 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed Nov 28 11:02:10 EST 2012
ssl.sh: #2637: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 4578 at Wed Nov 28 11:02:10 EST 2012
kill -USR1 4578
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 4578 killed at Wed Nov 28 11:02:10 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Wed Nov 28 11:02:10 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:10 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 4653 >/dev/null 2>/dev/null
selfserv with PID 4653 found at Wed Nov 28 11:02:10 EST 2012
selfserv with PID 4653 started at Wed Nov 28 11:02:10 EST 2012
strsclnt -q -p 8546 -d ../client  -w nss -c 100 -C c -N -n TestUser \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:02:10 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed Nov 28 11:02:10 EST 2012
ssl.sh: #2638: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 4653 at Wed Nov 28 11:02:10 EST 2012
kill -USR1 4653
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 4653 killed at Wed Nov 28 11:02:10 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Wed Nov 28 11:02:10 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:10 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 4728 >/dev/null 2>/dev/null
selfserv with PID 4728 found at Wed Nov 28 11:02:10 EST 2012
selfserv with PID 4728 started at Wed Nov 28 11:02:10 EST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V ssl3: -c 100 -C c -n TestUser -u \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:02:10 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Wed Nov 28 11:02:10 EST 2012
ssl.sh: #2639: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 4728 at Wed Nov 28 11:02:10 EST 2012
kill -USR1 4728
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 4728 killed at Wed Nov 28 11:02:10 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Wed Nov 28 11:02:11 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:11 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 4804 >/dev/null 2>/dev/null
selfserv with PID 4804 found at Wed Nov 28 11:02:11 EST 2012
selfserv with PID 4804 started at Wed Nov 28 11:02:11 EST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V ssl3: -c 100 -C c -n TestUser -z \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:02:11 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:02:11 EST 2012
ssl.sh: #2640: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 4804 at Wed Nov 28 11:02:11 EST 2012
kill -USR1 4804
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 4804 killed at Wed Nov 28 11:02:11 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Wed Nov 28 11:02:11 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:11 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 4881 >/dev/null 2>/dev/null
selfserv with PID 4881 found at Wed Nov 28 11:02:11 EST 2012
selfserv with PID 4881 started at Wed Nov 28 11:02:11 EST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V ssl3: -c 100 -C c -n TestUser -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:02:11 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:02:11 EST 2012
ssl.sh: #2641: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 4881 at Wed Nov 28 11:02:11 EST 2012
kill -USR1 4881
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 4881 killed at Wed Nov 28 11:02:11 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Wed Nov 28 11:02:11 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:11 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 4957 >/dev/null 2>/dev/null
selfserv with PID 4957 found at Wed Nov 28 11:02:11 EST 2012
selfserv with PID 4957 started at Wed Nov 28 11:02:11 EST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V ssl3: -c 100 -C c -n TestUser -u -z \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:02:11 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Wed Nov 28 11:02:12 EST 2012
ssl.sh: #2642: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 4957 at Wed Nov 28 11:02:12 EST 2012
kill -USR1 4957
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 4957 killed at Wed Nov 28 11:02:12 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Wed Nov 28 11:02:12 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:12 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 5033 >/dev/null 2>/dev/null
selfserv with PID 5033 found at Wed Nov 28 11:02:12 EST 2012
selfserv with PID 5033 started at Wed Nov 28 11:02:12 EST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V ssl3: -c 100 -C c -n TestUser -u -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:02:12 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Wed Nov 28 11:02:12 EST 2012
ssl.sh: #2643: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 5033 at Wed Nov 28 11:02:12 EST 2012
kill -USR1 5033
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 5033 killed at Wed Nov 28 11:02:12 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ----
selfserv starting at Wed Nov 28 11:02:12 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:12 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 5115 >/dev/null 2>/dev/null
selfserv with PID 5115 found at Wed Nov 28 11:02:12 EST 2012
selfserv with PID 5115 started at Wed Nov 28 11:02:12 EST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V tls1.0: -c 1000 -C c -u \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:02:12 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Wed Nov 28 11:02:12 EST 2012
ssl.sh: #2644: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 5115 at Wed Nov 28 11:02:13 EST 2012
kill -USR1 5115
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 5115 killed at Wed Nov 28 11:02:13 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ----
selfserv starting at Wed Nov 28 11:02:13 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -a buildnss02-sni.usersys.redhat.com -k buildnss02-sni.usersys.redhat.com -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:13 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 5197 >/dev/null 2>/dev/null
selfserv with PID 5197 found at Wed Nov 28 11:02:13 EST 2012
selfserv with PID 5197 started at Wed Nov 28 11:02:13 EST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V tls1.0: -c 1000 -C c -u -a buildnss02-sni.usersys.redhat.com \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:02:13 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Wed Nov 28 11:02:13 EST 2012
ssl.sh: #2645: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 5197 at Wed Nov 28 11:02:13 EST 2012
kill -USR1 5197
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 5197 killed at Wed Nov 28 11:02:13 EST 2012
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Wed Nov 28 11:02:13 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C009 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:13 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 5294 >/dev/null 2>/dev/null
selfserv with PID 5294 found at Wed Nov 28 11:02:13 EST 2012
selfserv with PID 5294 started at Wed Nov 28 11:02:13 EST 2012
strsclnt -q -p 8546 -d ../client  -w nss -c 100 -C :C009 -N -V :ssl3 \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:02:13 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed Nov 28 11:02:14 EST 2012
ssl.sh: #2646: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 5294 at Wed Nov 28 11:02:14 EST 2012
kill -USR1 5294
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 5294 killed at Wed Nov 28 11:02:14 EST 2012
ssl.sh: Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Wed Nov 28 11:02:14 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C013 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:14 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 5369 >/dev/null 2>/dev/null
selfserv with PID 5369 found at Wed Nov 28 11:02:14 EST 2012
selfserv with PID 5369 started at Wed Nov 28 11:02:14 EST 2012
strsclnt -q -p 8546 -d ../client  -w nss -c 1000 -C :C013 -V :ssl3 \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:02:14 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:02:15 EST 2012
ssl.sh: #2647: Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 5369 at Wed Nov 28 11:02:15 EST 2012
kill -USR1 5369
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 5369 killed at Wed Nov 28 11:02:15 EST 2012
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) ----
selfserv starting at Wed Nov 28 11:02:15 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C004 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:15 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 5445 >/dev/null 2>/dev/null
selfserv with PID 5445 found at Wed Nov 28 11:02:15 EST 2012
selfserv with PID 5445 started at Wed Nov 28 11:02:15 EST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V ssl3: -c 100 -C :C004 -N \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:02:15 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed Nov 28 11:02:16 EST 2012
ssl.sh: #2648: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 5445 at Wed Nov 28 11:02:16 EST 2012
kill -USR1 5445
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 5445 killed at Wed Nov 28 11:02:16 EST 2012
ssl.sh: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) ----
selfserv starting at Wed Nov 28 11:02:16 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c :C00E -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:16 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 5520 >/dev/null 2>/dev/null
selfserv with PID 5520 found at Wed Nov 28 11:02:16 EST 2012
selfserv with PID 5520 started at Wed Nov 28 11:02:16 EST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V ssl3: -c 100 -C :C00E -N \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:02:16 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed Nov 28 11:02:17 EST 2012
ssl.sh: #2649: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 5520 at Wed Nov 28 11:02:17 EST 2012
kill -USR1 5520
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 5520 killed at Wed Nov 28 11:02:17 EST 2012
ssl.sh: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Wed Nov 28 11:02:17 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C013 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:17 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 5595 >/dev/null 2>/dev/null
selfserv with PID 5595 found at Wed Nov 28 11:02:17 EST 2012
selfserv with PID 5595 started at Wed Nov 28 11:02:17 EST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V ssl3: -c 1000 -C :C013 \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:02:17 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:02:17 EST 2012
ssl.sh: #2650: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 5595 at Wed Nov 28 11:02:17 EST 2012
kill -USR1 5595
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 5595 killed at Wed Nov 28 11:02:17 EST 2012
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) ----
selfserv starting at Wed Nov 28 11:02:17 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C004 -u -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:17 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 5671 >/dev/null 2>/dev/null
selfserv with PID 5671 found at Wed Nov 28 11:02:17 EST 2012
selfserv with PID 5671 started at Wed Nov 28 11:02:17 EST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V ssl3: -c 1000 -C :C004 -u \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:02:17 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Wed Nov 28 11:02:18 EST 2012
ssl.sh: #2651: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 5671 at Wed Nov 28 11:02:18 EST 2012
kill -USR1 5671
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 5671 killed at Wed Nov 28 11:02:18 EST 2012
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Wed Nov 28 11:02:18 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C009 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:18 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 5768 >/dev/null 2>/dev/null
selfserv with PID 5768 found at Wed Nov 28 11:02:18 EST 2012
selfserv with PID 5768 started at Wed Nov 28 11:02:18 EST 2012
strsclnt -q -p 8546 -d ../client  -w nss -c 10 -C :C009 -N -V :ssl3 -n TestUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:02:18 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Wed Nov 28 11:02:18 EST 2012
ssl.sh: #2652: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 5768 at Wed Nov 28 11:02:18 EST 2012
kill -USR1 5768
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 5768 killed at Wed Nov 28 11:02:18 EST 2012
ssl.sh: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) ----
selfserv starting at Wed Nov 28 11:02:18 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:18 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 5843 >/dev/null 2>/dev/null
selfserv with PID 5843 found at Wed Nov 28 11:02:18 EST 2012
selfserv with PID 5843 started at Wed Nov 28 11:02:18 EST 2012
strsclnt -q -p 8546 -d ../client  -w nss -c 100 -C :C013 -V :ssl3 -n TestUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:02:18 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:02:19 EST 2012
ssl.sh: #2653: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 5843 at Wed Nov 28 11:02:19 EST 2012
kill -USR1 5843
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 5843 killed at Wed Nov 28 11:02:19 EST 2012
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Wed Nov 28 11:02:19 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C004 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:19 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 5919 >/dev/null 2>/dev/null
selfserv with PID 5919 found at Wed Nov 28 11:02:19 EST 2012
selfserv with PID 5919 started at Wed Nov 28 11:02:19 EST 2012
strsclnt -q -p 8546 -d ../client  -w nss -c 10 -C :C004 -N -n TestUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:02:19 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Wed Nov 28 11:02:19 EST 2012
ssl.sh: #2654: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 5919 at Wed Nov 28 11:02:19 EST 2012
kill -USR1 5919
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 5919 killed at Wed Nov 28 11:02:19 EST 2012
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Wed Nov 28 11:02:19 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -r -r -c :C00E -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:19 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 5994 >/dev/null 2>/dev/null
selfserv with PID 5994 found at Wed Nov 28 11:02:19 EST 2012
selfserv with PID 5994 started at Wed Nov 28 11:02:19 EST 2012
strsclnt -q -p 8546 -d ../client  -w nss -c 10 -C :C00E -N -n TestUser-ecmixed \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:02:19 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Wed Nov 28 11:02:20 EST 2012
ssl.sh: #2655: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 5994 at Wed Nov 28 11:02:20 EST 2012
kill -USR1 5994
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 5994 killed at Wed Nov 28 11:02:20 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ----
selfserv starting at Wed Nov 28 11:02:20 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:20 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 6069 >/dev/null 2>/dev/null
selfserv with PID 6069 found at Wed Nov 28 11:02:20 EST 2012
selfserv with PID 6069 started at Wed Nov 28 11:02:20 EST 2012
strsclnt -q -p 8546 -d ../client  -w nss -c 100 -C :C013 -n TestUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:02:20 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:02:20 EST 2012
ssl.sh: #2656: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 6069 at Wed Nov 28 11:02:20 EST 2012
kill -USR1 6069
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 6069 killed at Wed Nov 28 11:02:20 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ----
selfserv starting at Wed Nov 28 11:02:20 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -u -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:20 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 6146 >/dev/null 2>/dev/null
selfserv with PID 6146 found at Wed Nov 28 11:02:20 EST 2012
selfserv with PID 6146 started at Wed Nov 28 11:02:20 EST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec -u \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:02:20 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Wed Nov 28 11:02:20 EST 2012
ssl.sh: #2657: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 6146 at Wed Nov 28 11:02:20 EST 2012
kill -USR1 6146
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 6146 killed at Wed Nov 28 11:02:20 EST 2012
ssl.sh: SSL Cipher Coverage Extended Test - server fips/client normal  - with ECC ===============================
selfserv starting at Wed Nov 28 11:02:20 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:20 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 6209 >/dev/null 2>/dev/null
selfserv with PID 6209 found at Wed Nov 28 11:02:20 EST 2012
selfserv with PID 6209 started at Wed Nov 28 11:02:20 EST 2012
ssl.sh: skipping  SSL2_RC4_128_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC2_128_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_DES_64_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_DES_192_EDE3_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC2_128_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_DES_64_CBC_WITH_MD5 for Extended Test
ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 6209 >/dev/null 2>/dev/null
selfserv with PID 6209 found at Wed Nov 28 11:02:21 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c c -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2658: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 6209 >/dev/null 2>/dev/null
selfserv with PID 6209 found at Wed Nov 28 11:02:21 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c d -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2659: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 6209 >/dev/null 2>/dev/null
selfserv with PID 6209 found at Wed Nov 28 11:02:21 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c e -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2660: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ----------------------------
kill -0 6209 >/dev/null 2>/dev/null
selfserv with PID 6209 found at Wed Nov 28 11:02:21 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c i -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2661: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 6209 >/dev/null 2>/dev/null
selfserv with PID 6209 found at Wed Nov 28 11:02:21 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c j -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2662: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 6209 >/dev/null 2>/dev/null
selfserv with PID 6209 found at Wed Nov 28 11:02:21 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c k -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2663: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 6209 >/dev/null 2>/dev/null
selfserv with PID 6209 found at Wed Nov 28 11:02:21 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c n -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2664: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 6209 >/dev/null 2>/dev/null
selfserv with PID 6209 found at Wed Nov 28 11:02:21 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c v -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2665: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 6209 >/dev/null 2>/dev/null
selfserv with PID 6209 found at Wed Nov 28 11:02:21 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c y -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2666: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_SHA ----------------------------
kill -0 6209 >/dev/null 2>/dev/null
selfserv with PID 6209 found at Wed Nov 28 11:02:21 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c z -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2667: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 6209 >/dev/null 2>/dev/null
selfserv with PID 6209 found at Wed Nov 28 11:02:21 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c c -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2668: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 6209 >/dev/null 2>/dev/null
selfserv with PID 6209 found at Wed Nov 28 11:02:21 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c d -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2669: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 6209 >/dev/null 2>/dev/null
selfserv with PID 6209 found at Wed Nov 28 11:02:21 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c e -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2670: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running TLS_RSA_WITH_NULL_MD5 ----------------------------
kill -0 6209 >/dev/null 2>/dev/null
selfserv with PID 6209 found at Wed Nov 28 11:02:21 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c i -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2671: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 6209 >/dev/null 2>/dev/null
selfserv with PID 6209 found at Wed Nov 28 11:02:22 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c j -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2672: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 6209 >/dev/null 2>/dev/null
selfserv with PID 6209 found at Wed Nov 28 11:02:22 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c k -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2673: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 6209 >/dev/null 2>/dev/null
selfserv with PID 6209 found at Wed Nov 28 11:02:22 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c n -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2674: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 6209 >/dev/null 2>/dev/null
selfserv with PID 6209 found at Wed Nov 28 11:02:22 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c v -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2675: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 6209 >/dev/null 2>/dev/null
selfserv with PID 6209 found at Wed Nov 28 11:02:22 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c y -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2676: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_SHA ----------------------------
kill -0 6209 >/dev/null 2>/dev/null
selfserv with PID 6209 found at Wed Nov 28 11:02:22 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c z -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2677: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 6209 >/dev/null 2>/dev/null
selfserv with PID 6209 found at Wed Nov 28 11:02:22 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c c -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2678: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 6209 >/dev/null 2>/dev/null
selfserv with PID 6209 found at Wed Nov 28 11:02:22 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c d -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2679: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 6209 >/dev/null 2>/dev/null
selfserv with PID 6209 found at Wed Nov 28 11:02:22 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c e -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2680: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  f    TLS11_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping  g    TLS11_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ----------------------------
kill -0 6209 >/dev/null 2>/dev/null
selfserv with PID 6209 found at Wed Nov 28 11:02:22 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c i -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2681: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 6209 >/dev/null 2>/dev/null
selfserv with PID 6209 found at Wed Nov 28 11:02:22 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c j -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2682: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 6209 >/dev/null 2>/dev/null
selfserv with PID 6209 found at Wed Nov 28 11:02:22 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c k -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2683: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 6209 >/dev/null 2>/dev/null
selfserv with PID 6209 found at Wed Nov 28 11:02:22 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c n -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2684: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 6209 >/dev/null 2>/dev/null
selfserv with PID 6209 found at Wed Nov 28 11:02:22 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c v -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2685: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 6209 >/dev/null 2>/dev/null
selfserv with PID 6209 found at Wed Nov 28 11:02:22 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c y -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2686: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_SHA ----------------------------
kill -0 6209 >/dev/null 2>/dev/null
selfserv with PID 6209 found at Wed Nov 28 11:02:22 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c z -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2687: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 6209 >/dev/null 2>/dev/null
selfserv with PID 6209 found at Wed Nov 28 11:02:22 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2688: SSL3_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 6209 >/dev/null 2>/dev/null
selfserv with PID 6209 found at Wed Nov 28 11:02:23 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2689: SSL3_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 6209 >/dev/null 2>/dev/null
selfserv with PID 6209 found at Wed Nov 28 11:02:23 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2690: SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 6209 >/dev/null 2>/dev/null
selfserv with PID 6209 found at Wed Nov 28 11:02:23 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2691: SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 6209 >/dev/null 2>/dev/null
selfserv with PID 6209 found at Wed Nov 28 11:02:23 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2692: SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 6209 >/dev/null 2>/dev/null
selfserv with PID 6209 found at Wed Nov 28 11:02:23 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2693: SSL3_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 6209 >/dev/null 2>/dev/null
selfserv with PID 6209 found at Wed Nov 28 11:02:23 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2694: SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 6209 >/dev/null 2>/dev/null
selfserv with PID 6209 found at Wed Nov 28 11:02:23 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2695: SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 6209 >/dev/null 2>/dev/null
selfserv with PID 6209 found at Wed Nov 28 11:02:23 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2696: SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 6209 >/dev/null 2>/dev/null
selfserv with PID 6209 found at Wed Nov 28 11:02:23 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2697: SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 6209 at Wed Nov 28 11:02:23 EST 2012
kill -USR1 6209
selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 6209 killed at Wed Nov 28 11:02:23 EST 2012
ssl.sh: SSL3_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Wed Nov 28 11:02:23 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:23 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 7432 >/dev/null 2>/dev/null
selfserv with PID 7432 found at Wed Nov 28 11:02:23 EST 2012
selfserv with PID 7432 started at Wed Nov 28 11:02:23 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2698: SSL3_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 7432 >/dev/null 2>/dev/null
selfserv with PID 7432 found at Wed Nov 28 11:02:24 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2699: SSL3_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 7432 >/dev/null 2>/dev/null
selfserv with PID 7432 found at Wed Nov 28 11:02:24 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2700: SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 7432 >/dev/null 2>/dev/null
selfserv with PID 7432 found at Wed Nov 28 11:02:24 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2701: SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 7432 >/dev/null 2>/dev/null
selfserv with PID 7432 found at Wed Nov 28 11:02:24 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2702: SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 7432 at Wed Nov 28 11:02:24 EST 2012
kill -USR1 7432
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 7432 killed at Wed Nov 28 11:02:24 EST 2012
ssl.sh: SSL3_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Wed Nov 28 11:02:24 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:24 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 7580 >/dev/null 2>/dev/null
selfserv with PID 7580 found at Wed Nov 28 11:02:24 EST 2012
selfserv with PID 7580 started at Wed Nov 28 11:02:24 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2703: SSL3_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 7580 >/dev/null 2>/dev/null
selfserv with PID 7580 found at Wed Nov 28 11:02:24 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2704: SSL3_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 7580 >/dev/null 2>/dev/null
selfserv with PID 7580 found at Wed Nov 28 11:02:24 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2705: SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 7580 >/dev/null 2>/dev/null
selfserv with PID 7580 found at Wed Nov 28 11:02:24 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2706: SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 7580 >/dev/null 2>/dev/null
selfserv with PID 7580 found at Wed Nov 28 11:02:24 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2707: SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 7580 >/dev/null 2>/dev/null
selfserv with PID 7580 found at Wed Nov 28 11:02:25 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2708: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 7580 >/dev/null 2>/dev/null
selfserv with PID 7580 found at Wed Nov 28 11:02:25 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2709: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 7580 >/dev/null 2>/dev/null
selfserv with PID 7580 found at Wed Nov 28 11:02:25 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2710: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 7580 >/dev/null 2>/dev/null
selfserv with PID 7580 found at Wed Nov 28 11:02:25 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2711: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 7580 >/dev/null 2>/dev/null
selfserv with PID 7580 found at Wed Nov 28 11:02:25 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2712: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 7580 >/dev/null 2>/dev/null
selfserv with PID 7580 found at Wed Nov 28 11:02:25 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2713: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 7580 >/dev/null 2>/dev/null
selfserv with PID 7580 found at Wed Nov 28 11:02:25 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2714: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 7580 >/dev/null 2>/dev/null
selfserv with PID 7580 found at Wed Nov 28 11:02:25 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2715: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 7580 >/dev/null 2>/dev/null
selfserv with PID 7580 found at Wed Nov 28 11:02:25 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2716: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 7580 >/dev/null 2>/dev/null
selfserv with PID 7580 found at Wed Nov 28 11:02:25 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2717: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 7580 at Wed Nov 28 11:02:26 EST 2012
kill -USR1 7580
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 7580 killed at Wed Nov 28 11:02:26 EST 2012
ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Wed Nov 28 11:02:26 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:26 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 7979 >/dev/null 2>/dev/null
selfserv with PID 7979 found at Wed Nov 28 11:02:26 EST 2012
selfserv with PID 7979 started at Wed Nov 28 11:02:26 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2718: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 7979 >/dev/null 2>/dev/null
selfserv with PID 7979 found at Wed Nov 28 11:02:26 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2719: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 7979 >/dev/null 2>/dev/null
selfserv with PID 7979 found at Wed Nov 28 11:02:26 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2720: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 7979 >/dev/null 2>/dev/null
selfserv with PID 7979 found at Wed Nov 28 11:02:26 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2721: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 7979 >/dev/null 2>/dev/null
selfserv with PID 7979 found at Wed Nov 28 11:02:26 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2722: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 7979 at Wed Nov 28 11:02:26 EST 2012
kill -USR1 7979
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 7979 killed at Wed Nov 28 11:02:26 EST 2012
ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Wed Nov 28 11:02:26 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:26 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 8127 >/dev/null 2>/dev/null
selfserv with PID 8127 found at Wed Nov 28 11:02:26 EST 2012
selfserv with PID 8127 started at Wed Nov 28 11:02:26 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2723: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 8127 >/dev/null 2>/dev/null
selfserv with PID 8127 found at Wed Nov 28 11:02:26 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2724: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 8127 >/dev/null 2>/dev/null
selfserv with PID 8127 found at Wed Nov 28 11:02:26 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2725: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 8127 >/dev/null 2>/dev/null
selfserv with PID 8127 found at Wed Nov 28 11:02:27 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2726: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 8127 >/dev/null 2>/dev/null
selfserv with PID 8127 found at Wed Nov 28 11:02:27 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2727: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 8127 >/dev/null 2>/dev/null
selfserv with PID 8127 found at Wed Nov 28 11:02:27 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2728: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 8127 >/dev/null 2>/dev/null
selfserv with PID 8127 found at Wed Nov 28 11:02:27 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2729: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 8127 >/dev/null 2>/dev/null
selfserv with PID 8127 found at Wed Nov 28 11:02:27 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2730: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 8127 >/dev/null 2>/dev/null
selfserv with PID 8127 found at Wed Nov 28 11:02:27 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2731: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 8127 >/dev/null 2>/dev/null
selfserv with PID 8127 found at Wed Nov 28 11:02:27 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2732: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 8127 >/dev/null 2>/dev/null
selfserv with PID 8127 found at Wed Nov 28 11:02:27 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2733: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 8127 >/dev/null 2>/dev/null
selfserv with PID 8127 found at Wed Nov 28 11:02:27 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2734: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 8127 >/dev/null 2>/dev/null
selfserv with PID 8127 found at Wed Nov 28 11:02:27 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2735: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 8127 >/dev/null 2>/dev/null
selfserv with PID 8127 found at Wed Nov 28 11:02:28 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2736: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 8127 >/dev/null 2>/dev/null
selfserv with PID 8127 found at Wed Nov 28 11:02:28 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2737: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 8127 at Wed Nov 28 11:02:28 EST 2012
kill -USR1 8127
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 8127 killed at Wed Nov 28 11:02:28 EST 2012
ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Wed Nov 28 11:02:28 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:28 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 8513 >/dev/null 2>/dev/null
selfserv with PID 8513 found at Wed Nov 28 11:02:28 EST 2012
selfserv with PID 8513 started at Wed Nov 28 11:02:28 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2738: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 8513 >/dev/null 2>/dev/null
selfserv with PID 8513 found at Wed Nov 28 11:02:28 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2739: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 8513 >/dev/null 2>/dev/null
selfserv with PID 8513 found at Wed Nov 28 11:02:28 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2740: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 8513 >/dev/null 2>/dev/null
selfserv with PID 8513 found at Wed Nov 28 11:02:28 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2741: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 8513 >/dev/null 2>/dev/null
selfserv with PID 8513 found at Wed Nov 28 11:02:28 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2742: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 8513 at Wed Nov 28 11:02:28 EST 2012
kill -USR1 8513
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 8513 killed at Wed Nov 28 11:02:28 EST 2012
ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Wed Nov 28 11:02:28 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:28 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 8661 >/dev/null 2>/dev/null
selfserv with PID 8661 found at Wed Nov 28 11:02:28 EST 2012
selfserv with PID 8661 started at Wed Nov 28 11:02:28 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2743: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 8661 >/dev/null 2>/dev/null
selfserv with PID 8661 found at Wed Nov 28 11:02:29 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2744: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 8661 >/dev/null 2>/dev/null
selfserv with PID 8661 found at Wed Nov 28 11:02:29 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2745: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 8661 >/dev/null 2>/dev/null
selfserv with PID 8661 found at Wed Nov 28 11:02:29 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2746: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 8661 >/dev/null 2>/dev/null
selfserv with PID 8661 found at Wed Nov 28 11:02:29 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2747: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 8661 at Wed Nov 28 11:02:29 EST 2012
kill -USR1 8661
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 8661 killed at Wed Nov 28 11:02:29 EST 2012
ssl.sh: SSL Client Authentication Extended Test - server fips/client normal  - with ECC ===============================
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:02:29 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:29 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 8860 >/dev/null 2>/dev/null
selfserv with PID 8860 found at Wed Nov 28 11:02:29 EST 2012
selfserv with PID 8860 started at Wed Nov 28 11:02:29 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2748: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 8860 at Wed Nov 28 11:02:29 EST 2012
kill -USR1 8860
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 8860 killed at Wed Nov 28 11:02:29 EST 2012
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Wed Nov 28 11:02:29 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:29 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 8917 >/dev/null 2>/dev/null
selfserv with PID 8917 found at Wed Nov 28 11:02:29 EST 2012
selfserv with PID 8917 started at Wed Nov 28 11:02:29 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -w bogus -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2749: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 8917 at Wed Nov 28 11:02:30 EST 2012
kill -USR1 8917
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 8917 killed at Wed Nov 28 11:02:30 EST 2012
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Wed Nov 28 11:02:30 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:30 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 8975 >/dev/null 2>/dev/null
selfserv with PID 8975 found at Wed Nov 28 11:02:30 EST 2012
selfserv with PID 8975 started at Wed Nov 28 11:02:30 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -w nss -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2750: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 8975 at Wed Nov 28 11:02:30 EST 2012
kill -USR1 8975
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 8975 killed at Wed Nov 28 11:02:30 EST 2012
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:02:30 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:30 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 9032 >/dev/null 2>/dev/null
selfserv with PID 9032 found at Wed Nov 28 11:02:30 EST 2012
selfserv with PID 9032 started at Wed Nov 28 11:02:30 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2751: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 9032 at Wed Nov 28 11:02:30 EST 2012
kill -USR1 9032
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 9032 killed at Wed Nov 28 11:02:30 EST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Wed Nov 28 11:02:30 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:30 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 9089 >/dev/null 2>/dev/null
selfserv with PID 9089 found at Wed Nov 28 11:02:30 EST 2012
selfserv with PID 9089 started at Wed Nov 28 11:02:30 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -w bogus -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2752: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 9089 at Wed Nov 28 11:02:30 EST 2012
kill -USR1 9089
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 9089 killed at Wed Nov 28 11:02:30 EST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Wed Nov 28 11:02:31 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:31 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 9146 >/dev/null 2>/dev/null
selfserv with PID 9146 found at Wed Nov 28 11:02:31 EST 2012
selfserv with PID 9146 started at Wed Nov 28 11:02:31 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -w nss -n ExtendedSSLUser   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2753: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9146 at Wed Nov 28 11:02:31 EST 2012
kill -USR1 9146
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 9146 killed at Wed Nov 28 11:02:31 EST 2012
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:02:31 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:31 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 9203 >/dev/null 2>/dev/null
selfserv with PID 9203 found at Wed Nov 28 11:02:31 EST 2012
selfserv with PID 9203 started at Wed Nov 28 11:02:31 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2754: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9203 at Wed Nov 28 11:02:31 EST 2012
kill -USR1 9203
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 9203 killed at Wed Nov 28 11:02:31 EST 2012
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Wed Nov 28 11:02:31 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:31 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 9260 >/dev/null 2>/dev/null
selfserv with PID 9260 found at Wed Nov 28 11:02:31 EST 2012
selfserv with PID 9260 started at Wed Nov 28 11:02:31 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V :ssl3 -n ExtendedSSLUser -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2755: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9260 at Wed Nov 28 11:02:31 EST 2012
kill -USR1 9260
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 9260 killed at Wed Nov 28 11:02:31 EST 2012
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Wed Nov 28 11:02:31 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:31 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 9317 >/dev/null 2>/dev/null
selfserv with PID 9317 found at Wed Nov 28 11:02:31 EST 2012
selfserv with PID 9317 started at Wed Nov 28 11:02:31 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V :ssl3 -n ExtendedSSLUser -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2756: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9317 at Wed Nov 28 11:02:32 EST 2012
kill -USR1 9317
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 9317 killed at Wed Nov 28 11:02:32 EST 2012
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:02:32 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:32 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 9374 >/dev/null 2>/dev/null
selfserv with PID 9374 found at Wed Nov 28 11:02:32 EST 2012
selfserv with PID 9374 started at Wed Nov 28 11:02:32 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2757: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 9374 at Wed Nov 28 11:02:32 EST 2012
kill -USR1 9374
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 9374 killed at Wed Nov 28 11:02:32 EST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Wed Nov 28 11:02:32 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:32 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 9431 >/dev/null 2>/dev/null
selfserv with PID 9431 found at Wed Nov 28 11:02:32 EST 2012
selfserv with PID 9431 started at Wed Nov 28 11:02:32 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V :ssl3 -n ExtendedSSLUser -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2758: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 9431 at Wed Nov 28 11:02:32 EST 2012
kill -USR1 9431
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 9431 killed at Wed Nov 28 11:02:32 EST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Wed Nov 28 11:02:32 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:32 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 9488 >/dev/null 2>/dev/null
selfserv with PID 9488 found at Wed Nov 28 11:02:32 EST 2012
selfserv with PID 9488 started at Wed Nov 28 11:02:32 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V :ssl3 -n ExtendedSSLUser -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2759: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9488 at Wed Nov 28 11:02:33 EST 2012
kill -USR1 9488
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 9488 killed at Wed Nov 28 11:02:33 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:02:33 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:33 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 9545 >/dev/null 2>/dev/null
selfserv with PID 9545 found at Wed Nov 28 11:02:33 EST 2012
selfserv with PID 9545 started at Wed Nov 28 11:02:33 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2760: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9545 at Wed Nov 28 11:02:33 EST 2012
kill -USR1 9545
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 9545 killed at Wed Nov 28 11:02:33 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:02:33 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:33 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 9602 >/dev/null 2>/dev/null
selfserv with PID 9602 found at Wed Nov 28 11:02:33 EST 2012
selfserv with PID 9602 started at Wed Nov 28 11:02:33 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3: -w bogus -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2761: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9602 at Wed Nov 28 11:02:33 EST 2012
kill -USR1 9602
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 9602 killed at Wed Nov 28 11:02:33 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:02:33 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:33 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 9659 >/dev/null 2>/dev/null
selfserv with PID 9659 found at Wed Nov 28 11:02:33 EST 2012
selfserv with PID 9659 started at Wed Nov 28 11:02:33 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3: -w nss -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2762: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9659 at Wed Nov 28 11:02:33 EST 2012
kill -USR1 9659
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 9659 killed at Wed Nov 28 11:02:33 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:02:33 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:33 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 9716 >/dev/null 2>/dev/null
selfserv with PID 9716 found at Wed Nov 28 11:02:34 EST 2012
selfserv with PID 9716 started at Wed Nov 28 11:02:34 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2763: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 9716 at Wed Nov 28 11:02:34 EST 2012
kill -USR1 9716
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 9716 killed at Wed Nov 28 11:02:34 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:02:34 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:34 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 9773 >/dev/null 2>/dev/null
selfserv with PID 9773 found at Wed Nov 28 11:02:34 EST 2012
selfserv with PID 9773 started at Wed Nov 28 11:02:34 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3: -w bogus -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2764: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 9773 at Wed Nov 28 11:02:34 EST 2012
kill -USR1 9773
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 9773 killed at Wed Nov 28 11:02:34 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:02:34 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:34 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 9830 >/dev/null 2>/dev/null
selfserv with PID 9830 found at Wed Nov 28 11:02:34 EST 2012
selfserv with PID 9830 started at Wed Nov 28 11:02:34 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3: -w nss -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2765: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9830 at Wed Nov 28 11:02:34 EST 2012
kill -USR1 9830
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 9830 killed at Wed Nov 28 11:02:34 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:02:34 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:34 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 9887 >/dev/null 2>/dev/null
selfserv with PID 9887 found at Wed Nov 28 11:02:34 EST 2012
selfserv with PID 9887 started at Wed Nov 28 11:02:34 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2766: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9887 at Wed Nov 28 11:02:35 EST 2012
kill -USR1 9887
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 9887 killed at Wed Nov 28 11:02:35 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:02:35 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:35 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 9944 >/dev/null 2>/dev/null
selfserv with PID 9944 found at Wed Nov 28 11:02:35 EST 2012
selfserv with PID 9944 started at Wed Nov 28 11:02:35 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2767: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9944 at Wed Nov 28 11:02:35 EST 2012
kill -USR1 9944
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 9944 killed at Wed Nov 28 11:02:35 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:02:35 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:35 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 10001 >/dev/null 2>/dev/null
selfserv with PID 10001 found at Wed Nov 28 11:02:35 EST 2012
selfserv with PID 10001 started at Wed Nov 28 11:02:35 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2768: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10001 at Wed Nov 28 11:02:35 EST 2012
kill -USR1 10001
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 10001 killed at Wed Nov 28 11:02:35 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:02:35 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:35 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 10058 >/dev/null 2>/dev/null
selfserv with PID 10058 found at Wed Nov 28 11:02:35 EST 2012
selfserv with PID 10058 started at Wed Nov 28 11:02:35 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2769: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 10058 at Wed Nov 28 11:02:36 EST 2012
kill -USR1 10058
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 10058 killed at Wed Nov 28 11:02:36 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:02:36 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:36 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 10115 >/dev/null 2>/dev/null
selfserv with PID 10115 found at Wed Nov 28 11:02:36 EST 2012
selfserv with PID 10115 started at Wed Nov 28 11:02:36 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2770: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 10115 at Wed Nov 28 11:02:36 EST 2012
kill -USR1 10115
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 10115 killed at Wed Nov 28 11:02:36 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:02:36 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:36 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 10172 >/dev/null 2>/dev/null
selfserv with PID 10172 found at Wed Nov 28 11:02:36 EST 2012
selfserv with PID 10172 started at Wed Nov 28 11:02:36 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2771: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10172 at Wed Nov 28 11:02:36 EST 2012
kill -USR1 10172
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 10172 killed at Wed Nov 28 11:02:36 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:02:36 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:36 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 10229 >/dev/null 2>/dev/null
selfserv with PID 10229 found at Wed Nov 28 11:02:36 EST 2012
selfserv with PID 10229 started at Wed Nov 28 11:02:36 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2772: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10229 at Wed Nov 28 11:02:36 EST 2012
kill -USR1 10229
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 10229 killed at Wed Nov 28 11:02:36 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:02:36 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:36 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 10286 >/dev/null 2>/dev/null
selfserv with PID 10286 found at Wed Nov 28 11:02:37 EST 2012
selfserv with PID 10286 started at Wed Nov 28 11:02:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2773: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10286 at Wed Nov 28 11:02:37 EST 2012
kill -USR1 10286
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 10286 killed at Wed Nov 28 11:02:37 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:02:37 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 10343 >/dev/null 2>/dev/null
selfserv with PID 10343 found at Wed Nov 28 11:02:37 EST 2012
selfserv with PID 10343 started at Wed Nov 28 11:02:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2774: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10343 at Wed Nov 28 11:02:37 EST 2012
kill -USR1 10343
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 10343 killed at Wed Nov 28 11:02:37 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:02:37 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 10400 >/dev/null 2>/dev/null
selfserv with PID 10400 found at Wed Nov 28 11:02:37 EST 2012
selfserv with PID 10400 started at Wed Nov 28 11:02:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2775: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 10400 at Wed Nov 28 11:02:37 EST 2012
kill -USR1 10400
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 10400 killed at Wed Nov 28 11:02:37 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:02:37 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 10457 >/dev/null 2>/dev/null
selfserv with PID 10457 found at Wed Nov 28 11:02:37 EST 2012
selfserv with PID 10457 started at Wed Nov 28 11:02:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2776: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 10457 at Wed Nov 28 11:02:38 EST 2012
kill -USR1 10457
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 10457 killed at Wed Nov 28 11:02:38 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:02:38 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 10514 >/dev/null 2>/dev/null
selfserv with PID 10514 found at Wed Nov 28 11:02:38 EST 2012
selfserv with PID 10514 started at Wed Nov 28 11:02:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2777: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10514 at Wed Nov 28 11:02:38 EST 2012
kill -USR1 10514
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 10514 killed at Wed Nov 28 11:02:38 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:02:38 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 10586 >/dev/null 2>/dev/null
selfserv with PID 10586 found at Wed Nov 28 11:02:38 EST 2012
selfserv with PID 10586 started at Wed Nov 28 11:02:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -w bogus -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2778: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10586 at Wed Nov 28 11:02:38 EST 2012
kill -USR1 10586
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 10586 killed at Wed Nov 28 11:02:38 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:02:38 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 10643 >/dev/null 2>/dev/null
selfserv with PID 10643 found at Wed Nov 28 11:02:38 EST 2012
selfserv with PID 10643 started at Wed Nov 28 11:02:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -w nss -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2779: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10643 at Wed Nov 28 11:02:39 EST 2012
kill -USR1 10643
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 10643 killed at Wed Nov 28 11:02:39 EST 2012
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:02:39 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 10700 >/dev/null 2>/dev/null
selfserv with PID 10700 found at Wed Nov 28 11:02:39 EST 2012
selfserv with PID 10700 started at Wed Nov 28 11:02:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -w bogus -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2780: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 10700 at Wed Nov 28 11:02:39 EST 2012
kill -USR1 10700
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 10700 killed at Wed Nov 28 11:02:39 EST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:02:39 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 10757 >/dev/null 2>/dev/null
selfserv with PID 10757 found at Wed Nov 28 11:02:39 EST 2012
selfserv with PID 10757 started at Wed Nov 28 11:02:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -w nss -n ExtendedSSLUser-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2781: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10757 at Wed Nov 28 11:02:39 EST 2012
kill -USR1 10757
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 10757 killed at Wed Nov 28 11:02:39 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:02:39 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 10814 >/dev/null 2>/dev/null
selfserv with PID 10814 found at Wed Nov 28 11:02:39 EST 2012
selfserv with PID 10814 started at Wed Nov 28 11:02:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V :ssl3 -n ExtendedSSLUser-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2782: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10814 at Wed Nov 28 11:02:40 EST 2012
kill -USR1 10814
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 10814 killed at Wed Nov 28 11:02:40 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:02:40 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 10872 >/dev/null 2>/dev/null
selfserv with PID 10872 found at Wed Nov 28 11:02:40 EST 2012
selfserv with PID 10872 started at Wed Nov 28 11:02:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V :ssl3 -n ExtendedSSLUser-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2783: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10872 at Wed Nov 28 11:02:40 EST 2012
kill -USR1 10872
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 10872 killed at Wed Nov 28 11:02:40 EST 2012
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:02:40 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 10929 >/dev/null 2>/dev/null
selfserv with PID 10929 found at Wed Nov 28 11:02:40 EST 2012
selfserv with PID 10929 started at Wed Nov 28 11:02:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V :ssl3 -n ExtendedSSLUser-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2784: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 10929 at Wed Nov 28 11:02:40 EST 2012
kill -USR1 10929
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 10929 killed at Wed Nov 28 11:02:40 EST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:02:40 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 10988 >/dev/null 2>/dev/null
selfserv with PID 10988 found at Wed Nov 28 11:02:40 EST 2012
selfserv with PID 10988 started at Wed Nov 28 11:02:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V :ssl3 -n ExtendedSSLUser-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2785: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10988 at Wed Nov 28 11:02:41 EST 2012
kill -USR1 10988
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 10988 killed at Wed Nov 28 11:02:41 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:02:41 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 11045 >/dev/null 2>/dev/null
selfserv with PID 11045 found at Wed Nov 28 11:02:41 EST 2012
selfserv with PID 11045 started at Wed Nov 28 11:02:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3: -w bogus -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2786: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11045 at Wed Nov 28 11:02:41 EST 2012
kill -USR1 11045
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 11045 killed at Wed Nov 28 11:02:41 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:02:41 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 11102 >/dev/null 2>/dev/null
selfserv with PID 11102 found at Wed Nov 28 11:02:41 EST 2012
selfserv with PID 11102 started at Wed Nov 28 11:02:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3: -w nss -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2787: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11102 at Wed Nov 28 11:02:41 EST 2012
kill -USR1 11102
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 11102 killed at Wed Nov 28 11:02:41 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:02:41 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 11160 >/dev/null 2>/dev/null
selfserv with PID 11160 found at Wed Nov 28 11:02:41 EST 2012
selfserv with PID 11160 started at Wed Nov 28 11:02:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3: -w bogus -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2788: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 11160 at Wed Nov 28 11:02:42 EST 2012
kill -USR1 11160
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 11160 killed at Wed Nov 28 11:02:42 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:02:42 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 11217 >/dev/null 2>/dev/null
selfserv with PID 11217 found at Wed Nov 28 11:02:42 EST 2012
selfserv with PID 11217 started at Wed Nov 28 11:02:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3: -w nss -n ExtendedSSLUser-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2789: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11217 at Wed Nov 28 11:02:42 EST 2012
kill -USR1 11217
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 11217 killed at Wed Nov 28 11:02:42 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:02:42 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 11274 >/dev/null 2>/dev/null
selfserv with PID 11274 found at Wed Nov 28 11:02:42 EST 2012
selfserv with PID 11274 started at Wed Nov 28 11:02:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2790: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11274 at Wed Nov 28 11:02:42 EST 2012
kill -USR1 11274
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 11274 killed at Wed Nov 28 11:02:42 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:02:42 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 11331 >/dev/null 2>/dev/null
selfserv with PID 11331 found at Wed Nov 28 11:02:42 EST 2012
selfserv with PID 11331 started at Wed Nov 28 11:02:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2791: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11331 at Wed Nov 28 11:02:43 EST 2012
kill -USR1 11331
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 11331 killed at Wed Nov 28 11:02:43 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:02:43 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 11388 >/dev/null 2>/dev/null
selfserv with PID 11388 found at Wed Nov 28 11:02:43 EST 2012
selfserv with PID 11388 started at Wed Nov 28 11:02:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2792: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 11388 at Wed Nov 28 11:02:43 EST 2012
kill -USR1 11388
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 11388 killed at Wed Nov 28 11:02:43 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:02:43 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 11445 >/dev/null 2>/dev/null
selfserv with PID 11445 found at Wed Nov 28 11:02:43 EST 2012
selfserv with PID 11445 started at Wed Nov 28 11:02:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2793: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11445 at Wed Nov 28 11:02:43 EST 2012
kill -USR1 11445
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 11445 killed at Wed Nov 28 11:02:43 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:02:43 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 11502 >/dev/null 2>/dev/null
selfserv with PID 11502 found at Wed Nov 28 11:02:43 EST 2012
selfserv with PID 11502 started at Wed Nov 28 11:02:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2794: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11502 at Wed Nov 28 11:02:43 EST 2012
kill -USR1 11502
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 11502 killed at Wed Nov 28 11:02:43 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:02:44 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 11559 >/dev/null 2>/dev/null
selfserv with PID 11559 found at Wed Nov 28 11:02:44 EST 2012
selfserv with PID 11559 started at Wed Nov 28 11:02:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2795: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11559 at Wed Nov 28 11:02:44 EST 2012
kill -USR1 11559
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 11559 killed at Wed Nov 28 11:02:44 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:02:44 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 11618 >/dev/null 2>/dev/null
selfserv with PID 11618 found at Wed Nov 28 11:02:44 EST 2012
selfserv with PID 11618 started at Wed Nov 28 11:02:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2796: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 11618 at Wed Nov 28 11:02:44 EST 2012
kill -USR1 11618
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 11618 killed at Wed Nov 28 11:02:44 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:02:44 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 11675 >/dev/null 2>/dev/null
selfserv with PID 11675 found at Wed Nov 28 11:02:44 EST 2012
selfserv with PID 11675 started at Wed Nov 28 11:02:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2797: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11675 at Wed Nov 28 11:02:44 EST 2012
kill -USR1 11675
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 11675 killed at Wed Nov 28 11:02:44 EST 2012
ssl.sh: skipping  TLS Server hello response without SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI for Extended Test
ssl.sh: skipping  TLS Server response with alert for Extended Test
ssl.sh: skipping  SSL3 Server hello response without SNI for Extended Test
ssl.sh: skipping  SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test
ssl.sh: skipping  TLS Server hello response without SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI: Change name on 2d HS for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test
ssl.sh: skipping  TLS Server response with alert for Extended Test
ssl.sh: SSL Stress Test Extended Test - server fips/client normal  - with ECC ===============================
ssl.sh: skipping  Stress SSL2 RC4 128 with MD5 for Extended Test
ssl.sh: Stress SSL3 RC4 128 with MD5 ----
selfserv starting at Wed Nov 28 11:02:45 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:45 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 11848 >/dev/null 2>/dev/null
selfserv with PID 11848 found at Wed Nov 28 11:02:45 EST 2012
selfserv with PID 11848 started at Wed Nov 28 11:02:45 EST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -c 1000 -C c -V :ssl3 \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:02:45 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:02:45 EST 2012
ssl.sh: #2798: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 11848 at Wed Nov 28 11:02:45 EST 2012
kill -USR1 11848
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 11848 killed at Wed Nov 28 11:02:45 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 ----
selfserv starting at Wed Nov 28 11:02:45 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:45 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 11924 >/dev/null 2>/dev/null
selfserv with PID 11924 found at Wed Nov 28 11:02:45 EST 2012
selfserv with PID 11924 started at Wed Nov 28 11:02:45 EST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -c 1000 -C c \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:02:45 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:02:45 EST 2012
ssl.sh: #2799: Stress TLS  RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 11924 at Wed Nov 28 11:02:45 EST 2012
kill -USR1 11924
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 11924 killed at Wed Nov 28 11:02:45 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (false start) ----
selfserv starting at Wed Nov 28 11:02:46 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 12000 >/dev/null 2>/dev/null
selfserv with PID 12000 found at Wed Nov 28 11:02:46 EST 2012
selfserv with PID 12000 started at Wed Nov 28 11:02:46 EST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -c 1000 -C c -g \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:02:46 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:02:46 EST 2012
ssl.sh: #2800: Stress TLS  RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 12000 at Wed Nov 28 11:02:46 EST 2012
kill -USR1 12000
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 12000 killed at Wed Nov 28 11:02:46 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket) ----
selfserv starting at Wed Nov 28 11:02:46 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 12076 >/dev/null 2>/dev/null
selfserv with PID 12076 found at Wed Nov 28 11:02:46 EST 2012
selfserv with PID 12076 started at Wed Nov 28 11:02:46 EST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -V ssl3: -c 1000 -C c -u \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:02:46 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Wed Nov 28 11:02:46 EST 2012
ssl.sh: #2801: Stress TLS  RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 12076 at Wed Nov 28 11:02:46 EST 2012
kill -USR1 12076
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 12076 killed at Wed Nov 28 11:02:46 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (compression) ----
selfserv starting at Wed Nov 28 11:02:46 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 12152 >/dev/null 2>/dev/null
selfserv with PID 12152 found at Wed Nov 28 11:02:47 EST 2012
selfserv with PID 12152 started at Wed Nov 28 11:02:47 EST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -V ssl3: -c 1000 -C c -z \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:02:47 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:02:47 EST 2012
ssl.sh: #2802: Stress TLS  RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 12152 at Wed Nov 28 11:02:47 EST 2012
kill -USR1 12152
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 12152 killed at Wed Nov 28 11:02:47 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression) ----
selfserv starting at Wed Nov 28 11:02:47 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 12228 >/dev/null 2>/dev/null
selfserv with PID 12228 found at Wed Nov 28 11:02:47 EST 2012
selfserv with PID 12228 started at Wed Nov 28 11:02:47 EST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -V ssl3: -c 1000 -C c -u -z \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:02:47 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Wed Nov 28 11:02:47 EST 2012
ssl.sh: #2803: Stress TLS  RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 12228 at Wed Nov 28 11:02:47 EST 2012
kill -USR1 12228
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 12228 killed at Wed Nov 28 11:02:47 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) ----
selfserv starting at Wed Nov 28 11:02:48 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 12304 >/dev/null 2>/dev/null
selfserv with PID 12304 found at Wed Nov 28 11:02:48 EST 2012
selfserv with PID 12304 started at Wed Nov 28 11:02:48 EST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -V ssl3: -c 1000 -C c -u -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:02:48 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Wed Nov 28 11:02:48 EST 2012
ssl.sh: #2804: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 12304 at Wed Nov 28 11:02:48 EST 2012
kill -USR1 12304
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 12304 killed at Wed Nov 28 11:02:48 EST 2012
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test
ssl.sh: skipping  Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Wed Nov 28 11:02:48 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 12409 >/dev/null 2>/dev/null
selfserv with PID 12409 found at Wed Nov 28 11:02:48 EST 2012
selfserv with PID 12409 started at Wed Nov 28 11:02:48 EST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -c 100 -C c -V :ssl3 -N -n ExtendedSSLUser \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:02:48 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed Nov 28 11:02:49 EST 2012
ssl.sh: #2805: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 12409 at Wed Nov 28 11:02:49 EST 2012
kill -USR1 12409
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 12409 killed at Wed Nov 28 11:02:49 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Wed Nov 28 11:02:49 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:49 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 12484 >/dev/null 2>/dev/null
selfserv with PID 12484 found at Wed Nov 28 11:02:49 EST 2012
selfserv with PID 12484 started at Wed Nov 28 11:02:49 EST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -c 100 -C c -N -n ExtendedSSLUser \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:02:49 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed Nov 28 11:02:49 EST 2012
ssl.sh: #2806: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 12484 at Wed Nov 28 11:02:49 EST 2012
kill -USR1 12484
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 12484 killed at Wed Nov 28 11:02:49 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Wed Nov 28 11:02:49 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:49 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 12559 >/dev/null 2>/dev/null
selfserv with PID 12559 found at Wed Nov 28 11:02:49 EST 2012
selfserv with PID 12559 started at Wed Nov 28 11:02:49 EST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:02:49 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Wed Nov 28 11:02:50 EST 2012
ssl.sh: #2807: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 12559 at Wed Nov 28 11:02:50 EST 2012
kill -USR1 12559
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 12559 killed at Wed Nov 28 11:02:50 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Wed Nov 28 11:02:50 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:50 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 12635 >/dev/null 2>/dev/null
selfserv with PID 12635 found at Wed Nov 28 11:02:50 EST 2012
selfserv with PID 12635 started at Wed Nov 28 11:02:50 EST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:02:50 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:02:50 EST 2012
ssl.sh: #2808: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 12635 at Wed Nov 28 11:02:50 EST 2012
kill -USR1 12635
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 12635 killed at Wed Nov 28 11:02:50 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Wed Nov 28 11:02:50 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:50 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 12711 >/dev/null 2>/dev/null
selfserv with PID 12711 found at Wed Nov 28 11:02:50 EST 2012
selfserv with PID 12711 started at Wed Nov 28 11:02:50 EST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:02:50 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:02:50 EST 2012
ssl.sh: #2809: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 12711 at Wed Nov 28 11:02:50 EST 2012
kill -USR1 12711
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 12711 killed at Wed Nov 28 11:02:50 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Wed Nov 28 11:02:50 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:50 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 12787 >/dev/null 2>/dev/null
selfserv with PID 12787 found at Wed Nov 28 11:02:50 EST 2012
selfserv with PID 12787 started at Wed Nov 28 11:02:50 EST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:02:50 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Wed Nov 28 11:02:51 EST 2012
ssl.sh: #2810: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 12787 at Wed Nov 28 11:02:51 EST 2012
kill -USR1 12787
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 12787 killed at Wed Nov 28 11:02:51 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Wed Nov 28 11:02:51 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:51 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 12863 >/dev/null 2>/dev/null
selfserv with PID 12863 found at Wed Nov 28 11:02:51 EST 2012
selfserv with PID 12863 started at Wed Nov 28 11:02:51 EST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:02:51 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Wed Nov 28 11:02:51 EST 2012
ssl.sh: #2811: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 12863 at Wed Nov 28 11:02:51 EST 2012
kill -USR1 12863
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 12863 killed at Wed Nov 28 11:02:51 EST 2012
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Wed Nov 28 11:02:51 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C009 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:51 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 12968 >/dev/null 2>/dev/null
selfserv with PID 12968 found at Wed Nov 28 11:02:51 EST 2012
selfserv with PID 12968 started at Wed Nov 28 11:02:51 EST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -c 100 -C :C009 -N -V :ssl3 \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:02:51 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed Nov 28 11:02:52 EST 2012
ssl.sh: #2812: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 12968 at Wed Nov 28 11:02:52 EST 2012
kill -USR1 12968
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 12968 killed at Wed Nov 28 11:02:52 EST 2012
ssl.sh: Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Wed Nov 28 11:02:52 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C013 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:52 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 13043 >/dev/null 2>/dev/null
selfserv with PID 13043 found at Wed Nov 28 11:02:52 EST 2012
selfserv with PID 13043 started at Wed Nov 28 11:02:52 EST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -c 1000 -C :C013 -V :ssl3 \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:02:52 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:02:53 EST 2012
ssl.sh: #2813: Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 13043 at Wed Nov 28 11:02:53 EST 2012
kill -USR1 13043
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 13043 killed at Wed Nov 28 11:02:53 EST 2012
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) ----
selfserv starting at Wed Nov 28 11:02:53 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C004 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:53 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 13119 >/dev/null 2>/dev/null
selfserv with PID 13119 found at Wed Nov 28 11:02:53 EST 2012
selfserv with PID 13119 started at Wed Nov 28 11:02:53 EST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -V ssl3: -c 100 -C :C004 -N \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:02:53 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed Nov 28 11:02:54 EST 2012
ssl.sh: #2814: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 13119 at Wed Nov 28 11:02:54 EST 2012
kill -USR1 13119
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 13119 killed at Wed Nov 28 11:02:54 EST 2012
ssl.sh: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) ----
selfserv starting at Wed Nov 28 11:02:54 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c :C00E -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:54 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 13194 >/dev/null 2>/dev/null
selfserv with PID 13194 found at Wed Nov 28 11:02:54 EST 2012
selfserv with PID 13194 started at Wed Nov 28 11:02:54 EST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -V ssl3: -c 100 -C :C00E -N \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:02:54 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed Nov 28 11:02:55 EST 2012
ssl.sh: #2815: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 13194 at Wed Nov 28 11:02:55 EST 2012
kill -USR1 13194
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 13194 killed at Wed Nov 28 11:02:55 EST 2012
ssl.sh: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Wed Nov 28 11:02:55 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C013 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:55 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 13269 >/dev/null 2>/dev/null
selfserv with PID 13269 found at Wed Nov 28 11:02:55 EST 2012
selfserv with PID 13269 started at Wed Nov 28 11:02:55 EST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -V ssl3: -c 1000 -C :C013 \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:02:55 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:02:55 EST 2012
ssl.sh: #2816: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 13269 at Wed Nov 28 11:02:55 EST 2012
kill -USR1 13269
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 13269 killed at Wed Nov 28 11:02:55 EST 2012
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) ----
selfserv starting at Wed Nov 28 11:02:55 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C004 -u -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:55 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 13345 >/dev/null 2>/dev/null
selfserv with PID 13345 found at Wed Nov 28 11:02:55 EST 2012
selfserv with PID 13345 started at Wed Nov 28 11:02:55 EST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -V ssl3: -c 1000 -C :C004 -u \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:02:55 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Wed Nov 28 11:02:56 EST 2012
ssl.sh: #2817: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 13345 at Wed Nov 28 11:02:56 EST 2012
kill -USR1 13345
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 13345 killed at Wed Nov 28 11:02:56 EST 2012
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Wed Nov 28 11:02:56 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C009 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:56 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 13442 >/dev/null 2>/dev/null
selfserv with PID 13442 found at Wed Nov 28 11:02:56 EST 2012
selfserv with PID 13442 started at Wed Nov 28 11:02:56 EST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -c 10 -C :C009 -N -V :ssl3 -n ExtendedSSLUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:02:56 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Wed Nov 28 11:02:56 EST 2012
ssl.sh: #2818: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 13442 at Wed Nov 28 11:02:56 EST 2012
kill -USR1 13442
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 13442 killed at Wed Nov 28 11:02:56 EST 2012
ssl.sh: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) ----
selfserv starting at Wed Nov 28 11:02:56 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:56 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 13517 >/dev/null 2>/dev/null
selfserv with PID 13517 found at Wed Nov 28 11:02:56 EST 2012
selfserv with PID 13517 started at Wed Nov 28 11:02:56 EST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -c 100 -C :C013 -V :ssl3 -n ExtendedSSLUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:02:56 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:02:56 EST 2012
ssl.sh: #2819: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 13517 at Wed Nov 28 11:02:57 EST 2012
kill -USR1 13517
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 13517 killed at Wed Nov 28 11:02:57 EST 2012
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Wed Nov 28 11:02:57 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C004 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:57 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 13594 >/dev/null 2>/dev/null
selfserv with PID 13594 found at Wed Nov 28 11:02:57 EST 2012
selfserv with PID 13594 started at Wed Nov 28 11:02:57 EST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -c 10 -C :C004 -N -n ExtendedSSLUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:02:57 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Wed Nov 28 11:02:57 EST 2012
ssl.sh: #2820: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 13594 at Wed Nov 28 11:02:57 EST 2012
kill -USR1 13594
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 13594 killed at Wed Nov 28 11:02:57 EST 2012
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Wed Nov 28 11:02:57 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -r -r -c :C00E -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:57 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 13669 >/dev/null 2>/dev/null
selfserv with PID 13669 found at Wed Nov 28 11:02:57 EST 2012
selfserv with PID 13669 started at Wed Nov 28 11:02:57 EST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -c 10 -C :C00E -N -n ExtendedSSLUser-ecmixed \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:02:57 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Wed Nov 28 11:02:57 EST 2012
ssl.sh: #2821: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 13669 at Wed Nov 28 11:02:57 EST 2012
kill -USR1 13669
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 13669 killed at Wed Nov 28 11:02:57 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ----
selfserv starting at Wed Nov 28 11:02:57 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:57 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 13744 >/dev/null 2>/dev/null
selfserv with PID 13744 found at Wed Nov 28 11:02:57 EST 2012
selfserv with PID 13744 started at Wed Nov 28 11:02:57 EST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -c 100 -C :C013 -n ExtendedSSLUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:02:57 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:02:58 EST 2012
ssl.sh: #2822: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 13744 at Wed Nov 28 11:02:58 EST 2012
kill -USR1 13744
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 13744 killed at Wed Nov 28 11:02:58 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ----
selfserv starting at Wed Nov 28 11:02:58 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -u -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:58 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 13820 >/dev/null 2>/dev/null
selfserv with PID 13820 found at Wed Nov 28 11:02:58 EST 2012
selfserv with PID 13820 started at Wed Nov 28 11:02:58 EST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec -u \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:02:58 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Wed Nov 28 11:02:58 EST 2012
ssl.sh: #2823: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 13820 at Wed Nov 28 11:02:58 EST 2012
kill -USR1 13820
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 13820 killed at Wed Nov 28 11:02:58 EST 2012
ssl.sh: SSL - FIPS mode off for server ===============================
ssl.sh: Turning FIPS off for the  server
modutil -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/server -fips false -force
FIPS mode disabled.
ssl.sh: #2824:  (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED
modutil -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/server -list
ssl.sh: #2825:  (modutil -list) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: #2826:  (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED
ssl.sh: Turning FIPS off for the extended  server
modutil -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/ext_server -fips false -force
FIPS mode disabled.
ssl.sh: #2827:  (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED
modutil -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/ext_server -list
ssl.sh: #2828:  (modutil -list) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: #2829:  (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED
ssl.sh: SSL - FIPS mode on for client ===============================
ssl.sh: Turning FIPS on for the  client
modutil -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -fips true -force
FIPS mode enabled.
ssl.sh: #2830:  (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED
modutil -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -list
ssl.sh: #2831:  (modutil -list) produced a returncode of 0, expected is 0 - PASSED
  1. NSS Internal FIPS PKCS #11 Module
ssl.sh: #2832:  (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED
ssl.sh: Turning FIPS on for the extended  client
modutil -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/ext_client -fips true -force
FIPS mode enabled.
ssl.sh: #2833:  (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED
modutil -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/ext_client -list
ssl.sh: #2834:  (modutil -list) produced a returncode of 0, expected is 0 - PASSED
  1. NSS Internal FIPS PKCS #11 Module
ssl.sh: #2835:  (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED
ssl.sh: SSL Cipher Coverage  - server normal/client fips  - with ECC ===============================
selfserv starting at Wed Nov 28 11:02:59 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:02:59 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 14014 >/dev/null 2>/dev/null
selfserv with PID 14014 found at Wed Nov 28 11:02:59 EST 2012
selfserv with PID 14014 started at Wed Nov 28 11:02:59 EST 2012
ssl.sh: skipping  SSL2_RC4_128_WITH_MD5 (non-FIPS only)
ssl.sh: skipping  SSL2_RC4_128_EXPORT40_WITH_MD5 (non-FIPS only)
ssl.sh: skipping  SSL2_RC2_128_CBC_WITH_MD5 (non-FIPS only)
ssl.sh: skipping  SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 (non-FIPS only)
ssl.sh: skipping  SSL2_DES_64_CBC_WITH_MD5 (non-FIPS only)
ssl.sh: skipping  SSL2_DES_192_EDE3_CBC_WITH_MD5 (non-FIPS only)
ssl.sh: skipping  SSL2_RC4_128_EXPORT40_WITH_MD5 (non-FIPS only)
ssl.sh: skipping  SSL2_RC2_128_CBC_WITH_MD5 (non-FIPS only)
ssl.sh: skipping  SSL2_DES_64_CBC_WITH_MD5 (non-FIPS only)
ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 14014 >/dev/null 2>/dev/null
selfserv with PID 14014 found at Wed Nov 28 11:02:59 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c c -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2836: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 14014 >/dev/null 2>/dev/null
selfserv with PID 14014 found at Wed Nov 28 11:03:00 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c d -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2837: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 14014 >/dev/null 2>/dev/null
selfserv with PID 14014 found at Wed Nov 28 11:03:00 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c e -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2838: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ----------------------------
kill -0 14014 >/dev/null 2>/dev/null
selfserv with PID 14014 found at Wed Nov 28 11:03:00 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c i -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2839: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 14014 >/dev/null 2>/dev/null
selfserv with PID 14014 found at Wed Nov 28 11:03:00 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c j -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2840: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 14014 >/dev/null 2>/dev/null
selfserv with PID 14014 found at Wed Nov 28 11:03:00 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c k -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2841: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 14014 >/dev/null 2>/dev/null
selfserv with PID 14014 found at Wed Nov 28 11:03:01 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c n -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2842: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 14014 >/dev/null 2>/dev/null
selfserv with PID 14014 found at Wed Nov 28 11:03:01 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c v -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2843: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 14014 >/dev/null 2>/dev/null
selfserv with PID 14014 found at Wed Nov 28 11:03:01 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c y -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2844: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_SHA ----------------------------
kill -0 14014 >/dev/null 2>/dev/null
selfserv with PID 14014 found at Wed Nov 28 11:03:01 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c z -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2845: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 14014 >/dev/null 2>/dev/null
selfserv with PID 14014 found at Wed Nov 28 11:03:01 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c c -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2846: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 14014 >/dev/null 2>/dev/null
selfserv with PID 14014 found at Wed Nov 28 11:03:02 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c d -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2847: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 14014 >/dev/null 2>/dev/null
selfserv with PID 14014 found at Wed Nov 28 11:03:02 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c e -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2848: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running TLS_RSA_WITH_NULL_MD5 ----------------------------
kill -0 14014 >/dev/null 2>/dev/null
selfserv with PID 14014 found at Wed Nov 28 11:03:02 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c i -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2849: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 14014 >/dev/null 2>/dev/null
selfserv with PID 14014 found at Wed Nov 28 11:03:02 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c j -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2850: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 14014 >/dev/null 2>/dev/null
selfserv with PID 14014 found at Wed Nov 28 11:03:02 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c k -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2851: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 14014 >/dev/null 2>/dev/null
selfserv with PID 14014 found at Wed Nov 28 11:03:02 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c n -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2852: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 14014 >/dev/null 2>/dev/null
selfserv with PID 14014 found at Wed Nov 28 11:03:03 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c v -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2853: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 14014 >/dev/null 2>/dev/null
selfserv with PID 14014 found at Wed Nov 28 11:03:03 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c y -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2854: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_SHA ----------------------------
kill -0 14014 >/dev/null 2>/dev/null
selfserv with PID 14014 found at Wed Nov 28 11:03:03 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c z -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2855: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 14014 >/dev/null 2>/dev/null
selfserv with PID 14014 found at Wed Nov 28 11:03:03 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c c -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2856: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 14014 >/dev/null 2>/dev/null
selfserv with PID 14014 found at Wed Nov 28 11:03:03 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c d -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2857: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 14014 >/dev/null 2>/dev/null
selfserv with PID 14014 found at Wed Nov 28 11:03:04 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c e -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2858: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  f    TLS11_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping  g    TLS11_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ----------------------------
kill -0 14014 >/dev/null 2>/dev/null
selfserv with PID 14014 found at Wed Nov 28 11:03:04 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c i -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2859: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 14014 >/dev/null 2>/dev/null
selfserv with PID 14014 found at Wed Nov 28 11:03:04 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c j -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2860: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 14014 >/dev/null 2>/dev/null
selfserv with PID 14014 found at Wed Nov 28 11:03:04 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c k -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2861: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 14014 >/dev/null 2>/dev/null
selfserv with PID 14014 found at Wed Nov 28 11:03:04 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c n -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2862: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 14014 >/dev/null 2>/dev/null
selfserv with PID 14014 found at Wed Nov 28 11:03:04 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c v -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2863: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 14014 >/dev/null 2>/dev/null
selfserv with PID 14014 found at Wed Nov 28 11:03:05 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c y -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2864: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_SHA ----------------------------
kill -0 14014 >/dev/null 2>/dev/null
selfserv with PID 14014 found at Wed Nov 28 11:03:05 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c z -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2865: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 14014 >/dev/null 2>/dev/null
selfserv with PID 14014 found at Wed Nov 28 11:03:05 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2866: SSL3_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 14014 >/dev/null 2>/dev/null
selfserv with PID 14014 found at Wed Nov 28 11:03:05 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2867: SSL3_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 14014 >/dev/null 2>/dev/null
selfserv with PID 14014 found at Wed Nov 28 11:03:05 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2868: SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 14014 >/dev/null 2>/dev/null
selfserv with PID 14014 found at Wed Nov 28 11:03:06 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2869: SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 14014 >/dev/null 2>/dev/null
selfserv with PID 14014 found at Wed Nov 28 11:03:06 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2870: SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 14014 >/dev/null 2>/dev/null
selfserv with PID 14014 found at Wed Nov 28 11:03:06 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2871: SSL3_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 14014 >/dev/null 2>/dev/null
selfserv with PID 14014 found at Wed Nov 28 11:03:06 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2872: SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 14014 >/dev/null 2>/dev/null
selfserv with PID 14014 found at Wed Nov 28 11:03:07 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2873: SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 14014 >/dev/null 2>/dev/null
selfserv with PID 14014 found at Wed Nov 28 11:03:07 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2874: SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 14014 >/dev/null 2>/dev/null
selfserv with PID 14014 found at Wed Nov 28 11:03:07 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2875: SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 14014 at Wed Nov 28 11:03:07 EST 2012
kill -USR1 14014
selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 14014 killed at Wed Nov 28 11:03:07 EST 2012
ssl.sh: SSL3_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Wed Nov 28 11:03:07 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:03:07 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 15237 >/dev/null 2>/dev/null
selfserv with PID 15237 found at Wed Nov 28 11:03:07 EST 2012
selfserv with PID 15237 started at Wed Nov 28 11:03:07 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2876: SSL3_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 15237 >/dev/null 2>/dev/null
selfserv with PID 15237 found at Wed Nov 28 11:03:07 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2877: SSL3_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 15237 >/dev/null 2>/dev/null
selfserv with PID 15237 found at Wed Nov 28 11:03:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2878: SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 15237 >/dev/null 2>/dev/null
selfserv with PID 15237 found at Wed Nov 28 11:03:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2879: SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 15237 >/dev/null 2>/dev/null
selfserv with PID 15237 found at Wed Nov 28 11:03:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2880: SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 15237 at Wed Nov 28 11:03:08 EST 2012
kill -USR1 15237
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 15237 killed at Wed Nov 28 11:03:08 EST 2012
ssl.sh: SSL3_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Wed Nov 28 11:03:08 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:03:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 15385 >/dev/null 2>/dev/null
selfserv with PID 15385 found at Wed Nov 28 11:03:08 EST 2012
selfserv with PID 15385 started at Wed Nov 28 11:03:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2881: SSL3_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 15385 >/dev/null 2>/dev/null
selfserv with PID 15385 found at Wed Nov 28 11:03:09 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2882: SSL3_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 15385 >/dev/null 2>/dev/null
selfserv with PID 15385 found at Wed Nov 28 11:03:09 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2883: SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 15385 >/dev/null 2>/dev/null
selfserv with PID 15385 found at Wed Nov 28 11:03:09 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2884: SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 15385 >/dev/null 2>/dev/null
selfserv with PID 15385 found at Wed Nov 28 11:03:09 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2885: SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 15385 >/dev/null 2>/dev/null
selfserv with PID 15385 found at Wed Nov 28 11:03:09 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2886: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 15385 >/dev/null 2>/dev/null
selfserv with PID 15385 found at Wed Nov 28 11:03:10 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2887: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 15385 >/dev/null 2>/dev/null
selfserv with PID 15385 found at Wed Nov 28 11:03:10 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2888: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 15385 >/dev/null 2>/dev/null
selfserv with PID 15385 found at Wed Nov 28 11:03:10 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2889: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 15385 >/dev/null 2>/dev/null
selfserv with PID 15385 found at Wed Nov 28 11:03:10 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2890: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 15385 >/dev/null 2>/dev/null
selfserv with PID 15385 found at Wed Nov 28 11:03:10 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2891: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 15385 >/dev/null 2>/dev/null
selfserv with PID 15385 found at Wed Nov 28 11:03:11 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2892: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 15385 >/dev/null 2>/dev/null
selfserv with PID 15385 found at Wed Nov 28 11:03:11 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2893: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 15385 >/dev/null 2>/dev/null
selfserv with PID 15385 found at Wed Nov 28 11:03:11 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2894: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 15385 >/dev/null 2>/dev/null
selfserv with PID 15385 found at Wed Nov 28 11:03:11 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2895: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 15385 at Wed Nov 28 11:03:12 EST 2012
kill -USR1 15385
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 15385 killed at Wed Nov 28 11:03:12 EST 2012
ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Wed Nov 28 11:03:12 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:03:12 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 15784 >/dev/null 2>/dev/null
selfserv with PID 15784 found at Wed Nov 28 11:03:12 EST 2012
selfserv with PID 15784 started at Wed Nov 28 11:03:12 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2896: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 15784 >/dev/null 2>/dev/null
selfserv with PID 15784 found at Wed Nov 28 11:03:12 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2897: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 15784 >/dev/null 2>/dev/null
selfserv with PID 15784 found at Wed Nov 28 11:03:12 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2898: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 15784 >/dev/null 2>/dev/null
selfserv with PID 15784 found at Wed Nov 28 11:03:12 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2899: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 15784 >/dev/null 2>/dev/null
selfserv with PID 15784 found at Wed Nov 28 11:03:12 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2900: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 15784 at Wed Nov 28 11:03:13 EST 2012
kill -USR1 15784
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 15784 killed at Wed Nov 28 11:03:13 EST 2012
ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Wed Nov 28 11:03:13 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:03:13 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 15932 >/dev/null 2>/dev/null
selfserv with PID 15932 found at Wed Nov 28 11:03:13 EST 2012
selfserv with PID 15932 started at Wed Nov 28 11:03:13 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2901: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 15932 >/dev/null 2>/dev/null
selfserv with PID 15932 found at Wed Nov 28 11:03:13 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2902: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 15932 >/dev/null 2>/dev/null
selfserv with PID 15932 found at Wed Nov 28 11:03:13 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2903: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 15932 >/dev/null 2>/dev/null
selfserv with PID 15932 found at Wed Nov 28 11:03:13 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2904: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 15932 >/dev/null 2>/dev/null
selfserv with PID 15932 found at Wed Nov 28 11:03:13 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2905: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 15932 >/dev/null 2>/dev/null
selfserv with PID 15932 found at Wed Nov 28 11:03:14 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2906: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 15932 >/dev/null 2>/dev/null
selfserv with PID 15932 found at Wed Nov 28 11:03:14 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2907: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 15932 >/dev/null 2>/dev/null
selfserv with PID 15932 found at Wed Nov 28 11:03:14 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2908: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 15932 >/dev/null 2>/dev/null
selfserv with PID 15932 found at Wed Nov 28 11:03:14 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2909: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 15932 >/dev/null 2>/dev/null
selfserv with PID 15932 found at Wed Nov 28 11:03:15 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2910: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 15932 >/dev/null 2>/dev/null
selfserv with PID 15932 found at Wed Nov 28 11:03:15 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2911: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 15932 >/dev/null 2>/dev/null
selfserv with PID 15932 found at Wed Nov 28 11:03:15 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2912: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 15932 >/dev/null 2>/dev/null
selfserv with PID 15932 found at Wed Nov 28 11:03:15 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2913: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 15932 >/dev/null 2>/dev/null
selfserv with PID 15932 found at Wed Nov 28 11:03:15 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2914: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 15932 >/dev/null 2>/dev/null
selfserv with PID 15932 found at Wed Nov 28 11:03:16 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2915: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 15932 at Wed Nov 28 11:03:16 EST 2012
kill -USR1 15932
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 15932 killed at Wed Nov 28 11:03:16 EST 2012
ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Wed Nov 28 11:03:16 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:03:16 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 16317 >/dev/null 2>/dev/null
selfserv with PID 16317 found at Wed Nov 28 11:03:16 EST 2012
selfserv with PID 16317 started at Wed Nov 28 11:03:16 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2916: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 16317 >/dev/null 2>/dev/null
selfserv with PID 16317 found at Wed Nov 28 11:03:16 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2917: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 16317 >/dev/null 2>/dev/null
selfserv with PID 16317 found at Wed Nov 28 11:03:16 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2918: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 16317 >/dev/null 2>/dev/null
selfserv with PID 16317 found at Wed Nov 28 11:03:17 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2919: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 16317 >/dev/null 2>/dev/null
selfserv with PID 16317 found at Wed Nov 28 11:03:17 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2920: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 16317 at Wed Nov 28 11:03:17 EST 2012
kill -USR1 16317
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 16317 killed at Wed Nov 28 11:03:17 EST 2012
ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Wed Nov 28 11:03:17 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:03:17 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 16465 >/dev/null 2>/dev/null
selfserv with PID 16465 found at Wed Nov 28 11:03:17 EST 2012
selfserv with PID 16465 started at Wed Nov 28 11:03:17 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2921: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 16465 >/dev/null 2>/dev/null
selfserv with PID 16465 found at Wed Nov 28 11:03:17 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2922: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 16465 >/dev/null 2>/dev/null
selfserv with PID 16465 found at Wed Nov 28 11:03:17 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2923: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 16465 >/dev/null 2>/dev/null
selfserv with PID 16465 found at Wed Nov 28 11:03:18 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2924: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 16465 >/dev/null 2>/dev/null
selfserv with PID 16465 found at Wed Nov 28 11:03:18 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2925: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 16465 at Wed Nov 28 11:03:18 EST 2012
kill -USR1 16465
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 16465 killed at Wed Nov 28 11:03:18 EST 2012
ssl.sh: SSL Client Authentication  - server normal/client fips  - with ECC ===============================
ssl.sh: skipping  TLS Request don't require client auth (client does not provide auth) (non-FIPS only)
ssl.sh: skipping  TLS Request don't require client auth (bad password) (non-FIPS only)
ssl.sh: skipping  TLS Request don't require client auth (client auth) (non-FIPS only)
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:03:18 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:03:18 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 16670 >/dev/null 2>/dev/null
selfserv with PID 16670 found at Wed Nov 28 11:03:18 EST 2012
selfserv with PID 16670 started at Wed Nov 28 11:03:18 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2926: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 16670 at Wed Nov 28 11:03:18 EST 2012
kill -USR1 16670
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 16670 killed at Wed Nov 28 11:03:18 EST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Wed Nov 28 11:03:18 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:03:18 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 16727 >/dev/null 2>/dev/null
selfserv with PID 16727 found at Wed Nov 28 11:03:18 EST 2012
selfserv with PID 16727 started at Wed Nov 28 11:03:18 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -w bogus -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12271:
SSL peer cannot verify your certificate.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
Incorrect password/PIN entered.
tstclnt: authentication of server cert failed: Peer's certificate has an invalid signature.
tstclnt: exiting with return code 254
ssl.sh: #2927: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 16727 at Wed Nov 28 11:03:20 EST 2012
kill -USR1 16727
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 16727 killed at Wed Nov 28 11:03:20 EST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Wed Nov 28 11:03:21 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:03:21 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 16784 >/dev/null 2>/dev/null
selfserv with PID 16784 found at Wed Nov 28 11:03:21 EST 2012
selfserv with PID 16784 started at Wed Nov 28 11:03:21 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -w nss -n TestUser   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2928: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 16784 at Wed Nov 28 11:03:21 EST 2012
kill -USR1 16784
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 16784 killed at Wed Nov 28 11:03:21 EST 2012
ssl.sh: skipping  SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only)
ssl.sh: skipping  SSL3 Request don't require client auth (bad password) (non-FIPS only)
ssl.sh: skipping  SSL3 Request don't require client auth (client auth) (non-FIPS only)
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:03:21 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:03:21 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 16847 >/dev/null 2>/dev/null
selfserv with PID 16847 found at Wed Nov 28 11:03:21 EST 2012
selfserv with PID 16847 started at Wed Nov 28 11:03:21 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2929: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 16847 at Wed Nov 28 11:03:21 EST 2012
kill -USR1 16847
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 16847 killed at Wed Nov 28 11:03:21 EST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Wed Nov 28 11:03:21 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:03:21 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 16904 >/dev/null 2>/dev/null
selfserv with PID 16904 found at Wed Nov 28 11:03:21 EST 2012
selfserv with PID 16904 started at Wed Nov 28 11:03:21 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V :ssl3 -n TestUser -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
Incorrect password/PIN entered.
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: No PKCS#11 token could be found to do a required operation.
tstclnt: exiting with return code 254
ssl.sh: #2930: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 16904 at Wed Nov 28 11:03:24 EST 2012
kill -USR1 16904
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 16904 killed at Wed Nov 28 11:03:24 EST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Wed Nov 28 11:03:24 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:03:24 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 16961 >/dev/null 2>/dev/null
selfserv with PID 16961 found at Wed Nov 28 11:03:24 EST 2012
selfserv with PID 16961 started at Wed Nov 28 11:03:24 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V :ssl3 -n TestUser -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2931: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 16961 at Wed Nov 28 11:03:24 EST 2012
kill -USR1 16961
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 16961 killed at Wed Nov 28 11:03:24 EST 2012
ssl.sh: skipping  TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only)
ssl.sh: skipping  TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only)
ssl.sh: skipping  TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only)
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:03:24 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:03:24 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 17024 >/dev/null 2>/dev/null
selfserv with PID 17024 found at Wed Nov 28 11:03:25 EST 2012
selfserv with PID 17024 started at Wed Nov 28 11:03:25 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2932: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 17024 at Wed Nov 28 11:03:25 EST 2012
kill -USR1 17024
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 17024 killed at Wed Nov 28 11:03:25 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:03:25 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:03:25 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 17081 >/dev/null 2>/dev/null
selfserv with PID 17081 found at Wed Nov 28 11:03:25 EST 2012
selfserv with PID 17081 started at Wed Nov 28 11:03:25 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w bogus -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: No PKCS#11 token could be found to do a required operation.
tstclnt: exiting with return code 254
ssl.sh: #2933: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 17081 at Wed Nov 28 11:03:27 EST 2012
kill -USR1 17081
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 17081 killed at Wed Nov 28 11:03:27 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:03:27 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:03:27 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 17138 >/dev/null 2>/dev/null
selfserv with PID 17138 found at Wed Nov 28 11:03:27 EST 2012
selfserv with PID 17138 started at Wed Nov 28 11:03:27 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2934: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17138 at Wed Nov 28 11:03:27 EST 2012
kill -USR1 17138
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 17138 killed at Wed Nov 28 11:03:27 EST 2012
ssl.sh: skipping  TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only)
ssl.sh: skipping  TLS 1.0 Request don't require client auth on 2nd hs (bad password) (non-FIPS only)
ssl.sh: skipping  TLS 1.0 Request don't require client auth on 2nd hs (client auth) (non-FIPS only)
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:03:27 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:03:27 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 17201 >/dev/null 2>/dev/null
selfserv with PID 17201 found at Wed Nov 28 11:03:27 EST 2012
selfserv with PID 17201 started at Wed Nov 28 11:03:27 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2935: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 17201 at Wed Nov 28 11:03:27 EST 2012
kill -USR1 17201
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 17201 killed at Wed Nov 28 11:03:27 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:03:28 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:03:28 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 17258 >/dev/null 2>/dev/null
selfserv with PID 17258 found at Wed Nov 28 11:03:28 EST 2012
selfserv with PID 17258 started at Wed Nov 28 11:03:28 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:tls1.0 -w bogus -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: No PKCS#11 token could be found to do a required operation.
tstclnt: exiting with return code 254
ssl.sh: #2936: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 17258 at Wed Nov 28 11:03:30 EST 2012
kill -USR1 17258
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 17258 killed at Wed Nov 28 11:03:30 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:03:30 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:03:30 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 17316 >/dev/null 2>/dev/null
selfserv with PID 17316 found at Wed Nov 28 11:03:30 EST 2012
selfserv with PID 17316 started at Wed Nov 28 11:03:30 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2937: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17316 at Wed Nov 28 11:03:30 EST 2012
kill -USR1 17316
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 17316 killed at Wed Nov 28 11:03:30 EST 2012
ssl.sh: skipping  SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only)
ssl.sh: skipping  SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only)
ssl.sh: skipping  SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only)
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:03:30 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:03:30 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 17379 >/dev/null 2>/dev/null
selfserv with PID 17379 found at Wed Nov 28 11:03:30 EST 2012
selfserv with PID 17379 started at Wed Nov 28 11:03:30 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2938: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 17379 at Wed Nov 28 11:03:30 EST 2012
kill -USR1 17379
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 17379 killed at Wed Nov 28 11:03:30 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:03:30 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:03:30 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 17436 >/dev/null 2>/dev/null
selfserv with PID 17436 found at Wed Nov 28 11:03:30 EST 2012
selfserv with PID 17436 started at Wed Nov 28 11:03:30 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: No PKCS#11 token could be found to do a required operation.
tstclnt: exiting with return code 254
ssl.sh: #2939: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 17436 at Wed Nov 28 11:03:32 EST 2012
kill -USR1 17436
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 17436 killed at Wed Nov 28 11:03:32 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:03:32 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:03:33 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 17493 >/dev/null 2>/dev/null
selfserv with PID 17493 found at Wed Nov 28 11:03:33 EST 2012
selfserv with PID 17493 started at Wed Nov 28 11:03:33 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2940: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17493 at Wed Nov 28 11:03:33 EST 2012
kill -USR1 17493
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 17493 killed at Wed Nov 28 11:03:33 EST 2012
ssl.sh: skipping  TLS Request don't require client auth (EC) (bad password) (non-FIPS only)
ssl.sh: skipping  TLS Request don't require client auth (EC) (client auth) (non-FIPS only)
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:03:33 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:03:33 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 17569 >/dev/null 2>/dev/null
selfserv with PID 17569 found at Wed Nov 28 11:03:33 EST 2012
selfserv with PID 17569 started at Wed Nov 28 11:03:33 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -w bogus -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12271:
SSL peer cannot verify your certificate.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
Incorrect password/PIN entered.
tstclnt: authentication of server cert failed: Peer's certificate has an invalid signature.
tstclnt: exiting with return code 254
ssl.sh: #2941: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 17569 at Wed Nov 28 11:03:35 EST 2012
kill -USR1 17569
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 17569 killed at Wed Nov 28 11:03:35 EST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:03:35 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:03:35 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 17626 >/dev/null 2>/dev/null
selfserv with PID 17626 found at Wed Nov 28 11:03:35 EST 2012
selfserv with PID 17626 started at Wed Nov 28 11:03:35 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -w nss -n TestUser-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2942: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17626 at Wed Nov 28 11:03:35 EST 2012
kill -USR1 17626
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 17626 killed at Wed Nov 28 11:03:35 EST 2012
ssl.sh: skipping  SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only)
ssl.sh: skipping  SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only)
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:03:35 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:03:35 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 17687 >/dev/null 2>/dev/null
selfserv with PID 17687 found at Wed Nov 28 11:03:35 EST 2012
selfserv with PID 17687 started at Wed Nov 28 11:03:35 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V :ssl3 -n TestUser-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
Incorrect password/PIN entered.
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: No PKCS#11 token could be found to do a required operation.
tstclnt: exiting with return code 254
ssl.sh: #2943: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 17687 at Wed Nov 28 11:03:39 EST 2012
kill -USR1 17687
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 17687 killed at Wed Nov 28 11:03:39 EST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:03:39 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:03:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 17744 >/dev/null 2>/dev/null
selfserv with PID 17744 found at Wed Nov 28 11:03:39 EST 2012
selfserv with PID 17744 started at Wed Nov 28 11:03:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V :ssl3 -n TestUser-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2944: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17744 at Wed Nov 28 11:03:39 EST 2012
kill -USR1 17744
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 17744 killed at Wed Nov 28 11:03:39 EST 2012
ssl.sh: skipping  TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only)
ssl.sh: skipping  TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only)
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:03:39 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:03:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 17805 >/dev/null 2>/dev/null
selfserv with PID 17805 found at Wed Nov 28 11:03:39 EST 2012
selfserv with PID 17805 started at Wed Nov 28 11:03:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w bogus -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: No PKCS#11 token could be found to do a required operation.
tstclnt: exiting with return code 254
ssl.sh: #2945: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 17805 at Wed Nov 28 11:03:41 EST 2012
kill -USR1 17805
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 17805 killed at Wed Nov 28 11:03:41 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:03:41 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:03:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 17862 >/dev/null 2>/dev/null
selfserv with PID 17862 found at Wed Nov 28 11:03:41 EST 2012
selfserv with PID 17862 started at Wed Nov 28 11:03:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2946: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17862 at Wed Nov 28 11:03:41 EST 2012
kill -USR1 17862
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 17862 killed at Wed Nov 28 11:03:41 EST 2012
ssl.sh: skipping  TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only)
ssl.sh: skipping  TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only)
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:03:41 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:03:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 17923 >/dev/null 2>/dev/null
selfserv with PID 17923 found at Wed Nov 28 11:03:41 EST 2012
selfserv with PID 17923 started at Wed Nov 28 11:03:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:tls1.0 -w bogus -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: No PKCS#11 token could be found to do a required operation.
tstclnt: exiting with return code 254
ssl.sh: #2947: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 17923 at Wed Nov 28 11:03:43 EST 2012
kill -USR1 17923
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 17923 killed at Wed Nov 28 11:03:44 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:03:44 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:03:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 17980 >/dev/null 2>/dev/null
selfserv with PID 17980 found at Wed Nov 28 11:03:44 EST 2012
selfserv with PID 17980 started at Wed Nov 28 11:03:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n TestUser-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2948: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17980 at Wed Nov 28 11:03:44 EST 2012
kill -USR1 17980
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 17980 killed at Wed Nov 28 11:03:44 EST 2012
ssl.sh: skipping  SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only)
ssl.sh: skipping  SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only)
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:03:44 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:03:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 18041 >/dev/null 2>/dev/null
selfserv with PID 18041 found at Wed Nov 28 11:03:44 EST 2012
selfserv with PID 18041 started at Wed Nov 28 11:03:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: No PKCS#11 token could be found to do a required operation.
tstclnt: exiting with return code 254
ssl.sh: #2949: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 18041 at Wed Nov 28 11:03:46 EST 2012
kill -USR1 18041
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 18041 killed at Wed Nov 28 11:03:46 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:03:46 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:03:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 18098 >/dev/null 2>/dev/null
selfserv with PID 18098 found at Wed Nov 28 11:03:46 EST 2012
selfserv with PID 18098 started at Wed Nov 28 11:03:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2950: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18098 at Wed Nov 28 11:03:46 EST 2012
kill -USR1 18098
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 18098 killed at Wed Nov 28 11:03:46 EST 2012
ssl.sh: TLS Server hello response without SNI ----
selfserv starting at Wed Nov 28 11:03:46 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:03:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 18176 >/dev/null 2>/dev/null
selfserv with PID 18176 found at Wed Nov 28 11:03:46 EST 2012
selfserv with PID 18176 started at Wed Nov 28 11:03:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2951: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18176 at Wed Nov 28 11:03:47 EST 2012
kill -USR1 18176
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 18176 killed at Wed Nov 28 11:03:47 EST 2012
ssl.sh: TLS Server hello response with SNI ----
selfserv starting at Wed Nov 28 11:03:47 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:03:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 18239 >/dev/null 2>/dev/null
selfserv with PID 18239 found at Wed Nov 28 11:03:47 EST 2012
selfserv with PID 18239 started at Wed Nov 28 11:03:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser -a buildnss02-sni.usersys.redhat.com  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02-sni.usersys.redhat.com,E=buildnss02-sni.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2952: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18239 at Wed Nov 28 11:03:47 EST 2012
kill -USR1 18239
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 18239 killed at Wed Nov 28 11:03:47 EST 2012
ssl.sh: TLS Server response with alert ----
selfserv starting at Wed Nov 28 11:03:47 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:03:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 18302 >/dev/null 2>/dev/null
selfserv with PID 18302 found at Wed Nov 28 11:03:47 EST 2012
selfserv with PID 18302 started at Wed Nov 28 11:03:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser -a buildnss02-sni1.usersys.redhat.com  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 254
ssl.sh: #2953: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 18302 at Wed Nov 28 11:03:47 EST 2012
kill -USR1 18302
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 18302 killed at Wed Nov 28 11:03:47 EST 2012
ssl.sh: SSL3 Server hello response without SNI ----
selfserv starting at Wed Nov 28 11:03:47 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:03:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 18365 >/dev/null 2>/dev/null
selfserv with PID 18365 found at Wed Nov 28 11:03:47 EST 2012
selfserv with PID 18365 started at Wed Nov 28 11:03:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:ssl3 -w nss -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2954: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18365 at Wed Nov 28 11:03:47 EST 2012
kill -USR1 18365
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 18365 killed at Wed Nov 28 11:03:47 EST 2012
ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ----
selfserv starting at Wed Nov 28 11:03:47 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:03:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 18428 >/dev/null 2>/dev/null
selfserv with PID 18428 found at Wed Nov 28 11:03:47 EST 2012
selfserv with PID 18428 started at Wed Nov 28 11:03:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:ssl3 -w nss -n TestUser -a buildnss02-sni.usersys.redhat.com  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12271:
SSL peer cannot verify your certificate.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: authentication of server cert failed: Unable to communicate securely with peer: requested domain name does not match the server's certificate.
tstclnt: exiting with return code 254
ssl.sh: #2955: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 18428 at Wed Nov 28 11:03:48 EST 2012
kill -USR1 18428
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 18428 killed at Wed Nov 28 11:03:48 EST 2012
ssl.sh: TLS Server hello response without SNI ----
selfserv starting at Wed Nov 28 11:03:48 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:03:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 18491 >/dev/null 2>/dev/null
selfserv with PID 18491 found at Wed Nov 28 11:03:48 EST 2012
selfserv with PID 18491 started at Wed Nov 28 11:03:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2956: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18491 at Wed Nov 28 11:03:48 EST 2012
kill -USR1 18491
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 18491 killed at Wed Nov 28 11:03:48 EST 2012
ssl.sh: TLS Server hello response with SNI ----
selfserv starting at Wed Nov 28 11:03:48 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:03:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 18554 >/dev/null 2>/dev/null
selfserv with PID 18554 found at Wed Nov 28 11:03:48 EST 2012
selfserv with PID 18554 started at Wed Nov 28 11:03:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser -a buildnss02-sni.usersys.redhat.com  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02-sni.usersys.redhat.com,E=buildnss02-sni.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02-sni.usersys.redhat.com,E=buildnss02-sni.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2957: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18554 at Wed Nov 28 11:03:48 EST 2012
kill -USR1 18554
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 18554 killed at Wed Nov 28 11:03:48 EST 2012
ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ----
selfserv starting at Wed Nov 28 11:03:48 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:03:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 18617 >/dev/null 2>/dev/null
selfserv with PID 18617 found at Wed Nov 28 11:03:48 EST 2012
selfserv with PID 18617 started at Wed Nov 28 11:03:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser -a buildnss02-sni.usersys.redhat.com -a buildnss02.usersys.redhat.com  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02-sni.usersys.redhat.com,E=buildnss02-sni.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: Cannot communicate securely with peer: no common encryption algorithm(s).
tstclnt: exiting with return code 1
ssl.sh: #2958: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 18617 at Wed Nov 28 11:03:48 EST 2012
kill -USR1 18617
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 18617 killed at Wed Nov 28 11:03:48 EST 2012
ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ----
selfserv starting at Wed Nov 28 11:03:48 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:03:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 18680 >/dev/null 2>/dev/null
selfserv with PID 18680 found at Wed Nov 28 11:03:48 EST 2012
selfserv with PID 18680 started at Wed Nov 28 11:03:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser -a buildnss02-sni.usersys.redhat.com -a buildnss02-sni1.usersys.redhat.com  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02-sni.usersys.redhat.com,E=buildnss02-sni.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 1
ssl.sh: #2959: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 18680 at Wed Nov 28 11:03:49 EST 2012
kill -USR1 18680
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 18680 killed at Wed Nov 28 11:03:49 EST 2012
ssl.sh: TLS Server response with alert ----
selfserv starting at Wed Nov 28 11:03:49 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:03:49 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 18743 >/dev/null 2>/dev/null
selfserv with PID 18743 found at Wed Nov 28 11:03:49 EST 2012
selfserv with PID 18743 started at Wed Nov 28 11:03:49 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser -a buildnss02-sni1.usersys.redhat.com  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 254
ssl.sh: #2960: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 18743 at Wed Nov 28 11:03:49 EST 2012
kill -USR1 18743
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 18743 killed at Wed Nov 28 11:03:49 EST 2012
ssl.sh: SSL Stress Test  - server normal/client fips  - with ECC ===============================
ssl.sh: skipping  Form is subject to the terms of the Mozilla Public (non-FIPS only)
ssl.sh: skipping  If a copy of the MPL was not distributed with this (non-FIPS only)
ssl.sh: skipping  obtain one at http://mozilla.org/MPL/2.0/. (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  the stress tests for SSL/TLS. (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  client                         Test Case name (non-FIPS only)
ssl.sh: skipping  params (non-FIPS only)
ssl.sh: skipping  ------                         --------------- (non-FIPS only)
ssl.sh: skipping  Stress SSL2 RC4 128 with MD5 (non-FIPS only)
ssl.sh: skipping  Stress SSL3 RC4 128 with MD5 (non-FIPS only)
ssl.sh: skipping  Stress TLS  RC4 128 with MD5 (non-FIPS only)
ssl.sh: skipping  Stress TLS  RC4 128 with MD5 (false start) (non-FIPS only)
ssl.sh: skipping  Stress TLS  RC4 128 with MD5 (session ticket) (non-FIPS only)
ssl.sh: skipping  Stress TLS  RC4 128 with MD5 (compression) (non-FIPS only)
ssl.sh: skipping  Stress TLS  RC4 128 with MD5 (session ticket, compression) (non-FIPS only)
ssl.sh: skipping  Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) (non-FIPS only)
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI) (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  versions here... (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  Stress SSL2 RC4 128 with MD5 (no reuse, client auth) (non-FIPS only)
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Wed Nov 28 11:03:49 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:03:49 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 18897 >/dev/null 2>/dev/null
selfserv with PID 18897 found at Wed Nov 28 11:03:49 EST 2012
selfserv with PID 18897 started at Wed Nov 28 11:03:49 EST 2012
strsclnt -q -p 8546 -d ../client  -w nss -c 100 -C c -V :ssl3 -N -n TestUser \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:03:49 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed Nov 28 11:03:49 EST 2012
ssl.sh: #2961: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 18897 at Wed Nov 28 11:03:49 EST 2012
kill -USR1 18897
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 18897 killed at Wed Nov 28 11:03:49 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Wed Nov 28 11:03:49 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:03:49 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 18972 >/dev/null 2>/dev/null
selfserv with PID 18972 found at Wed Nov 28 11:03:49 EST 2012
selfserv with PID 18972 started at Wed Nov 28 11:03:49 EST 2012
strsclnt -q -p 8546 -d ../client  -w nss -c 100 -C c -N -n TestUser \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:03:49 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed Nov 28 11:03:50 EST 2012
ssl.sh: #2962: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 18972 at Wed Nov 28 11:03:50 EST 2012
kill -USR1 18972
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 18972 killed at Wed Nov 28 11:03:50 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Wed Nov 28 11:03:50 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:03:50 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 19047 >/dev/null 2>/dev/null
selfserv with PID 19047 found at Wed Nov 28 11:03:50 EST 2012
selfserv with PID 19047 started at Wed Nov 28 11:03:50 EST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V ssl3: -c 100 -C c -n TestUser -u \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:03:50 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Wed Nov 28 11:03:50 EST 2012
ssl.sh: #2963: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 19047 at Wed Nov 28 11:03:50 EST 2012
kill -USR1 19047
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 19047 killed at Wed Nov 28 11:03:50 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Wed Nov 28 11:03:50 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:03:50 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 19123 >/dev/null 2>/dev/null
selfserv with PID 19123 found at Wed Nov 28 11:03:50 EST 2012
selfserv with PID 19123 started at Wed Nov 28 11:03:50 EST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V ssl3: -c 100 -C c -n TestUser -z \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:03:50 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:03:50 EST 2012
ssl.sh: #2964: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 19123 at Wed Nov 28 11:03:50 EST 2012
kill -USR1 19123
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 19123 killed at Wed Nov 28 11:03:50 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Wed Nov 28 11:03:51 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:03:51 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 19199 >/dev/null 2>/dev/null
selfserv with PID 19199 found at Wed Nov 28 11:03:51 EST 2012
selfserv with PID 19199 started at Wed Nov 28 11:03:51 EST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V ssl3: -c 100 -C c -n TestUser -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:03:51 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:03:51 EST 2012
ssl.sh: #2965: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 19199 at Wed Nov 28 11:03:51 EST 2012
kill -USR1 19199
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 19199 killed at Wed Nov 28 11:03:51 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Wed Nov 28 11:03:51 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:03:51 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 19275 >/dev/null 2>/dev/null
selfserv with PID 19275 found at Wed Nov 28 11:03:51 EST 2012
selfserv with PID 19275 started at Wed Nov 28 11:03:51 EST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V ssl3: -c 100 -C c -n TestUser -u -z \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:03:51 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Wed Nov 28 11:03:51 EST 2012
ssl.sh: #2966: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 19275 at Wed Nov 28 11:03:51 EST 2012
kill -USR1 19275
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 19275 killed at Wed Nov 28 11:03:51 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Wed Nov 28 11:03:51 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:03:51 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 19351 >/dev/null 2>/dev/null
selfserv with PID 19351 found at Wed Nov 28 11:03:51 EST 2012
selfserv with PID 19351 started at Wed Nov 28 11:03:51 EST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V ssl3: -c 100 -C c -n TestUser -u -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:03:51 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Wed Nov 28 11:03:51 EST 2012
ssl.sh: #2967: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 19351 at Wed Nov 28 11:03:51 EST 2012
kill -USR1 19351
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 19351 killed at Wed Nov 28 11:03:51 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ----
selfserv starting at Wed Nov 28 11:03:51 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:03:51 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 19433 >/dev/null 2>/dev/null
selfserv with PID 19433 found at Wed Nov 28 11:03:51 EST 2012
selfserv with PID 19433 started at Wed Nov 28 11:03:51 EST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V tls1.0: -c 1000 -C c -u \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:03:51 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Wed Nov 28 11:03:52 EST 2012
ssl.sh: #2968: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 19433 at Wed Nov 28 11:03:52 EST 2012
kill -USR1 19433
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 19433 killed at Wed Nov 28 11:03:52 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ----
selfserv starting at Wed Nov 28 11:03:52 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -a buildnss02-sni.usersys.redhat.com -k buildnss02-sni.usersys.redhat.com -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:03:52 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 19515 >/dev/null 2>/dev/null
selfserv with PID 19515 found at Wed Nov 28 11:03:52 EST 2012
selfserv with PID 19515 started at Wed Nov 28 11:03:52 EST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V tls1.0: -c 1000 -C c -u -a buildnss02-sni.usersys.redhat.com \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:03:52 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Wed Nov 28 11:03:52 EST 2012
ssl.sh: #2969: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 19515 at Wed Nov 28 11:03:52 EST 2012
kill -USR1 19515
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 19515 killed at Wed Nov 28 11:03:52 EST 2012
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  ############################ (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (non-FIPS only)
ssl.sh: skipping  Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA (non-FIPS only)
ssl.sh: skipping  Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) (non-FIPS only)
ssl.sh: skipping  Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) (non-FIPS only)
ssl.sh: skipping  Stress TLS  ECDHE-RSA   AES 128 CBC with SHA (non-FIPS only)
ssl.sh: skipping  Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  versions here... (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Wed Nov 28 11:03:53 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C009 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:03:53 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 19639 >/dev/null 2>/dev/null
selfserv with PID 19639 found at Wed Nov 28 11:03:53 EST 2012
selfserv with PID 19639 started at Wed Nov 28 11:03:53 EST 2012
strsclnt -q -p 8546 -d ../client  -w nss -c 10 -C :C009 -N -V :ssl3 -n TestUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:03:53 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Wed Nov 28 11:03:53 EST 2012
ssl.sh: #2970: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 19639 at Wed Nov 28 11:03:53 EST 2012
kill -USR1 19639
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 19639 killed at Wed Nov 28 11:03:53 EST 2012
ssl.sh: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) ----
selfserv starting at Wed Nov 28 11:03:53 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:03:53 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 19714 >/dev/null 2>/dev/null
selfserv with PID 19714 found at Wed Nov 28 11:03:53 EST 2012
selfserv with PID 19714 started at Wed Nov 28 11:03:53 EST 2012
strsclnt -q -p 8546 -d ../client  -w nss -c 100 -C :C013 -V :ssl3 -n TestUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:03:53 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:03:53 EST 2012
ssl.sh: #2971: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 19714 at Wed Nov 28 11:03:53 EST 2012
kill -USR1 19714
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 19714 killed at Wed Nov 28 11:03:53 EST 2012
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Wed Nov 28 11:03:53 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C004 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:03:53 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 19790 >/dev/null 2>/dev/null
selfserv with PID 19790 found at Wed Nov 28 11:03:53 EST 2012
selfserv with PID 19790 started at Wed Nov 28 11:03:53 EST 2012
strsclnt -q -p 8546 -d ../client  -w nss -c 10 -C :C004 -N -n TestUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:03:53 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Wed Nov 28 11:03:54 EST 2012
ssl.sh: #2972: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 19790 at Wed Nov 28 11:03:54 EST 2012
kill -USR1 19790
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 19790 killed at Wed Nov 28 11:03:54 EST 2012
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Wed Nov 28 11:03:54 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -r -r -c :C00E -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:03:54 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 19865 >/dev/null 2>/dev/null
selfserv with PID 19865 found at Wed Nov 28 11:03:54 EST 2012
selfserv with PID 19865 started at Wed Nov 28 11:03:54 EST 2012
strsclnt -q -p 8546 -d ../client  -w nss -c 10 -C :C00E -N -n TestUser-ecmixed \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:03:54 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Wed Nov 28 11:03:54 EST 2012
ssl.sh: #2973: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 19865 at Wed Nov 28 11:03:54 EST 2012
kill -USR1 19865
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 19865 killed at Wed Nov 28 11:03:54 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ----
selfserv starting at Wed Nov 28 11:03:54 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:03:54 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 19941 >/dev/null 2>/dev/null
selfserv with PID 19941 found at Wed Nov 28 11:03:54 EST 2012
selfserv with PID 19941 started at Wed Nov 28 11:03:54 EST 2012
strsclnt -q -p 8546 -d ../client  -w nss -c 100 -C :C013 -n TestUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:03:54 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:03:54 EST 2012
ssl.sh: #2974: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 19941 at Wed Nov 28 11:03:54 EST 2012
kill -USR1 19941
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 19941 killed at Wed Nov 28 11:03:54 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ----
selfserv starting at Wed Nov 28 11:03:54 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -u -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:03:54 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 20017 >/dev/null 2>/dev/null
selfserv with PID 20017 found at Wed Nov 28 11:03:54 EST 2012
selfserv with PID 20017 started at Wed Nov 28 11:03:54 EST 2012
strsclnt -q -p 8546 -d ../client  -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec -u \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:03:54 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Wed Nov 28 11:03:55 EST 2012
ssl.sh: #2975: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 20017 at Wed Nov 28 11:03:55 EST 2012
kill -USR1 20017
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 20017 killed at Wed Nov 28 11:03:55 EST 2012
ssl.sh: SSL Cipher Coverage Extended Test - server normal/client fips  - with ECC ===============================
selfserv starting at Wed Nov 28 11:03:55 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:03:55 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 20080 >/dev/null 2>/dev/null
selfserv with PID 20080 found at Wed Nov 28 11:03:55 EST 2012
selfserv with PID 20080 started at Wed Nov 28 11:03:55 EST 2012
ssl.sh: skipping  SSL2_RC4_128_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC2_128_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_DES_64_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_DES_192_EDE3_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC2_128_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_DES_64_CBC_WITH_MD5 for Extended Test
ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 20080 >/dev/null 2>/dev/null
selfserv with PID 20080 found at Wed Nov 28 11:03:55 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c c -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2976: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 20080 >/dev/null 2>/dev/null
selfserv with PID 20080 found at Wed Nov 28 11:03:55 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c d -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2977: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 20080 >/dev/null 2>/dev/null
selfserv with PID 20080 found at Wed Nov 28 11:03:55 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c e -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2978: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ----------------------------
kill -0 20080 >/dev/null 2>/dev/null
selfserv with PID 20080 found at Wed Nov 28 11:03:56 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c i -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2979: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 20080 >/dev/null 2>/dev/null
selfserv with PID 20080 found at Wed Nov 28 11:03:56 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c j -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2980: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 20080 >/dev/null 2>/dev/null
selfserv with PID 20080 found at Wed Nov 28 11:03:56 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c k -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2981: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 20080 >/dev/null 2>/dev/null
selfserv with PID 20080 found at Wed Nov 28 11:03:56 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c n -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2982: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 20080 >/dev/null 2>/dev/null
selfserv with PID 20080 found at Wed Nov 28 11:03:56 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c v -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2983: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 20080 >/dev/null 2>/dev/null
selfserv with PID 20080 found at Wed Nov 28 11:03:56 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c y -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2984: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_SHA ----------------------------
kill -0 20080 >/dev/null 2>/dev/null
selfserv with PID 20080 found at Wed Nov 28 11:03:57 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c z -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2985: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 20080 >/dev/null 2>/dev/null
selfserv with PID 20080 found at Wed Nov 28 11:03:57 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c c -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2986: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 20080 >/dev/null 2>/dev/null
selfserv with PID 20080 found at Wed Nov 28 11:03:57 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c d -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2987: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 20080 >/dev/null 2>/dev/null
selfserv with PID 20080 found at Wed Nov 28 11:03:57 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c e -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2988: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running TLS_RSA_WITH_NULL_MD5 ----------------------------
kill -0 20080 >/dev/null 2>/dev/null
selfserv with PID 20080 found at Wed Nov 28 11:03:57 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c i -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2989: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 20080 >/dev/null 2>/dev/null
selfserv with PID 20080 found at Wed Nov 28 11:03:58 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c j -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2990: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 20080 >/dev/null 2>/dev/null
selfserv with PID 20080 found at Wed Nov 28 11:03:58 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c k -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2991: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 20080 >/dev/null 2>/dev/null
selfserv with PID 20080 found at Wed Nov 28 11:03:58 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c n -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2992: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 20080 >/dev/null 2>/dev/null
selfserv with PID 20080 found at Wed Nov 28 11:03:58 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c v -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2993: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 20080 >/dev/null 2>/dev/null
selfserv with PID 20080 found at Wed Nov 28 11:03:58 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c y -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2994: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_SHA ----------------------------
kill -0 20080 >/dev/null 2>/dev/null
selfserv with PID 20080 found at Wed Nov 28 11:03:58 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c z -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2995: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 20080 >/dev/null 2>/dev/null
selfserv with PID 20080 found at Wed Nov 28 11:03:59 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c c -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2996: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 20080 >/dev/null 2>/dev/null
selfserv with PID 20080 found at Wed Nov 28 11:03:59 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c d -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2997: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 20080 >/dev/null 2>/dev/null
selfserv with PID 20080 found at Wed Nov 28 11:03:59 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c e -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2998: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  f    TLS11_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping  g    TLS11_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ----------------------------
kill -0 20080 >/dev/null 2>/dev/null
selfserv with PID 20080 found at Wed Nov 28 11:03:59 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c i -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2999: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 20080 >/dev/null 2>/dev/null
selfserv with PID 20080 found at Wed Nov 28 11:03:59 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c j -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3000: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 20080 >/dev/null 2>/dev/null
selfserv with PID 20080 found at Wed Nov 28 11:04:00 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c k -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3001: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 20080 >/dev/null 2>/dev/null
selfserv with PID 20080 found at Wed Nov 28 11:04:00 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c n -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3002: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 20080 >/dev/null 2>/dev/null
selfserv with PID 20080 found at Wed Nov 28 11:04:00 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c v -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3003: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 20080 >/dev/null 2>/dev/null
selfserv with PID 20080 found at Wed Nov 28 11:04:00 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c y -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3004: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_SHA ----------------------------
kill -0 20080 >/dev/null 2>/dev/null
selfserv with PID 20080 found at Wed Nov 28 11:04:00 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c z -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3005: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 20080 >/dev/null 2>/dev/null
selfserv with PID 20080 found at Wed Nov 28 11:04:01 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3006: SSL3_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 20080 >/dev/null 2>/dev/null
selfserv with PID 20080 found at Wed Nov 28 11:04:01 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3007: SSL3_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 20080 >/dev/null 2>/dev/null
selfserv with PID 20080 found at Wed Nov 28 11:04:01 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3008: SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 20080 >/dev/null 2>/dev/null
selfserv with PID 20080 found at Wed Nov 28 11:04:01 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3009: SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 20080 >/dev/null 2>/dev/null
selfserv with PID 20080 found at Wed Nov 28 11:04:01 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3010: SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 20080 >/dev/null 2>/dev/null
selfserv with PID 20080 found at Wed Nov 28 11:04:02 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3011: SSL3_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 20080 >/dev/null 2>/dev/null
selfserv with PID 20080 found at Wed Nov 28 11:04:02 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3012: SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 20080 >/dev/null 2>/dev/null
selfserv with PID 20080 found at Wed Nov 28 11:04:02 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3013: SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 20080 >/dev/null 2>/dev/null
selfserv with PID 20080 found at Wed Nov 28 11:04:02 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3014: SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 20080 >/dev/null 2>/dev/null
selfserv with PID 20080 found at Wed Nov 28 11:04:03 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3015: SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 20080 at Wed Nov 28 11:04:03 EST 2012
kill -USR1 20080
selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 20080 killed at Wed Nov 28 11:04:03 EST 2012
ssl.sh: SSL3_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Wed Nov 28 11:04:03 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:04:03 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 21315 >/dev/null 2>/dev/null
selfserv with PID 21315 found at Wed Nov 28 11:04:03 EST 2012
selfserv with PID 21315 started at Wed Nov 28 11:04:03 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3016: SSL3_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 21315 >/dev/null 2>/dev/null
selfserv with PID 21315 found at Wed Nov 28 11:04:03 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3017: SSL3_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 21315 >/dev/null 2>/dev/null
selfserv with PID 21315 found at Wed Nov 28 11:04:03 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3018: SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 21315 >/dev/null 2>/dev/null
selfserv with PID 21315 found at Wed Nov 28 11:04:03 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3019: SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 21315 >/dev/null 2>/dev/null
selfserv with PID 21315 found at Wed Nov 28 11:04:04 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3020: SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 21315 at Wed Nov 28 11:04:04 EST 2012
kill -USR1 21315
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 21315 killed at Wed Nov 28 11:04:04 EST 2012
ssl.sh: SSL3_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Wed Nov 28 11:04:04 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:04:04 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 21463 >/dev/null 2>/dev/null
selfserv with PID 21463 found at Wed Nov 28 11:04:04 EST 2012
selfserv with PID 21463 started at Wed Nov 28 11:04:04 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3021: SSL3_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 21463 >/dev/null 2>/dev/null
selfserv with PID 21463 found at Wed Nov 28 11:04:04 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3022: SSL3_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 21463 >/dev/null 2>/dev/null
selfserv with PID 21463 found at Wed Nov 28 11:04:04 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3023: SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 21463 >/dev/null 2>/dev/null
selfserv with PID 21463 found at Wed Nov 28 11:04:04 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3024: SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 21463 >/dev/null 2>/dev/null
selfserv with PID 21463 found at Wed Nov 28 11:04:05 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3025: SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 21463 >/dev/null 2>/dev/null
selfserv with PID 21463 found at Wed Nov 28 11:04:05 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3026: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 21463 >/dev/null 2>/dev/null
selfserv with PID 21463 found at Wed Nov 28 11:04:05 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3027: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 21463 >/dev/null 2>/dev/null
selfserv with PID 21463 found at Wed Nov 28 11:04:05 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3028: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 21463 >/dev/null 2>/dev/null
selfserv with PID 21463 found at Wed Nov 28 11:04:06 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3029: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 21463 >/dev/null 2>/dev/null
selfserv with PID 21463 found at Wed Nov 28 11:04:06 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3030: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 21463 >/dev/null 2>/dev/null
selfserv with PID 21463 found at Wed Nov 28 11:04:06 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3031: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 21463 >/dev/null 2>/dev/null
selfserv with PID 21463 found at Wed Nov 28 11:04:06 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3032: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 21463 >/dev/null 2>/dev/null
selfserv with PID 21463 found at Wed Nov 28 11:04:06 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3033: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 21463 >/dev/null 2>/dev/null
selfserv with PID 21463 found at Wed Nov 28 11:04:07 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3034: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 21463 >/dev/null 2>/dev/null
selfserv with PID 21463 found at Wed Nov 28 11:04:07 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3035: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 21463 at Wed Nov 28 11:04:07 EST 2012
kill -USR1 21463
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 21463 killed at Wed Nov 28 11:04:07 EST 2012
ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Wed Nov 28 11:04:07 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:04:07 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 21862 >/dev/null 2>/dev/null
selfserv with PID 21862 found at Wed Nov 28 11:04:07 EST 2012
selfserv with PID 21862 started at Wed Nov 28 11:04:07 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3036: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 21862 >/dev/null 2>/dev/null
selfserv with PID 21862 found at Wed Nov 28 11:04:07 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3037: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 21862 >/dev/null 2>/dev/null
selfserv with PID 21862 found at Wed Nov 28 11:04:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3038: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 21862 >/dev/null 2>/dev/null
selfserv with PID 21862 found at Wed Nov 28 11:04:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3039: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 21862 >/dev/null 2>/dev/null
selfserv with PID 21862 found at Wed Nov 28 11:04:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3040: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 21862 at Wed Nov 28 11:04:08 EST 2012
kill -USR1 21862
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 21862 killed at Wed Nov 28 11:04:08 EST 2012
ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Wed Nov 28 11:04:08 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:04:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 22010 >/dev/null 2>/dev/null
selfserv with PID 22010 found at Wed Nov 28 11:04:08 EST 2012
selfserv with PID 22010 started at Wed Nov 28 11:04:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3041: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 22010 >/dev/null 2>/dev/null
selfserv with PID 22010 found at Wed Nov 28 11:04:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3042: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 22010 >/dev/null 2>/dev/null
selfserv with PID 22010 found at Wed Nov 28 11:04:09 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3043: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 22010 >/dev/null 2>/dev/null
selfserv with PID 22010 found at Wed Nov 28 11:04:09 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3044: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 22010 >/dev/null 2>/dev/null
selfserv with PID 22010 found at Wed Nov 28 11:04:09 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3045: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 22010 >/dev/null 2>/dev/null
selfserv with PID 22010 found at Wed Nov 28 11:04:09 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3046: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 22010 >/dev/null 2>/dev/null
selfserv with PID 22010 found at Wed Nov 28 11:04:09 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3047: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 22010 >/dev/null 2>/dev/null
selfserv with PID 22010 found at Wed Nov 28 11:04:10 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3048: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 22010 >/dev/null 2>/dev/null
selfserv with PID 22010 found at Wed Nov 28 11:04:10 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3049: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 22010 >/dev/null 2>/dev/null
selfserv with PID 22010 found at Wed Nov 28 11:04:10 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3050: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 22010 >/dev/null 2>/dev/null
selfserv with PID 22010 found at Wed Nov 28 11:04:10 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3051: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 22010 >/dev/null 2>/dev/null
selfserv with PID 22010 found at Wed Nov 28 11:04:11 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3052: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 22010 >/dev/null 2>/dev/null
selfserv with PID 22010 found at Wed Nov 28 11:04:11 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3053: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 22010 >/dev/null 2>/dev/null
selfserv with PID 22010 found at Wed Nov 28 11:04:11 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3054: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 22010 >/dev/null 2>/dev/null
selfserv with PID 22010 found at Wed Nov 28 11:04:11 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3055: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 22010 at Wed Nov 28 11:04:11 EST 2012
kill -USR1 22010
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 22010 killed at Wed Nov 28 11:04:11 EST 2012
ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Wed Nov 28 11:04:11 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:04:11 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 22395 >/dev/null 2>/dev/null
selfserv with PID 22395 found at Wed Nov 28 11:04:11 EST 2012
selfserv with PID 22395 started at Wed Nov 28 11:04:11 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3056: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 22395 >/dev/null 2>/dev/null
selfserv with PID 22395 found at Wed Nov 28 11:04:12 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3057: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 22395 >/dev/null 2>/dev/null
selfserv with PID 22395 found at Wed Nov 28 11:04:12 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3058: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 22395 >/dev/null 2>/dev/null
selfserv with PID 22395 found at Wed Nov 28 11:04:12 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3059: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 22395 >/dev/null 2>/dev/null
selfserv with PID 22395 found at Wed Nov 28 11:04:12 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3060: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 22395 at Wed Nov 28 11:04:12 EST 2012
kill -USR1 22395
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 22395 killed at Wed Nov 28 11:04:12 EST 2012
ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Wed Nov 28 11:04:13 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:04:13 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 22543 >/dev/null 2>/dev/null
selfserv with PID 22543 found at Wed Nov 28 11:04:13 EST 2012
selfserv with PID 22543 started at Wed Nov 28 11:04:13 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3061: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 22543 >/dev/null 2>/dev/null
selfserv with PID 22543 found at Wed Nov 28 11:04:13 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3062: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 22543 >/dev/null 2>/dev/null
selfserv with PID 22543 found at Wed Nov 28 11:04:13 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3063: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 22543 >/dev/null 2>/dev/null
selfserv with PID 22543 found at Wed Nov 28 11:04:13 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3064: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 22543 >/dev/null 2>/dev/null
selfserv with PID 22543 found at Wed Nov 28 11:04:13 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3065: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 22543 at Wed Nov 28 11:04:13 EST 2012
kill -USR1 22543
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 22543 killed at Wed Nov 28 11:04:13 EST 2012
ssl.sh: SSL Client Authentication Extended Test - server normal/client fips  - with ECC ===============================
ssl.sh: skipping  TLS Request don't require client auth (client does not provide auth) (non-FIPS only)
ssl.sh: skipping  TLS Request don't require client auth (bad password) (non-FIPS only)
ssl.sh: skipping  TLS Request don't require client auth (client auth) (non-FIPS only)
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:04:14 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:04:14 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 22748 >/dev/null 2>/dev/null
selfserv with PID 22748 found at Wed Nov 28 11:04:14 EST 2012
selfserv with PID 22748 started at Wed Nov 28 11:04:14 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #3066: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 22748 at Wed Nov 28 11:04:14 EST 2012
kill -USR1 22748
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 22748 killed at Wed Nov 28 11:04:14 EST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Wed Nov 28 11:04:14 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:04:14 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 22805 >/dev/null 2>/dev/null
selfserv with PID 22805 found at Wed Nov 28 11:04:14 EST 2012
selfserv with PID 22805 started at Wed Nov 28 11:04:14 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -w bogus -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12271:
SSL peer cannot verify your certificate.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
Incorrect password/PIN entered.
tstclnt: authentication of server cert failed: Peer's certificate has an invalid signature.
tstclnt: exiting with return code 254
ssl.sh: #3067: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 22805 at Wed Nov 28 11:04:16 EST 2012
kill -USR1 22805
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 22805 killed at Wed Nov 28 11:04:16 EST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Wed Nov 28 11:04:16 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:04:16 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 22862 >/dev/null 2>/dev/null
selfserv with PID 22862 found at Wed Nov 28 11:04:16 EST 2012
selfserv with PID 22862 started at Wed Nov 28 11:04:16 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -w nss -n ExtendedSSLUser   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3068: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 22862 at Wed Nov 28 11:04:16 EST 2012
kill -USR1 22862
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 22862 killed at Wed Nov 28 11:04:16 EST 2012
ssl.sh: skipping  SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only)
ssl.sh: skipping  SSL3 Request don't require client auth (bad password) (non-FIPS only)
ssl.sh: skipping  SSL3 Request don't require client auth (client auth) (non-FIPS only)
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:04:16 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:04:16 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 22925 >/dev/null 2>/dev/null
selfserv with PID 22925 found at Wed Nov 28 11:04:16 EST 2012
selfserv with PID 22925 started at Wed Nov 28 11:04:16 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #3069: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 22925 at Wed Nov 28 11:04:17 EST 2012
kill -USR1 22925
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 22925 killed at Wed Nov 28 11:04:17 EST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Wed Nov 28 11:04:17 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:04:17 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 22982 >/dev/null 2>/dev/null
selfserv with PID 22982 found at Wed Nov 28 11:04:17 EST 2012
selfserv with PID 22982 started at Wed Nov 28 11:04:17 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V :ssl3 -n ExtendedSSLUser -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
Incorrect password/PIN entered.
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: No PKCS#11 token could be found to do a required operation.
tstclnt: exiting with return code 254
ssl.sh: #3070: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 22982 at Wed Nov 28 11:04:20 EST 2012
kill -USR1 22982
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 22982 killed at Wed Nov 28 11:04:20 EST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Wed Nov 28 11:04:20 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:04:20 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23039 >/dev/null 2>/dev/null
selfserv with PID 23039 found at Wed Nov 28 11:04:20 EST 2012
selfserv with PID 23039 started at Wed Nov 28 11:04:20 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V :ssl3 -n ExtendedSSLUser -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3071: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23039 at Wed Nov 28 11:04:20 EST 2012
kill -USR1 23039
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23039 killed at Wed Nov 28 11:04:20 EST 2012
ssl.sh: skipping  TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only)
ssl.sh: skipping  TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only)
ssl.sh: skipping  TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only)
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:04:20 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:04:20 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23102 >/dev/null 2>/dev/null
selfserv with PID 23102 found at Wed Nov 28 11:04:20 EST 2012
selfserv with PID 23102 started at Wed Nov 28 11:04:20 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #3072: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 23102 at Wed Nov 28 11:04:20 EST 2012
kill -USR1 23102
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23102 killed at Wed Nov 28 11:04:20 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:04:20 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:04:20 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23159 >/dev/null 2>/dev/null
selfserv with PID 23159 found at Wed Nov 28 11:04:20 EST 2012
selfserv with PID 23159 started at Wed Nov 28 11:04:20 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3: -w bogus -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: No PKCS#11 token could be found to do a required operation.
tstclnt: exiting with return code 254
ssl.sh: #3073: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 23159 at Wed Nov 28 11:04:23 EST 2012
kill -USR1 23159
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23159 killed at Wed Nov 28 11:04:23 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:04:23 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:04:23 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23216 >/dev/null 2>/dev/null
selfserv with PID 23216 found at Wed Nov 28 11:04:23 EST 2012
selfserv with PID 23216 started at Wed Nov 28 11:04:23 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3: -w nss -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3074: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23216 at Wed Nov 28 11:04:23 EST 2012
kill -USR1 23216
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23216 killed at Wed Nov 28 11:04:23 EST 2012
ssl.sh: skipping  TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only)
ssl.sh: skipping  TLS 1.0 Request don't require client auth on 2nd hs (bad password) (non-FIPS only)
ssl.sh: skipping  TLS 1.0 Request don't require client auth on 2nd hs (client auth) (non-FIPS only)
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:04:23 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:04:23 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23279 >/dev/null 2>/dev/null
selfserv with PID 23279 found at Wed Nov 28 11:04:23 EST 2012
selfserv with PID 23279 started at Wed Nov 28 11:04:23 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #3075: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 23279 at Wed Nov 28 11:04:23 EST 2012
kill -USR1 23279
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23279 killed at Wed Nov 28 11:04:23 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:04:23 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:04:23 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23336 >/dev/null 2>/dev/null
selfserv with PID 23336 found at Wed Nov 28 11:04:23 EST 2012
selfserv with PID 23336 started at Wed Nov 28 11:04:23 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: No PKCS#11 token could be found to do a required operation.
tstclnt: exiting with return code 254
ssl.sh: #3076: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 23336 at Wed Nov 28 11:04:25 EST 2012
kill -USR1 23336
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23336 killed at Wed Nov 28 11:04:25 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:04:25 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:04:25 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23393 >/dev/null 2>/dev/null
selfserv with PID 23393 found at Wed Nov 28 11:04:25 EST 2012
selfserv with PID 23393 started at Wed Nov 28 11:04:25 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3077: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23393 at Wed Nov 28 11:04:25 EST 2012
kill -USR1 23393
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23393 killed at Wed Nov 28 11:04:25 EST 2012
ssl.sh: skipping  SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only)
ssl.sh: skipping  SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only)
ssl.sh: skipping  SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only)
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:04:26 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:04:26 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23456 >/dev/null 2>/dev/null
selfserv with PID 23456 found at Wed Nov 28 11:04:26 EST 2012
selfserv with PID 23456 started at Wed Nov 28 11:04:26 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #3078: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 23456 at Wed Nov 28 11:04:26 EST 2012
kill -USR1 23456
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23456 killed at Wed Nov 28 11:04:26 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:04:26 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:04:26 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23513 >/dev/null 2>/dev/null
selfserv with PID 23513 found at Wed Nov 28 11:04:26 EST 2012
selfserv with PID 23513 started at Wed Nov 28 11:04:26 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: No PKCS#11 token could be found to do a required operation.
tstclnt: exiting with return code 254
ssl.sh: #3079: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 23513 at Wed Nov 28 11:04:28 EST 2012
kill -USR1 23513
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23513 killed at Wed Nov 28 11:04:28 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:04:28 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:04:28 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23570 >/dev/null 2>/dev/null
selfserv with PID 23570 found at Wed Nov 28 11:04:28 EST 2012
selfserv with PID 23570 started at Wed Nov 28 11:04:28 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3080: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23570 at Wed Nov 28 11:04:28 EST 2012
kill -USR1 23570
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23570 killed at Wed Nov 28 11:04:28 EST 2012
ssl.sh: skipping  TLS Request don't require client auth (EC) (bad password) (non-FIPS only)
ssl.sh: skipping  TLS Request don't require client auth (EC) (client auth) (non-FIPS only)
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:04:28 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:04:28 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23646 >/dev/null 2>/dev/null
selfserv with PID 23646 found at Wed Nov 28 11:04:28 EST 2012
selfserv with PID 23646 started at Wed Nov 28 11:04:28 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -w bogus -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12271:
SSL peer cannot verify your certificate.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
Incorrect password/PIN entered.
tstclnt: authentication of server cert failed: Peer's certificate has an invalid signature.
tstclnt: exiting with return code 254
ssl.sh: #3081: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 23646 at Wed Nov 28 11:04:31 EST 2012
kill -USR1 23646
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23646 killed at Wed Nov 28 11:04:31 EST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:04:31 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:04:31 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23703 >/dev/null 2>/dev/null
selfserv with PID 23703 found at Wed Nov 28 11:04:31 EST 2012
selfserv with PID 23703 started at Wed Nov 28 11:04:31 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -w nss -n ExtendedSSLUser-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3082: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23703 at Wed Nov 28 11:04:31 EST 2012
kill -USR1 23703
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23703 killed at Wed Nov 28 11:04:31 EST 2012
ssl.sh: skipping  SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only)
ssl.sh: skipping  SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only)
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:04:31 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:04:31 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23764 >/dev/null 2>/dev/null
selfserv with PID 23764 found at Wed Nov 28 11:04:31 EST 2012
selfserv with PID 23764 started at Wed Nov 28 11:04:31 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V :ssl3 -n ExtendedSSLUser-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
Incorrect password/PIN entered.
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: No PKCS#11 token could be found to do a required operation.
tstclnt: exiting with return code 254
ssl.sh: #3083: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 23764 at Wed Nov 28 11:04:34 EST 2012
kill -USR1 23764
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23764 killed at Wed Nov 28 11:04:34 EST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:04:34 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:04:34 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23821 >/dev/null 2>/dev/null
selfserv with PID 23821 found at Wed Nov 28 11:04:34 EST 2012
selfserv with PID 23821 started at Wed Nov 28 11:04:34 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V :ssl3 -n ExtendedSSLUser-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3084: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23821 at Wed Nov 28 11:04:34 EST 2012
kill -USR1 23821
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23821 killed at Wed Nov 28 11:04:34 EST 2012
ssl.sh: skipping  TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only)
ssl.sh: skipping  TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only)
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:04:34 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:04:34 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23882 >/dev/null 2>/dev/null
selfserv with PID 23882 found at Wed Nov 28 11:04:34 EST 2012
selfserv with PID 23882 started at Wed Nov 28 11:04:34 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3: -w bogus -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: No PKCS#11 token could be found to do a required operation.
tstclnt: exiting with return code 254
ssl.sh: #3085: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 23882 at Wed Nov 28 11:04:37 EST 2012
kill -USR1 23882
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23882 killed at Wed Nov 28 11:04:37 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:04:37 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:04:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23939 >/dev/null 2>/dev/null
selfserv with PID 23939 found at Wed Nov 28 11:04:37 EST 2012
selfserv with PID 23939 started at Wed Nov 28 11:04:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3: -w nss -n ExtendedSSLUser-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3086: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23939 at Wed Nov 28 11:04:37 EST 2012
kill -USR1 23939
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23939 killed at Wed Nov 28 11:04:37 EST 2012
ssl.sh: skipping  TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only)
ssl.sh: skipping  TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only)
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:04:37 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:04:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24000 >/dev/null 2>/dev/null
selfserv with PID 24000 found at Wed Nov 28 11:04:37 EST 2012
selfserv with PID 24000 started at Wed Nov 28 11:04:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: No PKCS#11 token could be found to do a required operation.
tstclnt: exiting with return code 254
ssl.sh: #3087: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24000 at Wed Nov 28 11:04:39 EST 2012
kill -USR1 24000
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24000 killed at Wed Nov 28 11:04:39 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:04:39 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:04:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24057 >/dev/null 2>/dev/null
selfserv with PID 24057 found at Wed Nov 28 11:04:39 EST 2012
selfserv with PID 24057 started at Wed Nov 28 11:04:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3088: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24057 at Wed Nov 28 11:04:39 EST 2012
kill -USR1 24057
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24057 killed at Wed Nov 28 11:04:39 EST 2012
ssl.sh: skipping  SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only)
ssl.sh: skipping  SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only)
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:04:39 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:04:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24118 >/dev/null 2>/dev/null
selfserv with PID 24118 found at Wed Nov 28 11:04:39 EST 2012
selfserv with PID 24118 started at Wed Nov 28 11:04:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: No PKCS#11 token could be found to do a required operation.
tstclnt: exiting with return code 254
ssl.sh: #3089: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24118 at Wed Nov 28 11:04:42 EST 2012
kill -USR1 24118
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24118 killed at Wed Nov 28 11:04:42 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:04:42 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:04:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24175 >/dev/null 2>/dev/null
selfserv with PID 24175 found at Wed Nov 28 11:04:42 EST 2012
selfserv with PID 24175 started at Wed Nov 28 11:04:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3090: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24175 at Wed Nov 28 11:04:42 EST 2012
kill -USR1 24175
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24175 killed at Wed Nov 28 11:04:42 EST 2012
ssl.sh: skipping  TLS Server hello response without SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI for Extended Test
ssl.sh: skipping  TLS Server response with alert for Extended Test
ssl.sh: skipping  SSL3 Server hello response without SNI for Extended Test
ssl.sh: skipping  SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test
ssl.sh: skipping  TLS Server hello response without SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI: Change name on 2d HS for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test
ssl.sh: skipping  TLS Server response with alert for Extended Test
ssl.sh: SSL Stress Test Extended Test - server normal/client fips  - with ECC ===============================
ssl.sh: skipping  Form is subject to the terms of the Mozilla Public (non-FIPS only)
ssl.sh: skipping  If a copy of the MPL was not distributed with this (non-FIPS only)
ssl.sh: skipping  obtain one at http://mozilla.org/MPL/2.0/. (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  the stress tests for SSL/TLS. (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  client                         Test Case name (non-FIPS only)
ssl.sh: skipping  params (non-FIPS only)
ssl.sh: skipping  ------                         --------------- (non-FIPS only)
ssl.sh: skipping  Stress SSL2 RC4 128 with MD5 for Extended Test
ssl.sh: skipping  Stress SSL3 RC4 128 with MD5 (non-FIPS only)
ssl.sh: skipping  Stress TLS  RC4 128 with MD5 (non-FIPS only)
ssl.sh: skipping  Stress TLS  RC4 128 with MD5 (false start) (non-FIPS only)
ssl.sh: skipping  Stress TLS  RC4 128 with MD5 (session ticket) (non-FIPS only)
ssl.sh: skipping  Stress TLS  RC4 128 with MD5 (compression) (non-FIPS only)
ssl.sh: skipping  Stress TLS  RC4 128 with MD5 (session ticket, compression) (non-FIPS only)
ssl.sh: skipping  Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) (non-FIPS only)
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  versions here... (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Wed Nov 28 11:04:42 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:04:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24364 >/dev/null 2>/dev/null
selfserv with PID 24364 found at Wed Nov 28 11:04:42 EST 2012
selfserv with PID 24364 started at Wed Nov 28 11:04:42 EST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -c 100 -C c -V :ssl3 -N -n ExtendedSSLUser \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:04:42 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed Nov 28 11:04:43 EST 2012
ssl.sh: #3091: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 24364 at Wed Nov 28 11:04:43 EST 2012
kill -USR1 24364
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24364 killed at Wed Nov 28 11:04:43 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Wed Nov 28 11:04:43 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:04:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24439 >/dev/null 2>/dev/null
selfserv with PID 24439 found at Wed Nov 28 11:04:43 EST 2012
selfserv with PID 24439 started at Wed Nov 28 11:04:43 EST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -c 100 -C c -N -n ExtendedSSLUser \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:04:43 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed Nov 28 11:04:43 EST 2012
ssl.sh: #3092: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 24439 at Wed Nov 28 11:04:43 EST 2012
kill -USR1 24439
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24439 killed at Wed Nov 28 11:04:43 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Wed Nov 28 11:04:43 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:04:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24514 >/dev/null 2>/dev/null
selfserv with PID 24514 found at Wed Nov 28 11:04:43 EST 2012
selfserv with PID 24514 started at Wed Nov 28 11:04:43 EST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:04:43 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Wed Nov 28 11:04:43 EST 2012
ssl.sh: #3093: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 24514 at Wed Nov 28 11:04:44 EST 2012
kill -USR1 24514
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24514 killed at Wed Nov 28 11:04:44 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Wed Nov 28 11:04:44 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:04:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24590 >/dev/null 2>/dev/null
selfserv with PID 24590 found at Wed Nov 28 11:04:44 EST 2012
selfserv with PID 24590 started at Wed Nov 28 11:04:44 EST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:04:44 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:04:44 EST 2012
ssl.sh: #3094: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 24590 at Wed Nov 28 11:04:44 EST 2012
kill -USR1 24590
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24590 killed at Wed Nov 28 11:04:44 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Wed Nov 28 11:04:44 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:04:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24666 >/dev/null 2>/dev/null
selfserv with PID 24666 found at Wed Nov 28 11:04:44 EST 2012
selfserv with PID 24666 started at Wed Nov 28 11:04:44 EST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:04:44 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:04:44 EST 2012
ssl.sh: #3095: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 24666 at Wed Nov 28 11:04:44 EST 2012
kill -USR1 24666
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24666 killed at Wed Nov 28 11:04:44 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Wed Nov 28 11:04:44 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:04:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24742 >/dev/null 2>/dev/null
selfserv with PID 24742 found at Wed Nov 28 11:04:44 EST 2012
selfserv with PID 24742 started at Wed Nov 28 11:04:44 EST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:04:44 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Wed Nov 28 11:04:44 EST 2012
ssl.sh: #3096: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 24742 at Wed Nov 28 11:04:44 EST 2012
kill -USR1 24742
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24742 killed at Wed Nov 28 11:04:44 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Wed Nov 28 11:04:44 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:04:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24818 >/dev/null 2>/dev/null
selfserv with PID 24818 found at Wed Nov 28 11:04:44 EST 2012
selfserv with PID 24818 started at Wed Nov 28 11:04:44 EST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:04:44 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Wed Nov 28 11:04:45 EST 2012
ssl.sh: #3097: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 24818 at Wed Nov 28 11:04:45 EST 2012
kill -USR1 24818
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24818 killed at Wed Nov 28 11:04:45 EST 2012
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  ############################ (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (non-FIPS only)
ssl.sh: skipping  Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA (non-FIPS only)
ssl.sh: skipping  Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) (non-FIPS only)
ssl.sh: skipping  Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) (non-FIPS only)
ssl.sh: skipping  Stress TLS  ECDHE-RSA   AES 128 CBC with SHA (non-FIPS only)
ssl.sh: skipping  Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  versions here... (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Wed Nov 28 11:04:45 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C009 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:04:45 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24950 >/dev/null 2>/dev/null
selfserv with PID 24950 found at Wed Nov 28 11:04:45 EST 2012
selfserv with PID 24950 started at Wed Nov 28 11:04:45 EST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -c 10 -C :C009 -N -V :ssl3 -n ExtendedSSLUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:04:45 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Wed Nov 28 11:04:45 EST 2012
ssl.sh: #3098: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 24950 at Wed Nov 28 11:04:45 EST 2012
kill -USR1 24950
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24950 killed at Wed Nov 28 11:04:45 EST 2012
ssl.sh: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) ----
selfserv starting at Wed Nov 28 11:04:45 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:04:45 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25025 >/dev/null 2>/dev/null
selfserv with PID 25025 found at Wed Nov 28 11:04:45 EST 2012
selfserv with PID 25025 started at Wed Nov 28 11:04:45 EST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -c 100 -C :C013 -V :ssl3 -n ExtendedSSLUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:04:45 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:04:46 EST 2012
ssl.sh: #3099: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 25025 at Wed Nov 28 11:04:46 EST 2012
kill -USR1 25025
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25025 killed at Wed Nov 28 11:04:46 EST 2012
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Wed Nov 28 11:04:46 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C004 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:04:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25101 >/dev/null 2>/dev/null
selfserv with PID 25101 found at Wed Nov 28 11:04:46 EST 2012
selfserv with PID 25101 started at Wed Nov 28 11:04:46 EST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -c 10 -C :C004 -N -n ExtendedSSLUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:04:46 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Wed Nov 28 11:04:46 EST 2012
ssl.sh: #3100: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 25101 at Wed Nov 28 11:04:46 EST 2012
kill -USR1 25101
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25101 killed at Wed Nov 28 11:04:46 EST 2012
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Wed Nov 28 11:04:46 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -r -r -c :C00E -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:04:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25176 >/dev/null 2>/dev/null
selfserv with PID 25176 found at Wed Nov 28 11:04:46 EST 2012
selfserv with PID 25176 started at Wed Nov 28 11:04:46 EST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -c 10 -C :C00E -N -n ExtendedSSLUser-ecmixed \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:04:46 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Wed Nov 28 11:04:46 EST 2012
ssl.sh: #3101: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 25176 at Wed Nov 28 11:04:46 EST 2012
kill -USR1 25176
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25176 killed at Wed Nov 28 11:04:46 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ----
selfserv starting at Wed Nov 28 11:04:46 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:04:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25251 >/dev/null 2>/dev/null
selfserv with PID 25251 found at Wed Nov 28 11:04:46 EST 2012
selfserv with PID 25251 started at Wed Nov 28 11:04:46 EST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -c 100 -C :C013 -n ExtendedSSLUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:04:46 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:04:47 EST 2012
ssl.sh: #3102: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 25251 at Wed Nov 28 11:04:47 EST 2012
kill -USR1 25251
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25251 killed at Wed Nov 28 11:04:47 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ----
selfserv starting at Wed Nov 28 11:04:47 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -u -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:04:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25327 >/dev/null 2>/dev/null
selfserv with PID 25327 found at Wed Nov 28 11:04:47 EST 2012
selfserv with PID 25327 started at Wed Nov 28 11:04:47 EST 2012
strsclnt -q -p 8546 -d ../ext_client  -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec -u \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:04:47 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Wed Nov 28 11:04:47 EST 2012
ssl.sh: #3103: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 25327 at Wed Nov 28 11:04:47 EST 2012
kill -USR1 25327
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25327 killed at Wed Nov 28 11:04:47 EST 2012
ssl.sh: SSL - FIPS mode off for client ===============================
ssl.sh: Turning FIPS off for the  client
modutil -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -fips false -force
FIPS mode disabled.
ssl.sh: #3104:  (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED
modutil -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/client -list
ssl.sh: #3105:  (modutil -list) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: #3106:  (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED
ssl.sh: Turning FIPS off for the extended  client
modutil -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/ext_client -fips false -force
FIPS mode disabled.
ssl.sh: #3107:  (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED
modutil -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/ext_client -list
ssl.sh: #3108:  (modutil -list) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: #3109:  (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED
TIMESTAMP ssl END: Wed Nov 28 11:04:48 EST 2012
Running tests for ocsp
TIMESTAMP ocsp BEGIN: Wed Nov 28 11:04:48 EST 2012
ocsp.sh: OCSP tests ===============================
TIMESTAMP ocsp END: Wed Nov 28 11:04:48 EST 2012
Running tests for merge
TIMESTAMP merge BEGIN: Wed Nov 28 11:04:48 EST 2012
merge.sh: Merge Tests ===============================
merge.sh: Creating an SDR key & Encrypt
sdrtest -d . -o /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests.v3.10869 -t Test2 -f ../tests.pw
merge.sh: #3110: Creating SDR Key  - PASSED
merge.sh: Merging in Key for Existing user
certutil --merge --source-dir ../dave -d . -f ../tests.pw -@ ../tests.pw
merge.sh: #3111: Merging Dave  - PASSED
merge.sh: Merging in new user 
certutil --merge --source-dir ../server -d . -f ../tests.pw -@ ../tests.pw
merge.sh: #3112: Merging server  - PASSED
merge.sh: Merging in new chain 
certutil --merge --source-dir ../ext_client -d . -f ../tests.pw -@ ../tests.pw
merge.sh: #3113: Merging ext_client  - PASSED
merge.sh: Merging in conflicting nicknames 1
certutil --merge --source-dir conflict1 -d . -f ../tests.pw -@ ../tests.pw
merge.sh: #3114: Merging conflicting nicknames 1  - PASSED
merge.sh: Merging in conflicting nicknames 1
certutil --merge --source-dir conflict2 -d . -f ../tests.pw -@ ../tests.pw
merge.sh: #3115: Merging conflicting nicknames 2  - PASSED
merge.sh: Verify nicknames were deconflicted (Alice #4)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 45 (0x2d)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:57:20 2012
            Not After : Tue Nov 28 15:57:20 2017
        Subject: "CN=TestUser45,E=TestUser45@bogus.com,O=BOGUS NSS,L=Mountain
             View,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e4:a1:0d:a7:60:8e:33:91:99:f7:ed:ef:79:50:d0:08:
                    38:51:d4:36:1c:5e:25:1e:52:87:2c:24:d9:00:bc:3a:
                    30:9b:1d:8b:98:34:65:a7:a9:84:51:3b:d0:e1:86:7d:
                    f6:fe:44:e1:ea:89:e4:77:3a:1f:82:1e:26:8f:8c:c7:
                    18:66:6f:3f:d6:c3:74:81:7c:7c:ba:0a:51:97:61:78:
                    02:cc:1f:ba:16:21:86:aa:e5:dd:ec:05:12:5d:58:4b:
                    0a:20:93:42:b1:e2:6a:b0:58:3d:34:05:36:7b:ae:bd:
                    3a:62:ba:dd:3c:30:7b:b0:43:2e:97:a9:a6:25:b5:97
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3d:de:27:5a:bb:4b:d8:40:65:db:96:56:3f:4b:78:6d:
        2c:8e:59:44:5b:e9:70:d9:62:b2:78:12:3d:6f:a9:46:
        e7:96:47:07:57:42:09:4e:8e:1c:82:ef:0a:30:ae:7b:
        96:ab:61:da:37:f0:46:83:88:d3:90:ee:cf:17:95:cd:
        7a:d5:f1:c8:07:9a:78:07:53:28:a5:70:25:ed:cb:ba:
        f9:52:55:c6:a7:b2:f7:20:18:4f:46:2f:c1:e7:9d:4e:
        05:28:fe:fe:bd:07:af:bd:b0:35:11:6d:fd:e9:43:5c:
        55:5b:b3:9a:b5:7b:bb:ca:d0:16:3f:71:00:1d:00:03
    Fingerprint (MD5):
        33:03:D8:29:9F:43:53:B5:58:C5:44:0D:78:96:CA:11
    Fingerprint (SHA1):
        08:4A:89:C3:6D:70:CC:58:33:97:84:C5:74:C5:C9:04:81:1F:3C:38

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

merge.sh: #3116: Verify nicknames were deconflicted (Alice #4)  - PASSED
merge.sh: Verify nicknames were deconflicted (Alice #100)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 46 (0x2e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:57:21 2012
            Not After : Tue Nov 28 15:57:21 2017
        Subject: "CN=TestUser46,E=TestUser46@bogus.com,O=BOGUS NSS,L=Mountain
             View,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e2:1a:f6:95:4c:70:84:ce:56:19:13:b7:1a:f8:e0:43:
                    00:94:07:a7:98:e5:07:bc:74:f7:fb:50:92:88:42:e6:
                    fb:ec:34:bb:e4:19:35:78:f1:3d:02:a2:4c:f7:36:26:
                    21:d9:8f:7f:fc:b4:84:af:73:7d:32:ce:54:a6:c2:c6:
                    b7:44:63:04:94:2d:63:42:25:cb:d9:30:86:eb:01:ec:
                    d9:7f:d0:52:ba:91:f0:1b:95:72:3a:fc:df:dd:c6:89:
                    c5:2b:97:30:02:34:23:e4:fe:6e:97:5d:90:36:d9:27:
                    08:4b:d6:49:52:89:5a:11:98:73:21:42:2b:f0:16:b7
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        c1:d5:71:d0:58:7b:f3:d0:c8:e1:97:9f:c9:ce:67:81:
        cf:d4:ac:b3:4c:2b:e0:48:bf:5b:2b:25:0e:68:6b:0e:
        4b:44:4c:a9:e2:31:10:1a:47:34:f6:9a:f3:ae:ee:3c:
        e9:d1:52:1d:4a:e4:f4:67:1e:1f:e2:e6:4a:17:17:d6:
        40:c2:59:9e:96:3d:30:88:bd:24:f3:16:fa:8a:eb:5d:
        a2:2d:26:3c:eb:b9:05:f3:13:b1:49:d9:c0:ab:c6:b5:
        fc:08:e6:6b:58:8b:cf:83:a7:d6:f3:58:93:d3:70:f9:
        0f:ec:b9:ca:89:f2:1e:ee:62:d1:60:29:e8:6c:07:4f
    Fingerprint (MD5):
        AC:0A:37:00:7E:F3:32:19:6A:0C:0E:F2:C3:A1:97:0B
    Fingerprint (SHA1):
        41:FF:0D:A0:C6:D3:13:8D:52:C6:1F:C6:65:22:5E:92:F5:67:20:EF

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

merge.sh: #3117: Verify nicknames were deconflicted (Alice #100)  - PASSED
merge.sh: Merging in SDR 
certutil --merge --source-dir ../SDR -d . -f ../tests.pw -@ ../tests.pw
merge.sh: #3118: Merging SDR  - PASSED

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

Alice-ec                                                     u,u,u
Dave                                                         u,u,u
chain-2-clientCA-ec                                          ,,   
Alice #1                                                     ,,   
buildnss02.usersys.redhat.com-ecmixed                        ,,   
Alice #99                                                    ,,   
bob@bogus.com                                                ,,   
eve@bogus.com                                                ,,   
bob-ec@bogus.com                                             ,,   
buildnss02.usersys.redhat.com                                u,u,u
buildnss02.usersys.redhat.com-ec                             ,,   
buildnss02-sni.usersys.redhat.com-ecmixed                    ,,   
clientCA                                                     T,C,C
clientCA-ec                                                  T,C,C
Alice #3                                                     ,,   
TestCA                                                       CT,C,C
TestCA-ec                                                    CT,C,C
Alice-ecmixed                                                u,u,u
Dave-ecmixed                                                 ,,   
buildnss02-sni.usersys.redhat.com                            u,u,u
buildnss02-sni.usersys.redhat.com-ec                         ,,   
ExtendedSSLUser                                              u,u,u
serverCA                                                     C,C,C
ExtendedSSLUser-ec                                           ,,   
serverCA-ec                                                  C,C,C
chain-1-clientCA-ec                                          ,,   
chain-1-clientCA                                             ,,   
Alice #2                                                     ,,   
Alice #4                                                     ,,   
Alice                                                        u,u,u
Dave-ec                                                      ,,   
ExtendedSSLUser-ecmixed                                      ,,   
chain-2-clientCA                                             ,,   
Alice #100                                                   ,,   


CRL names                                CRL Type

TestCA                                   CRL  
TestCA-ec                                CRL  
merge.sh: Decrypt - With Original SDR Key
sdrtest -d . -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests.v3.10869 -t Test2 -f ../tests.pw
merge.sh: #3119: Decrypt - Value 3  - PASSED
merge.sh: Decrypt - With Merged SDR Key
sdrtest -d . -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests.v1.10869 -t Test1 -f ../tests.pw
merge.sh: #3120: Decrypt - Value 1  - PASSED
merge.sh: Signing with merged key  ------------------
cmsutil -S -T -N Dave -H SHA1 -i alice.txt -d . -p nss -o dave.dsig
merge.sh: #3121: Create Detached Signature Dave . - PASSED
cmsutil -D -i dave.dsig -c alice.txt -d . 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
merge.sh: #3122: Verifying Dave's Detached Signature  - PASSED
merge.sh: verifying  merged cert  ------------------
certutil -V -n ExtendedSSLUser -u C -d .
certutil: certificate is valid
merge.sh: #3123: Verifying ExtendedSSL User Cert  - PASSED
merge.sh: verifying  merged crl  ------------------
crlutil -L -n TestCA -d .
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US"
    This Update: Wed Nov 28 15:57:29 2012
    Entry 1 (0x1):
        Serial Number: 40 (0x28)
        Revocation Date: Wed Nov 28 15:56:49 2012
        Entry Extensions:
            Name: CRL reason code

    Entry 2 (0x2):
        Serial Number: 42 (0x2a)
        Revocation Date: Wed Nov 28 15:57:27 2012
    CRL Extensions:
        Name: Certificate Issuer Alt Name
        RFC822 Name: "caemail@ca.com"
        DNS name: "ca.com"
        Directory Name: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=Califo
            rnia,C=US"
        URI: "http://ca.com"
        IP Address:
            87:0b:31:39:32:2e:31:36:38:2e:30:2e:31

merge.sh: #3124: Verifying TestCA CRL  - PASSED
TIMESTAMP merge END: Wed Nov 28 11:04:49 EST 2012
Running tests for pkits
TIMESTAMP pkits BEGIN: Wed Nov 28 11:04:49 EST 2012
pkits.sh Start of logfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/pkits.log
HOSTDIR /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1
PKITSDIR /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits
PKITSdb /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb
PKITSbkp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSbkp
PKITS_DATA /home/tinderbox/pkits/data/
certs /home/tinderbox/pkits/data//certs
crls /home/tinderbox/pkits/data//crls

***************************************************************
NIST PKITS Section 4.1: Signature Verification
***************************************************************

--------------------------------------------------------------------
Test case Valid Signatures Test1

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n GoodCACert -i /home/tinderbox/pkits/data//certs/GoodCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/GoodCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidCertificatePathTest1EE.crt /home/tinderbox/pkits/data//certs/GoodCACert.crt
Chain is good!
pkits.sh: #3125: Valid Signatures Test1 - PASSED
pkits.sh SUCCESS: Valid Signatures Test1 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid CA Signature Test2

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n BadSignedCACert -i /home/tinderbox/pkits/data//certs/BadSignedCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/BadSignedCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidCASignatureTest2EE.crt /home/tinderbox/pkits/data//certs/BadSignedCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. BadSignedCACert [Certificate Authority]:
  ERROR -8182: Peer's certificate has an invalid signature.
pkits.sh: #3126: Invalid CA Signature Test2 (2)  - PASSED
pkits.sh SUCCESS: Invalid CA Signature Test2 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid EE Signature Test3

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n GoodCACert -i /home/tinderbox/pkits/data//certs/GoodCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/GoodCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidEESignatureTest3EE.crt /home/tinderbox/pkits/data//certs/GoodCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=Invalid EE Signature Test3,O=Test Certificates 2011,C=US :
  ERROR -8182: Peer's certificate has an invalid signature.
pkits.sh: #3127: Invalid EE Signature Test3 (2)  - PASSED
pkits.sh SUCCESS: Invalid EE Signature Test3 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid DSA Signatures Test4

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n DSACACert -i /home/tinderbox/pkits/data//certs/DSACACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/DSACACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidDSASignaturesTest4EE.crt /home/tinderbox/pkits/data//certs/DSACACert.crt
Chain is good!
pkits.sh: #3128: Valid DSA Signatures Test4 - PASSED
pkits.sh SUCCESS: Valid DSA Signatures Test4 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Valid DSA Parameter Inheritance Test5

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n DSACACert -i /home/tinderbox/pkits/data//certs/DSACACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/DSACACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n DSAParametersInheritedCACert -i /home/tinderbox/pkits/data//certs/DSAParametersInheritedCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/DSAParametersInheritedCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidDSAParameterInheritanceTest5EE.crt /home/tinderbox/pkits/data//certs/DSAParametersInheritedCACert.crt /home/tinderbox/pkits/data//certs/DSACACert.crt
Chain is good!
pkits.sh: #3129: Valid DSA Parameter Inheritance Test5 - PASSED
pkits.sh SUCCESS: Valid DSA Parameter Inheritance Test5 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid DSA Signature Test6

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n DSACACert -i /home/tinderbox/pkits/data//certs/DSACACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/DSACACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDSASignatureTest6EE.crt /home/tinderbox/pkits/data//certs/DSACACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=Invalid DSA Signature EE Certificate Test6,O=Test Certificates 2011,C=US :
  ERROR -8182: Peer's certificate has an invalid signature.
pkits.sh: #3130: Invalid DSA Signature Test6 (2)  - PASSED
pkits.sh SUCCESS: Invalid DSA Signature Test6 returned as expected 2
Restore DB

***************************************************************
NIST PKITS Section 4.2: Validity Periods
***************************************************************

--------------------------------------------------------------------
Test case Invalid CA notBefore Date Test1

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n BadnotBeforeDateCACert -i /home/tinderbox/pkits/data//certs/BadnotBeforeDateCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/BadnotBeforeDateCACRL.crl
crlutil: unable to import CRL: The CRL for the certificate's issuer has an invalid signature.
pkits.sh: #3131: Invalid CA notBefore Date Test1 (1)  - PASSED
pkits.sh SUCCESS: Invalid CA notBefore Date Test1 returned as expected 1
Restore DB

--------------------------------------------------------------------
Test case Invalid EE notBefore Date Test2

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n GoodCACert -i /home/tinderbox/pkits/data//certs/GoodCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/GoodCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidEEnotBeforeDateTest2EE.crt /home/tinderbox/pkits/data//certs/GoodCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=Invalid EE notBefore Date EE Certificate Test2,O=Test Certificates 2011,C=US :
  ERROR -8181: Peer's Certificate has expired.
pkits.sh: #3132: Invalid EE notBefore Date Test2 (2)  - PASSED
pkits.sh SUCCESS: Invalid EE notBefore Date Test2 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid pre2000 UTC notBefore Date Test3

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n GoodCACert -i /home/tinderbox/pkits/data//certs/GoodCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/GoodCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/Validpre2000UTCnotBeforeDateTest3EE.crt /home/tinderbox/pkits/data//certs/GoodCACert.crt
Chain is good!
pkits.sh: #3133: Valid pre2000 UTC notBefore Date Test3 - PASSED
pkits.sh SUCCESS: Valid pre2000 UTC notBefore Date Test3 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Valid GeneralizedTime notBefore Date Test4

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n GoodCACert -i /home/tinderbox/pkits/data//certs/GoodCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/GoodCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidGeneralizedTimenotBeforeDateTest4EE.crt /home/tinderbox/pkits/data//certs/GoodCACert.crt
Chain is good!
pkits.sh: #3134: Valid GeneralizedTime notBefore Date Test4 - PASSED
pkits.sh SUCCESS: Valid GeneralizedTime notBefore Date Test4 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid CA notAfter Date Test5

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n BadnotAfterDateCACert -i /home/tinderbox/pkits/data//certs/BadnotAfterDateCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/BadnotAfterDateCACRL.crl
crlutil: unable to import CRL: The CRL for the certificate's issuer has an invalid signature.
pkits.sh: #3135: Invalid CA notAfter Date Test5 (1)  - PASSED
pkits.sh SUCCESS: Invalid CA notAfter Date Test5 returned as expected 1
Restore DB

--------------------------------------------------------------------
Test case Invalid EE notAfter Date Test6

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n GoodCACert -i /home/tinderbox/pkits/data//certs/GoodCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/GoodCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidEEnotAfterDateTest6EE.crt /home/tinderbox/pkits/data//certs/GoodCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=Invalid EE notAfter Date EE Certificate Test6,O=Test Certificates 2011,C=US :
  ERROR -8181: Peer's Certificate has expired.
pkits.sh: #3136: Invalid EE notAfter Date Test6 (2)  - PASSED
pkits.sh SUCCESS: Invalid EE notAfter Date Test6 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid pre2000 UTC EE notAfter Date Test7

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n GoodCACert -i /home/tinderbox/pkits/data//certs/GoodCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/GoodCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/Invalidpre2000UTCEEnotAfterDateTest7EE.crt /home/tinderbox/pkits/data//certs/GoodCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=Invalid pre2000 UTC EE notAfter Date EE Certificate Test7,O=Test Certificates 2011,C=US :
  ERROR -8181: Peer's Certificate has expired.
pkits.sh: #3137: Invalid pre2000 UTC EE notAfter Date Test7 (2)  - PASSED
pkits.sh SUCCESS: Invalid pre2000 UTC EE notAfter Date Test7 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case ValidGeneralizedTime notAfter Date Test8

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n GoodCACert -i /home/tinderbox/pkits/data//certs/GoodCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/GoodCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidGeneralizedTimenotAfterDateTest8EE.crt /home/tinderbox/pkits/data//certs/GoodCACert.crt
Chain is good!
pkits.sh: #3138: ValidGeneralizedTime notAfter Date Test8 - PASSED
pkits.sh SUCCESS: ValidGeneralizedTime notAfter Date Test8 returned as expected 0
Restore DB

***************************************************************
NIST PKITS Section 4.3: Verifying NameChaining
***************************************************************

--------------------------------------------------------------------
Test case Invalid Name Chaining EE Test1

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n GoodCACert -i /home/tinderbox/pkits/data//certs/GoodCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/GoodCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidNameChainingTest1EE.crt /home/tinderbox/pkits/data//certs/GoodCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=Invalid Name Chaining EE Certificate Test1,O=Test Certificates 2011,C=US :
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Good CA Root,O=Test Certificates 2011,C=US
pkits.sh: #3139: Invalid Name Chaining EE Test1 (2)  - PASSED
pkits.sh SUCCESS: Invalid Name Chaining EE Test1 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid Name Chaining Order Test2

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n NameOrderingCACert -i /home/tinderbox/pkits/data//certs/NameOrderingCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/NameOrderCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidNameChainingOrderTest2EE.crt /home/tinderbox/pkits/data//certs/NameOrderingCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=Invalid Name Chaining Order EE Certificate Test2,O=Test Certificates 2011,C=US :
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Name Ordering CA,OU=Organizational Unit Name 1,OU=Organizational Unit Name 2,O=Test Certificates 2011,C=US
pkits.sh: #3140: Invalid Name Chaining Order Test2 (2)  - PASSED
pkits.sh SUCCESS: Invalid Name Chaining Order Test2 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid Name Chaining UIDs Test6

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n UIDCACert -i /home/tinderbox/pkits/data//certs/UIDCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/UIDCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidNameUIDsTest6EE.crt /home/tinderbox/pkits/data//certs/UIDCACert.crt
Chain is good!
pkits.sh: #3141: Valid Name Chaining UIDs Test6 - PASSED
pkits.sh SUCCESS: Valid Name Chaining UIDs Test6 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Valid RFC3280 Mandatory Attribute Types Test7

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n RFC3280MandatoryAttributeTypesCACert -i /home/tinderbox/pkits/data//certs/RFC3280MandatoryAttributeTypesCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/RFC3280MandatoryAttributeTypesCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidRFC3280MandatoryAttributeTypesTest7EE.crt /home/tinderbox/pkits/data//certs/RFC3280MandatoryAttributeTypesCACert.crt
Chain is good!
pkits.sh: #3142: Valid RFC3280 Mandatory Attribute Types Test7 - PASSED
pkits.sh SUCCESS: Valid RFC3280 Mandatory Attribute Types Test7 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Valid RFC3280 Optional Attribute Types Test8

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n RFC3280OptionalAttributeTypesCACert -i /home/tinderbox/pkits/data//certs/RFC3280OptionalAttributeTypesCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/RFC3280OptionalAttributeTypesCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidRFC3280OptionalAttributeTypesTest8EE.crt /home/tinderbox/pkits/data//certs/RFC3280OptionalAttributeTypesCACert.crt
Chain is good!
pkits.sh: #3143: Valid RFC3280 Optional Attribute Types Test8 - PASSED
pkits.sh SUCCESS: Valid RFC3280 Optional Attribute Types Test8 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Valid UTF8String Encoded Names Test9

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n UTF8StringEncodedNamesCACert -i /home/tinderbox/pkits/data//certs/UTF8StringEncodedNamesCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/UTF8StringEncodedNamesCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidUTF8StringEncodedNamesTest9EE.crt /home/tinderbox/pkits/data//certs/UTF8StringEncodedNamesCACert.crt
Chain is good!
pkits.sh: #3144: Valid UTF8String Encoded Names Test9 - PASSED
pkits.sh SUCCESS: Valid UTF8String Encoded Names Test9 returned as expected 0
Restore DB

***************************************************************
NIST PKITS Section 4.4: Basic Certificate Revocation Tests
***************************************************************

--------------------------------------------------------------------
Test case Invalid Revoked CA Test2

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n RevokedsubCACert -i /home/tinderbox/pkits/data//certs/RevokedsubCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/RevokedsubCACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n GoodCACert -i /home/tinderbox/pkits/data//certs/GoodCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/GoodCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidRevokedCATest2EE.crt /home/tinderbox/pkits/data//certs/RevokedsubCACert.crt /home/tinderbox/pkits/data//certs/GoodCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. RevokedsubCACert [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
pkits.sh: #3145: Invalid Revoked CA Test2 (2)  - PASSED
pkits.sh SUCCESS: Invalid Revoked CA Test2 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid Revoked EE Test3

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n GoodCACert -i /home/tinderbox/pkits/data//certs/GoodCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/GoodCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidRevokedEETest3EE.crt /home/tinderbox/pkits/data//certs/GoodCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=Invalid Revoked EE Certificate Test3,O=Test Certificates 2011,C=US :
  ERROR -8180: Peer's Certificate has been revoked.
pkits.sh: #3146: Invalid Revoked EE Test3 (2)  - PASSED
pkits.sh SUCCESS: Invalid Revoked EE Test3 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid Bad CRL Signature Test4

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n BadCRLSignatureCACert -i /home/tinderbox/pkits/data//certs/BadCRLSignatureCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/BadCRLSignatureCACRL.crl
crlutil: unable to import CRL: The CRL for the certificate's issuer has an invalid signature.
pkits.sh: #3147: Invalid Bad CRL Signature Test4 (1)  - PASSED
pkits.sh SUCCESS: Invalid Bad CRL Signature Test4 returned as expected 1
Restore DB

--------------------------------------------------------------------
Test case Invalid Bad CRL Issuer Name Test5

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n BadCRLIssuerNameCACert -i /home/tinderbox/pkits/data//certs/BadCRLIssuerNameCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/BadCRLIssuerNameCACRL.crl
crlutil: unable to import CRL: Peer's Certificate issuer is not recognized.
pkits.sh: #3148: Invalid Bad CRL Issuer Name Test5 (1)  - PASSED
pkits.sh SUCCESS: Invalid Bad CRL Issuer Name Test5 returned as expected 1
Restore DB

--------------------------------------------------------------------
Test case Valid Two CRLs Test7

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n TwoCRLsCACert -i /home/tinderbox/pkits/data//certs/TwoCRLsCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/TwoCRLsCAGoodCRL.crl
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/TwoCRLsCABadCRL.crl
crlutil: unable to import CRL: Peer's Certificate issuer is not recognized.
pkits.sh: #3149: Valid Two CRLs Test7 (1)  - PASSED
pkits.sh SUCCESS: Valid Two CRLs Test7 returned as expected 1
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidTwoCRLsTest7EE.crt /home/tinderbox/pkits/data//certs/TwoCRLsCACert.crt
Chain is good!
pkits.sh: #3150: Valid Two CRLs Test7 - PASSED
pkits.sh SUCCESS: Valid Two CRLs Test7 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid Unknown CRL Entry Extension Test8

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n UnknownCRLEntryExtensionCACert -i /home/tinderbox/pkits/data//certs/UnknownCRLEntryExtensionCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/UnknownCRLEntryExtensionCACRL.crl
crlutil: unable to import CRL: Issuer's V2 Certificate Revocation List has an unknown critical extension.
pkits.sh: #3151: Invalid Unknown CRL Entry Extension Test8 (1)  - PASSED
pkits.sh SUCCESS: Invalid Unknown CRL Entry Extension Test8 returned as expected 1
Restore DB

--------------------------------------------------------------------
Test case Invalid Unknown CRL Extension Test9

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n UnknownCRLExtensionCACert -i /home/tinderbox/pkits/data//certs/UnknownCRLExtensionCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/UnknownCRLExtensionCACRL.crl
crlutil: unable to import CRL: Issuer's V2 Certificate Revocation List has an unknown critical extension.
pkits.sh: #3152: Invalid Unknown CRL Extension Test9 (1)  - PASSED
pkits.sh SUCCESS: Invalid Unknown CRL Extension Test9 returned as expected 1
Restore DB

--------------------------------------------------------------------
Test case Invalid Unknown CRL Extension Test10

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n UnknownCRLExtensionCACert -i /home/tinderbox/pkits/data//certs/UnknownCRLExtensionCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/UnknownCRLExtensionCACRL.crl
crlutil: unable to import CRL: Issuer's V2 Certificate Revocation List has an unknown critical extension.
pkits.sh: #3153: Invalid Unknown CRL Extension Test10 (1)  - PASSED
pkits.sh SUCCESS: Invalid Unknown CRL Extension Test10 returned as expected 1
Restore DB

--------------------------------------------------------------------
Test case Valid GeneralizedTime CRL nextUpdate Test13

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n GeneralizedTimeCRLnextUpdateCACert -i /home/tinderbox/pkits/data//certs/GeneralizedTimeCRLnextUpdateCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/GeneralizedTimeCRLnextUpdateCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidGeneralizedTimeCRLnextUpdateTest13EE.crt /home/tinderbox/pkits/data//certs/GeneralizedTimeCRLnextUpdateCACert.crt
Chain is good!
pkits.sh: #3154: Valid GeneralizedTime CRL nextUpdate Test13 - PASSED
pkits.sh SUCCESS: Valid GeneralizedTime CRL nextUpdate Test13 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Valid Negative Serial Number Test14

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n NegativeSerialNumberCACert -i /home/tinderbox/pkits/data//certs/NegativeSerialNumberCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/NegativeSerialNumberCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidNegativeSerialNumberTest14EE.crt /home/tinderbox/pkits/data//certs/NegativeSerialNumberCACert.crt
Chain is good!
pkits.sh: #3155: Valid Negative Serial Number Test14 - PASSED
pkits.sh SUCCESS: Valid Negative Serial Number Test14 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid Negative Serial Number Test15

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n NegativeSerialNumberCACert -i /home/tinderbox/pkits/data//certs/NegativeSerialNumberCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/NegativeSerialNumberCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidNegativeSerialNumberTest15EE.crt /home/tinderbox/pkits/data//certs/NegativeSerialNumberCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=Invalid Negative Serial Number EE Certificate Test15,O=Test Certificates 2011,C=US :
  ERROR -8180: Peer's Certificate has been revoked.
pkits.sh: #3156: Invalid Negative Serial Number Test15 (2)  - PASSED
pkits.sh SUCCESS: Invalid Negative Serial Number Test15 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid Long Serial Number Test16

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n LongSerialNumberCACert -i /home/tinderbox/pkits/data//certs/LongSerialNumberCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/LongSerialNumberCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidLongSerialNumberTest16EE.crt /home/tinderbox/pkits/data//certs/LongSerialNumberCACert.crt
Chain is good!
pkits.sh: #3157: Valid Long Serial Number Test16 - PASSED
pkits.sh SUCCESS: Valid Long Serial Number Test16 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Valid Long Serial Number Test17

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n LongSerialNumberCACert -i /home/tinderbox/pkits/data//certs/LongSerialNumberCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/LongSerialNumberCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidLongSerialNumberTest17EE.crt /home/tinderbox/pkits/data//certs/LongSerialNumberCACert.crt
Chain is good!
pkits.sh: #3158: Valid Long Serial Number Test17 - PASSED
pkits.sh SUCCESS: Valid Long Serial Number Test17 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid Long Serial Number Test18

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n LongSerialNumberCACert -i /home/tinderbox/pkits/data//certs/LongSerialNumberCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/LongSerialNumberCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidLongSerialNumberTest18EE.crt /home/tinderbox/pkits/data//certs/LongSerialNumberCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=Invalid Long Serial Number EE Certificate Test18,O=Test Certificates 2011,C=US :
  ERROR -8180: Peer's Certificate has been revoked.
pkits.sh: #3159: Invalid Long Serial Number Test18 (2)  - PASSED
pkits.sh SUCCESS: Invalid Long Serial Number Test18 returned as expected 2
Restore DB

***************************************************************
NIST PKITS Section 4.5: Self-Issued Certificates
***************************************************************

***************************************************************
NIST PKITS Section 4.6: Verifying Basic Constraints
***************************************************************

--------------------------------------------------------------------
Test case Invalid Missing basicConstraints Test1

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n MissingbasicConstraintsCACert -i /home/tinderbox/pkits/data//certs/MissingbasicConstraintsCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/MissingbasicConstraintsCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidMissingbasicConstraintsTest1EE.crt /home/tinderbox/pkits/data//certs/MissingbasicConstraintsCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=Invalid Missing basicConstraints EE Certificate Test1,O=Test Certificates 2011,C=US :
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Missing basicConstraints CA,O=Test Certificates 2011,C=US
pkits.sh: #3160: Invalid Missing basicConstraints Test1 (2)  - PASSED
pkits.sh SUCCESS: Invalid Missing basicConstraints Test1 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid cA False Test2

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n basicConstraintsCriticalcAFalseCACert -i /home/tinderbox/pkits/data//certs/basicConstraintsCriticalcAFalseCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/basicConstraintsCriticalcAFalseCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidcAFalseTest2EE.crt /home/tinderbox/pkits/data//certs/basicConstraintsCriticalcAFalseCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=Invalid cA False EE Certificate Test2,O=Test Certificates 2011,C=US :
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=basicConstraints Critical cA False CA,O=Test Certificates 2011,C=US
pkits.sh: #3161: Invalid cA False Test2 (2)  - PASSED
pkits.sh SUCCESS: Invalid cA False Test2 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid cA False Test3

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n basicConstraintsNotCriticalcAFalseCACert -i /home/tinderbox/pkits/data//certs/basicConstraintsNotCriticalcAFalseCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/basicConstraintsNotCriticalcAFalseCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidcAFalseTest3EE.crt /home/tinderbox/pkits/data//certs/basicConstraintsNotCriticalcAFalseCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=Invalid cA False EE Certificate Test3,O=Test Certificates 2011,C=US :
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=basicConstraints Not Critical cA False CA,O=Test Certificates 2011,C=US
pkits.sh: #3162: Invalid cA False Test3 (2)  - PASSED
pkits.sh SUCCESS: Invalid cA False Test3 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid basicConstraints Not Critical Test4

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n basicConstraintsNotCriticalCACert -i /home/tinderbox/pkits/data//certs/basicConstraintsNotCriticalCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/basicConstraintsNotCriticalCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidbasicConstraintsNotCriticalTest4EE.crt /home/tinderbox/pkits/data//certs/basicConstraintsNotCriticalCACert.crt
Chain is good!
pkits.sh: #3163: Valid basicConstraints Not Critical Test4 - PASSED
pkits.sh SUCCESS: Valid basicConstraints Not Critical Test4 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid pathLenConstraint Test5

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint0CACert -i /home/tinderbox/pkits/data//certs/pathLenConstraint0CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint0CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint0subCACert -i /home/tinderbox/pkits/data//certs/pathLenConstraint0subCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint0subCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidpathLenConstraintTest5EE.crt /home/tinderbox/pkits/data//certs/pathLenConstraint0subCACert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint0CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. pathLenConstraint0CACert [Certificate Authority]:
  ERROR -8155: Certificate path length constraint is invalid.
pkits.sh: #3164: Invalid pathLenConstraint Test5 (2)  - PASSED
pkits.sh SUCCESS: Invalid pathLenConstraint Test5 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid pathLenConstraint Test6

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint0CACert -i /home/tinderbox/pkits/data//certs/pathLenConstraint0CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint0CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint0subCACert -i /home/tinderbox/pkits/data//certs/pathLenConstraint0subCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint0subCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidpathLenConstraintTest6EE.crt /home/tinderbox/pkits/data//certs/pathLenConstraint0subCACert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint0CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. pathLenConstraint0CACert [Certificate Authority]:
  ERROR -8155: Certificate path length constraint is invalid.
pkits.sh: #3165: Invalid pathLenConstraint Test6 (2)  - PASSED
pkits.sh SUCCESS: Invalid pathLenConstraint Test6 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid pathLenConstraint Test7

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint0CACert -i /home/tinderbox/pkits/data//certs/pathLenConstraint0CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint0CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidpathLenConstraintTest7EE.crt /home/tinderbox/pkits/data//certs/pathLenConstraint0CACert.crt
Chain is good!
pkits.sh: #3166: Valid pathLenConstraint Test7 - PASSED
pkits.sh SUCCESS: Valid pathLenConstraint Test7 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Valid pathLenConstraint test8

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint0CACert -i /home/tinderbox/pkits/data//certs/pathLenConstraint0CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint0CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidpathLenConstraintTest8EE.crt /home/tinderbox/pkits/data//certs/pathLenConstraint0CACert.crt
Chain is good!
pkits.sh: #3167: Valid pathLenConstraint test8 - PASSED
pkits.sh SUCCESS: Valid pathLenConstraint test8 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid pathLenConstraint Test9

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint6CACert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subCA0Cert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subCA0Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subCA0CRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subsubCA00Cert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubCA00Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subsubCA00CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidpathLenConstraintTest9EE.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubCA00Cert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subCA0Cert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. pathLenConstraint6subCA0Cert [Certificate Authority]:
  ERROR -8155: Certificate path length constraint is invalid.
pkits.sh: #3168: Invalid pathLenConstraint Test9 (2)  - PASSED
pkits.sh SUCCESS: Invalid pathLenConstraint Test9 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid pathLenConstraint Test10

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint6CACert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subCA0Cert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subCA0Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subCA0CRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subsubCA00Cert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubCA00Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subsubCA00CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidpathLenConstraintTest10EE.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubCA00Cert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subCA0Cert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. pathLenConstraint6subCA0Cert [Certificate Authority]:
  ERROR -8155: Certificate path length constraint is invalid.
pkits.sh: #3169: Invalid pathLenConstraint Test10 (2)  - PASSED
pkits.sh SUCCESS: Invalid pathLenConstraint Test10 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid pathLenConstraint Test11

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint6CACert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subCA1Cert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subCA1Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subCA1CRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subsubCA11Cert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubCA11Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subsubCA11CRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subsubsubCA11XCert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubsubCA11XCert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subsubsubCA11XCRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidpathLenConstraintTest11EE.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubsubCA11XCert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubCA11Cert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subCA1Cert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. pathLenConstraint6subCA1Cert [Certificate Authority]:
  ERROR -8155: Certificate path length constraint is invalid.
pkits.sh: #3170: Invalid pathLenConstraint Test11 (2)  - PASSED
pkits.sh SUCCESS: Invalid pathLenConstraint Test11 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid pathLenConstraint test12

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint6CACert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subCA1Cert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subCA1Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subCA1CRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subsubCA11Cert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubCA11Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subsubCA11CRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subsubsubCA11XCert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubsubCA11XCert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subsubsubCA11XCRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidpathLenConstraintTest12EE.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubsubCA11XCert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubCA11Cert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subCA1Cert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. pathLenConstraint6subCA1Cert [Certificate Authority]:
  ERROR -8155: Certificate path length constraint is invalid.
pkits.sh: #3171: Invalid pathLenConstraint test12 (2)  - PASSED
pkits.sh SUCCESS: Invalid pathLenConstraint test12 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid pathLenConstraint Test13

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint6CACert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subCA4Cert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subCA4Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subCA4CRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subsubCA41Cert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubCA41Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subsubCA41CRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subsubsubCA41XCert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubsubCA41XCert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subsubsubCA41XCRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidpathLenConstraintTest13EE.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubsubCA41XCert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubCA41Cert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subCA4Cert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6CACert.crt
Chain is good!
pkits.sh: #3172: Valid pathLenConstraint Test13 - PASSED
pkits.sh SUCCESS: Valid pathLenConstraint Test13 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Valid pathLenConstraint Test14

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint6CACert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subCA4Cert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subCA4Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subCA4CRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subsubCA41Cert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubCA41Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subsubCA41CRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subsubsubCA41XCert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubsubCA41XCert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subsubsubCA41XCRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidpathLenConstraintTest14EE.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubsubCA41XCert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubCA41Cert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subCA4Cert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6CACert.crt
Chain is good!
pkits.sh: #3173: Valid pathLenConstraint Test14 - PASSED
pkits.sh SUCCESS: Valid pathLenConstraint Test14 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid Self-Issued pathLenConstraint Test16

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint0CACert -i /home/tinderbox/pkits/data//certs/pathLenConstraint0CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint0CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint0subCA2Cert -i /home/tinderbox/pkits/data//certs/pathLenConstraint0subCA2Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint0subCA2CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidSelfIssuedpathLenConstraintTest16EE.crt /home/tinderbox/pkits/data//certs/pathLenConstraint0subCA2Cert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint0SelfIssuedCACert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint0CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. pathLenConstraint0CACert [Certificate Authority]:
  ERROR -8155: Certificate path length constraint is invalid.
pkits.sh: #3174: Invalid Self-Issued pathLenConstraint Test16 (2)  - PASSED
pkits.sh SUCCESS: Invalid Self-Issued pathLenConstraint Test16 returned as expected 2
Restore DB

***************************************************************
NIST PKITS Section 4.7: Key Usage
***************************************************************

--------------------------------------------------------------------
Test case Invalid keyUsage Critical keyCertSign False Test1

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n keyUsageCriticalkeyCertSignFalseCACert -i /home/tinderbox/pkits/data//certs/keyUsageCriticalkeyCertSignFalseCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/keyUsageCriticalkeyCertSignFalseCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidkeyUsageCriticalkeyCertSignFalseTest1EE.crt /home/tinderbox/pkits/data//certs/keyUsageCriticalkeyCertSignFalseCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. keyUsageCriticalkeyCertSignFalseCACert [Certificate Authority]:
  ERROR -8102: Certificate key usage inadequate for attempted operation.
    CN=Trust Anchor,O=Test Certificates 2011,C=US
pkits.sh: #3175: Invalid keyUsage Critical keyCertSign False Test1 (2)  - PASSED
pkits.sh SUCCESS: Invalid keyUsage Critical keyCertSign False Test1 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid keyUsage Not Critical keyCertSign False Test2

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n keyUsageNotCriticalkeyCertSignFalseCACert -i /home/tinderbox/pkits/data//certs/keyUsageNotCriticalkeyCertSignFalseCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/keyUsageNotCriticalkeyCertSignFalseCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidkeyUsageNotCriticalkeyCertSignFalseTest2EE.crt /home/tinderbox/pkits/data//certs/keyUsageNotCriticalkeyCertSignFalseCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. keyUsageNotCriticalkeyCertSignFalseCACert [Certificate Authority]:
  ERROR -8102: Certificate key usage inadequate for attempted operation.
    CN=Trust Anchor,O=Test Certificates 2011,C=US
pkits.sh: #3176: Invalid keyUsage Not Critical keyCertSign False Test2 (2)  - PASSED
pkits.sh SUCCESS: Invalid keyUsage Not Critical keyCertSign False Test2 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid keyUsage Not Critical Test3

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n keyUsageNotCriticalCACert -i /home/tinderbox/pkits/data//certs/keyUsageNotCriticalCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/keyUsageNotCriticalCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidkeyUsageNotCriticalTest3EE.crt /home/tinderbox/pkits/data//certs/keyUsageNotCriticalCACert.crt
Chain is good!
pkits.sh: #3177: Valid keyUsage Not Critical Test3 - PASSED
pkits.sh SUCCESS: Valid keyUsage Not Critical Test3 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid keyUsage Critical cRLSign False Test4

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n keyUsageCriticalcRLSignFalseCACert -i /home/tinderbox/pkits/data//certs/keyUsageCriticalcRLSignFalseCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/keyUsageCriticalcRLSignFalseCACRL.crl
crlutil: unable to import CRL: Certificate usages field is invalid.
pkits.sh: #3178: Invalid keyUsage Critical cRLSign False Test4 (1)  - PASSED
pkits.sh SUCCESS: Invalid keyUsage Critical cRLSign False Test4 returned as expected 1
Restore DB

--------------------------------------------------------------------
Test case Invalid keyUsage Not Critical cRLSign False Test5

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n keyUsageNotCriticalcRLSignFalseCACert -i /home/tinderbox/pkits/data//certs/keyUsageNotCriticalcRLSignFalseCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/keyUsageNotCriticalcRLSignFalseCACRL.crl
crlutil: unable to import CRL: Certificate usages field is invalid.
pkits.sh: #3179: Invalid keyUsage Not Critical cRLSign False Test5 (1)  - PASSED
pkits.sh SUCCESS: Invalid keyUsage Not Critical cRLSign False Test5 returned as expected 1
Restore DB

***************************************************************
NIST PKITS Section 4.13: Name Constraints
***************************************************************

--------------------------------------------------------------------
Test case Valid DN nameConstraints Test1

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidDNnameConstraintsTest1EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
Chain is good!
pkits.sh: #3180: Valid DN nameConstraints Test1 - PASSED
pkits.sh SUCCESS: Valid DN nameConstraints Test1 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid DN nameConstraints Test2

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNnameConstraintsTest2EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=Invalid DN nameConstraints EE Certificate Test2,OU=excludedSubtree1,O=Test Certificates 2011,C=US [Certificate Authority]:
  ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
pkits.sh: #3181: Invalid DN nameConstraints Test2 (2)  - PASSED
pkits.sh SUCCESS: Invalid DN nameConstraints Test2 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid DN nameConstraints Test3

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNnameConstraintsTest3EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=Invalid DN nameConstraints EE Certificate Test3,OU=permittedSubtree1,O=Test Certificates 2011,C=US [Certificate Authority]:
  ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
pkits.sh: #3182: Invalid DN nameConstraints Test3 (2)  - PASSED
pkits.sh SUCCESS: Invalid DN nameConstraints Test3 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid DN nameConstraints Test4

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidDNnameConstraintsTest4EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
Chain is good!
pkits.sh: #3183: Valid DN nameConstraints Test4 - PASSED
pkits.sh SUCCESS: Valid DN nameConstraints Test4 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Valid DN nameConstraints Test5

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN2CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN2CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN2CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidDNnameConstraintsTest5EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN2CACert.crt
Chain is good!
pkits.sh: #3184: Valid DN nameConstraints Test5 - PASSED
pkits.sh SUCCESS: Valid DN nameConstraints Test5 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Valid DN nameConstraints Test6

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN3CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN3CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN3CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidDNnameConstraintsTest6EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN3CACert.crt
Chain is good!
pkits.sh: #3185: Valid DN nameConstraints Test6 - PASSED
pkits.sh SUCCESS: Valid DN nameConstraints Test6 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid DN nameConstraints Test7

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN3CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN3CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN3CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNnameConstraintsTest7EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN3CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=Invalid DN nameConstraints EE Certificate Test7,OU=excludedSubtree1,O=Test Certificates 2011,C=US [Certificate Authority]:
  ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
pkits.sh: #3186: Invalid DN nameConstraints Test7 (2)  - PASSED
pkits.sh SUCCESS: Invalid DN nameConstraints Test7 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid DN nameConstraints Test8

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN4CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN4CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN4CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNnameConstraintsTest8EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN4CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=Invalid DN nameConstraints EE Certificate Test8,OU=excludedSubtree1,O=Test Certificates 2011,C=US [Certificate Authority]:
  ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
pkits.sh: #3187: Invalid DN nameConstraints Test8 (2)  - PASSED
pkits.sh SUCCESS: Invalid DN nameConstraints Test8 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid DN nameConstraints Test9

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN4CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN4CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN4CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNnameConstraintsTest9EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN4CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=Invalid DN nameConstraints EE Certificate Test9,OU=excludedSubtree2,O=Test Certificates 2011,C=US [Certificate Authority]:
  ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
pkits.sh: #3188: Invalid DN nameConstraints Test9 (2)  - PASSED
pkits.sh SUCCESS: Invalid DN nameConstraints Test9 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid DN nameConstraints Test10

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN5CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN5CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN5CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNnameConstraintsTest10EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN5CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=Invalid DN nameConstraints EE Certificate Test10,OU=excludedSubtree1,OU=permittedSubtree1,O=Test Certificates 2011,C=US [Certificate Authority]:
  ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
pkits.sh: #3189: Invalid DN nameConstraints Test10 (2)  - PASSED
pkits.sh SUCCESS: Invalid DN nameConstraints Test10 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid DN nameConstraints Test11

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN5CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN5CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN5CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidDNnameConstraintsTest11EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN5CACert.crt
Chain is good!
pkits.sh: #3190: Valid DN nameConstraints Test11 - PASSED
pkits.sh SUCCESS: Valid DN nameConstraints Test11 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid DN nameConstraints Test12

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1subCA1Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1subCA1Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1subCA1CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNnameConstraintsTest12EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1subCA1Cert.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=Invalid DN nameConstraints EE Certificate Test12,OU=permittedSubtree1,O=Test Certificates 2011,C=US [Certificate Authority]:
  ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
pkits.sh: #3191: Invalid DN nameConstraints Test12 (2)  - PASSED
pkits.sh SUCCESS: Invalid DN nameConstraints Test12 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid DN nameConstraints Test13

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1subCA2Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1subCA2Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1subCA2CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNnameConstraintsTest13EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1subCA2Cert.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=Invalid DN nameConstraints EE Certificate Test13,OU=permittedSubtree1,O=Test Certificates 2011,C=US [Certificate Authority]:
  ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
pkits.sh: #3192: Invalid DN nameConstraints Test13 (2)  - PASSED
pkits.sh SUCCESS: Invalid DN nameConstraints Test13 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid DN nameConstraints Test14

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1subCA2Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1subCA2Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1subCA2CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidDNnameConstraintsTest14EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1subCA2Cert.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
Chain is good!
pkits.sh: #3193: Valid DN nameConstraints Test14 - PASSED
pkits.sh SUCCESS: Valid DN nameConstraints Test14 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid DN nameConstraints Test15

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN3CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN3CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN3CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN3subCA1Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN3subCA1Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN3subCA1CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNnameConstraintsTest15EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN3subCA1Cert.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN3CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=Invalid DN nameConstraints EE Certificate Test15,OU=excludedSubtree1,O=Test Certificates 2011,C=US [Certificate Authority]:
  ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
pkits.sh: #3194: Invalid DN nameConstraints Test15 (2)  - PASSED
pkits.sh SUCCESS: Invalid DN nameConstraints Test15 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid DN nameConstraints Test16

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN3CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN3CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN3CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN3subCA1Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN3subCA1Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN3subCA1CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNnameConstraintsTest16EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN3subCA1Cert.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN3CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=Invalid DN nameConstraints EE Certificate Test16,OU=excludedSubtree2,O=Test Certificates 2011,C=US [Certificate Authority]:
  ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
pkits.sh: #3195: Invalid DN nameConstraints Test16 (2)  - PASSED
pkits.sh SUCCESS: Invalid DN nameConstraints Test16 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid DN nameConstraints Test17

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN3CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN3CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN3CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN3subCA2Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN3subCA2Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN3subCA2CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNnameConstraintsTest17EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN3subCA2Cert.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN3CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=Invalid DN nameConstraints EE Certificate Test17,OU=excludedSubtree1,O=Test Certificates 2011,C=US [Certificate Authority]:
  ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
pkits.sh: #3196: Invalid DN nameConstraints Test17 (2)  - PASSED
pkits.sh SUCCESS: Invalid DN nameConstraints Test17 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid DN nameConstraints Test18

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN3CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN3CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN3CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN3subCA2Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN3subCA2Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN3subCA2CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidDNnameConstraintsTest18EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN3subCA2Cert.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN3CACert.crt
Chain is good!
pkits.sh: #3197: Valid DN nameConstraints Test18 - PASSED
pkits.sh SUCCESS: Valid DN nameConstraints Test18 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid Self-Issued DN nameConstraints Test20

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNnameConstraintsTest20EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=nameConstraints DN1 CA,O=Test Certificates 2011,C=US [Certificate Authority]:
  ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
pkits.sh: #3198: Invalid Self-Issued DN nameConstraints Test20 (2)  - PASSED
pkits.sh SUCCESS: Invalid Self-Issued DN nameConstraints Test20 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid RFC822 nameConstraints Test21

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsRFC822CA1Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsRFC822CA1Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsRFC822CA1CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidRFC822nameConstraintsTest21EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsRFC822CA1Cert.crt
Chain is good!
pkits.sh: #3199: Valid RFC822 nameConstraints Test21 - PASSED
pkits.sh SUCCESS: Valid RFC822 nameConstraints Test21 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid RFC822 nameConstraints Test22

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsRFC822CA1Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsRFC822CA1Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsRFC822CA1CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidRFC822nameConstraintsTest22EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsRFC822CA1Cert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. test22ee@testcertificates.gov [Certificate Authority]:
  ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
pkits.sh: #3200: Invalid RFC822 nameConstraints Test22 (2)  - PASSED
pkits.sh SUCCESS: Invalid RFC822 nameConstraints Test22 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid RFC822 nameConstraints Test23

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsRFC822CA2Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsRFC822CA2Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsRFC822CA2CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidRFC822nameConstraintsTest23EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsRFC822CA2Cert.crt
Chain is good!
pkits.sh: #3201: Valid RFC822 nameConstraints Test23 - PASSED
pkits.sh SUCCESS: Valid RFC822 nameConstraints Test23 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid RFC822 nameConstraints Test24

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsRFC822CA2Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsRFC822CA2Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsRFC822CA2CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidRFC822nameConstraintsTest24EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsRFC822CA2Cert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. test24ee@mailserver.testcertificates.gov [Certificate Authority]:
  ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
pkits.sh: #3202: Invalid RFC822 nameConstraints Test24 (2)  - PASSED
pkits.sh SUCCESS: Invalid RFC822 nameConstraints Test24 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid RFC822 nameConstraints Test25

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsRFC822CA3Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsRFC822CA3Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsRFC822CA3CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidRFC822nameConstraintsTest25EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsRFC822CA3Cert.crt
Chain is good!
pkits.sh: #3203: Valid RFC822 nameConstraints Test25 - PASSED
pkits.sh SUCCESS: Valid RFC822 nameConstraints Test25 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid RFC822 nameConstraints Test26

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsRFC822CA3Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsRFC822CA3Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsRFC822CA3CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidRFC822nameConstraintsTest26EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsRFC822CA3Cert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. test26ee@testcertificates.gov [Certificate Authority]:
  ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
pkits.sh: #3204: Invalid RFC822 nameConstraints Test26 (2)  - PASSED
pkits.sh SUCCESS: Invalid RFC822 nameConstraints Test26 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid DN and RFC822 nameConstraints Test27

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1subCA3Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1subCA3Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1subCA3CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidDNandRFC822nameConstraintsTest27EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1subCA3Cert.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
Chain is good!
pkits.sh: #3205: Valid DN and RFC822 nameConstraints Test27 - PASSED
pkits.sh SUCCESS: Valid DN and RFC822 nameConstraints Test27 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid DN and RFC822 nameConstraints Test28

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1subCA3Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1subCA3Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1subCA3CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNandRFC822nameConstraintsTest28EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1subCA3Cert.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. test28ee@invalidcertificates.gov [Certificate Authority]:
  ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
pkits.sh: #3206: Invalid DN and RFC822 nameConstraints Test28 (2)  - PASSED
pkits.sh SUCCESS: Invalid DN and RFC822 nameConstraints Test28 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid DN and RFC822 nameConstraints Test29

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1subCA3Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1subCA3Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1subCA3CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNandRFC822nameConstraintsTest29EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1subCA3Cert.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. test29ee@invalidcertificates.gov [Certificate Authority]:
  ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
pkits.sh: #3207: Invalid DN and RFC822 nameConstraints Test29 (2)  - PASSED
pkits.sh SUCCESS: Invalid DN and RFC822 nameConstraints Test29 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid DNS nameConstraints Test30

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDNS1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDNS1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDNS1CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidDNSnameConstraintsTest30EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDNS1CACert.crt
Chain is good!
pkits.sh: #3208: Valid DNS nameConstraints Test30 - PASSED
pkits.sh SUCCESS: Valid DNS nameConstraints Test30 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid DNS nameConstraints Test31

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDNS1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDNS1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDNS1CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNSnameConstraintsTest31EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDNS1CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=Invalid DNS nameConstraints EE Certificate Test31,O=Test Certificates 2011,C=US [Certificate Authority]:
  ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
pkits.sh: #3209: Invalid DNS nameConstraints Test31 (2)  - PASSED
pkits.sh SUCCESS: Invalid DNS nameConstraints Test31 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid DNS nameConstraints Test32

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDNS2CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDNS2CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDNS2CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidDNSnameConstraintsTest32EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDNS2CACert.crt
Chain is good!
pkits.sh: #3210: Valid DNS nameConstraints Test32 - PASSED
pkits.sh SUCCESS: Valid DNS nameConstraints Test32 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid DNS nameConstraints Test33

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDNS2CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDNS2CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDNS2CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNSnameConstraintsTest33EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDNS2CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=Invalid DNS nameConstraints EE Certificate Test33,O=Test Certificates 2011,C=US [Certificate Authority]:
  ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
pkits.sh: #3211: Invalid DNS nameConstraints Test33 (2)  - PASSED
pkits.sh SUCCESS: Invalid DNS nameConstraints Test33 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid URI nameConstraints Test34

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsURI1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsURI1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsURI1CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidURInameConstraintsTest34EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsURI1CACert.crt
Chain is good!
pkits.sh: #3212: Valid URI nameConstraints Test34 - PASSED
pkits.sh SUCCESS: Valid URI nameConstraints Test34 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid URI nameConstraints Test35

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsURI1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsURI1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsURI1CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidURInameConstraintsTest35EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsURI1CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=Invalid URI nameConstraints EE Certificate Test35,O=Test Certificates 2011,C=US [Certificate Authority]:
  ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
pkits.sh: #3213: Invalid URI nameConstraints Test35 (2)  - PASSED
pkits.sh SUCCESS: Invalid URI nameConstraints Test35 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid URI nameConstraints Test36

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsURI2CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsURI2CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsURI2CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidURInameConstraintsTest36EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsURI2CACert.crt
Chain is good!
pkits.sh: #3214: Valid URI nameConstraints Test36 - PASSED
pkits.sh SUCCESS: Valid URI nameConstraints Test36 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid URI nameConstraints Test37

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsURI2CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsURI2CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsURI2CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidURInameConstraintsTest37EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsURI2CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=Invalid URI nameConstraints EE Certificate Test37,O=Test Certificates 2011,C=US [Certificate Authority]:
  ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
pkits.sh: #3215: Invalid URI nameConstraints Test37 (2)  - PASSED
pkits.sh SUCCESS: Invalid URI nameConstraints Test37 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid DNS nameConstraints Test38

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDNS1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDNS1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDNS1CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNSnameConstraintsTest38EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDNS1CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=Invalid DNS nameConstraints EE Certificate Test38,O=Test Certificates 2011,C=US [Certificate Authority]:
  ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
pkits.sh: #3216: Invalid DNS nameConstraints Test38 (2)  - PASSED
pkits.sh SUCCESS: Invalid DNS nameConstraints Test38 returned as expected 2
Restore DB

***************************************************************
NIST PKITS Section 4.16: Private Certificate Extensions
***************************************************************

--------------------------------------------------------------------
Test case Valid Unknown Not Critical Certificate Extension Test1

vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidUnknownNotCriticalCertificateExtensionTest1EE.crt
Chain is good!
pkits.sh: #3217: Valid Unknown Not Critical Certificate Extension Test1 - PASSED
pkits.sh SUCCESS: Valid Unknown Not Critical Certificate Extension Test1 returned as expected 0

--------------------------------------------------------------------
Test case Invalid Unknown Critical Certificate Extension Test2

vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidUnknownCriticalCertificateExtensionTest2EE.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=Invalid Unknown Critical Certificate Extension EE Cert Test2,O=Test Certificates 2011,C=US :
  ERROR -8151: Certificate contains unknown critical extension.
pkits.sh: #3218: Invalid Unknown Critical Certificate Extension Test2 (2)  - PASSED
pkits.sh SUCCESS: Invalid Unknown Critical Certificate Extension Test2 returned as expected 2
TIMESTAMP pkits END: Wed Nov 28 11:04:58 EST 2012
Running tests for chains
TIMESTAMP chains BEGIN: Wed Nov 28 11:04:58 EST 2012
~/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/aiahttp ~/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/chains
httpserv starting at Wed Nov 28 11:04:58 EST 2012
httpserv -D -p 8556  \
         -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/aiahttp/http_pid.10869  &
trying to connect to httpserv at Wed Nov 28 11:04:58 EST 2012
tstclnt -p 8556 -h buildnss02.usersys.redhat.com -q -v
tstclnt: connecting to buildnss02.usersys.redhat.com:8556 (address=10.16.79.157)
kill -0 27588 >/dev/null 2>/dev/null
httpserv with PID 27588 found at Wed Nov 28 11:04:58 EST 2012
httpserv with PID 27588 started at Wed Nov 28 11:04:58 EST 2012
~/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/chains
chains.sh: Certificate Chains Tests ===============================
chains.sh: Creating DB ArmyDB
certutil -N -d ArmyDB -f ArmyDB/dbpasswd
chains.sh: #3219: Bridge: Creating DB ArmyDB  - PASSED
chains.sh: Creating Root CA Army
certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army  -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1128110459 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3220: Bridge: Creating Root CA Army  - PASSED
chains.sh: Exporting Root CA Army.der
certutil -L -d ArmyDB -r -n Army -o Army.der
chains.sh: #3221: Bridge: Exporting Root CA Army.der  - PASSED
chains.sh: Creating DB NavyDB
certutil -N -d NavyDB -f NavyDB/dbpasswd
chains.sh: #3222: Bridge: Creating DB NavyDB  - PASSED
chains.sh: Creating Root CA Navy
certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy  -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1128110460 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3223: Bridge: Creating Root CA Navy  - PASSED
chains.sh: Exporting Root CA Navy.der
certutil -L -d NavyDB -r -n Navy -o Navy.der
chains.sh: #3224: Bridge: Exporting Root CA Navy.der  - PASSED
chains.sh: Creating DB BridgeDB
certutil -N -d BridgeDB -f BridgeDB/dbpasswd
chains.sh: #3225: Bridge: Creating DB BridgeDB  - PASSED
chains.sh: Creating Bridge certifiate request BridgeReq.der
certutil -s "CN=Bridge Bridge, O=Bridge, C=US"  -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o BridgeReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3226: Bridge: Creating Bridge certifiate request BridgeReq.der  - PASSED
chains.sh: Creating certficate BridgeArmy.der signed by Army
certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1128110461 -7 Bridge@Army  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3227: Bridge: Creating certficate BridgeArmy.der signed by Army  - PASSED
chains.sh: Importing certificate BridgeArmy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der
chains.sh: #3228: Bridge: Importing certificate BridgeArmy.der to BridgeDB database  - PASSED
chains.sh: Creating certficate BridgeNavy.der signed by Navy
certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1128110462 -7 Bridge@Navy  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3229: Bridge: Creating certficate BridgeNavy.der signed by Navy  - PASSED
chains.sh: Importing certificate BridgeNavy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der
chains.sh: #3230: Bridge: Importing certificate BridgeNavy.der to BridgeDB database  - PASSED
chains.sh: Generating PKCS7 package from BridgeDB database
cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7
chains.sh: #3231: Bridge: Generating PKCS7 package from BridgeDB database  - PASSED
chains.sh: Creating DB UserDB
certutil -N -d UserDB -f UserDB/dbpasswd
chains.sh: #3232: Bridge: Creating DB UserDB  - PASSED
chains.sh: Creating EE certifiate request UserReq.der
certutil -s "CN=User EE, O=User, C=US"  -R  -d UserDB -f UserDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o UserReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3233: Bridge: Creating EE certifiate request UserReq.der  - PASSED
chains.sh: Creating certficate UserBridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 1128110463   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3234: Bridge: Creating certficate UserBridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate UserBridge.der to UserDB database
certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der
chains.sh: #3235: Bridge: Importing certificate UserBridge.der to UserDB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #3236: Bridge: Creating DB AllDB  - PASSED
chains.sh: Importing certificate Army.der to AllDB database
certutil -A -n Army  -t "" -d AllDB -f AllDB/dbpasswd -i Army.der
chains.sh: #3237: Bridge: Importing certificate Army.der to AllDB database  - PASSED
chains.sh: Importing certificate Navy.der to AllDB database
certutil -A -n Navy  -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der
chains.sh: #3238: Bridge: Importing certificate Navy.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags  -d AllDB     -t Navy
vfychain -d AllDB -pp -vv      UserBridge.der BridgeNavy.der  -t Navy
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128110460 (0x433d997c)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 16:04:59 2012
            Not After : Tue Nov 28 16:04:59 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:50:d3:0f:f2:19:9b:08:16:3e:c2:29:9a:18:5b:ca:
                    da:69:7d:f4:94:d7:1c:fe:4b:ef:87:21:1c:08:c2:e2:
                    95:ae:0f:3a:0b:ce:1c:c1:1d:ce:00:89:43:6e:ef:15:
                    6f:32:9a:72:0b:7e:c0:16:98:a9:f6:02:33:a7:9f:1e:
                    f6:62:b1:ad:87:5e:da:e9:8a:92:83:87:1b:71:20:48:
                    2f:7e:5e:e7:2b:2a:e2:15:0e:52:3b:e9:5f:87:6a:26:
                    e1:6e:c5:10:92:3e:8b:ed:39:e9:7e:72:06:0e:4b:2d:
                    29:ef:30:17:f9:a5:13:82:f8:7d:19:80:47:f4:05:49
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        66:a0:46:45:08:11:0c:2a:a9:4b:96:4b:a5:90:29:63:
        43:a3:49:1c:63:b7:85:98:34:5a:5c:7c:13:95:e9:e0:
        47:07:b5:2b:f6:9f:c9:80:b3:33:6a:1e:3c:95:a1:f1:
        a1:63:7e:1f:91:e2:12:d6:76:60:3e:ba:49:4a:9b:11:
        ac:55:08:a8:6e:5b:35:42:79:eb:f5:35:bb:82:88:1e:
        72:ba:2e:5b:f7:1c:c5:c4:db:27:bb:ae:1a:31:54:5d:
        3e:c1:e1:08:af:4b:a1:0f:67:15:0d:1a:a4:e8:f8:c4:
        69:f0:e2:53:7b:3c:71:f9:1a:ce:e9:f2:16:a9:b4:e6
    Fingerprint (MD5):
        80:3D:F4:CC:AA:57:89:AC:26:A4:F0:9D:81:18:71:0E
    Fingerprint (SHA1):
        73:AF:A5:4F:99:1A:B6:72:B2:AD:7A:E9:78:92:83:51:67:85:20:9B

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #3239: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags  -d AllDB     -t Navy - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags  -d AllDB     -t Army
vfychain -d AllDB -pp -vv      UserBridge.der BridgeArmy.der  -t Army
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128110459 (0x433d997b)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Wed Nov 28 16:04:58 2012
            Not After : Tue Nov 28 16:04:58 2062
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c8:e5:8a:98:5f:fe:4a:8f:90:14:d9:6a:41:db:75:ec:
                    73:ef:4f:dc:89:67:c3:3e:01:3a:52:15:7e:01:7c:54:
                    34:cd:f6:3a:75:0d:e5:c9:f3:3f:9f:cc:58:7c:77:1d:
                    64:c9:88:a0:e6:d8:6c:19:44:2a:b7:f1:16:4b:81:2b:
                    11:74:fc:9d:94:e8:2d:19:e4:65:c9:53:34:d6:0d:57:
                    e0:1a:d3:d3:65:af:6d:23:2b:70:1e:04:da:f4:6c:01:
                    3c:5d:8c:cb:1b:ed:19:5a:3a:50:74:b0:a7:f6:36:00:
                    11:30:af:20:25:59:79:3e:73:74:cb:3d:50:56:e9:ef
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ae:56:44:ff:15:65:ee:43:9e:93:63:61:cc:c8:2d:24:
        7b:49:63:23:15:b4:68:31:a1:ed:e6:d9:b4:cf:2a:b7:
        57:4d:21:f4:a2:f9:b1:42:6e:14:f1:4a:53:f4:45:ed:
        13:07:17:fb:97:ed:93:bd:f9:f0:48:53:63:90:65:8b:
        df:28:4d:5c:77:1e:4c:cf:b5:8c:ff:01:d5:62:86:11:
        a3:6b:03:13:d9:4d:45:ca:27:95:8f:8b:94:c8:74:05:
        2a:8c:55:16:00:ae:37:df:f6:3b:e1:59:b1:65:ce:5a:
        81:25:0a:f9:bc:e6:cd:cf:09:56:a5:42:be:58:2c:02
    Fingerprint (MD5):
        9F:BE:D5:5D:7E:C0:46:86:71:9B:78:52:A6:5A:C9:7E
    Fingerprint (SHA1):
        36:24:F3:B4:70:7E:A8:A0:31:B5:EE:8E:EB:42:A3:97:54:33:45:49

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #3240: Bridge: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags  -d AllDB     -t Army - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags  -d AllDB     -t Army
vfychain -d AllDB -pp -vv      UserBridge.der BridgeNavy.der  -t Army
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Navy [Certificate Authority]:
  ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user.
    CN=Navy ROOT CA,O=Navy,C=US
Returned value is 1, expected result is fail
chains.sh: #3241: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags  -d AllDB     -t Army - PASSED
chains.sh: Importing certificate BridgeArmy.der to AllDB database
certutil -A -n Bridge  -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der
chains.sh: #3242: Bridge: Importing certificate BridgeArmy.der to AllDB database  - PASSED
chains.sh: Importing certificate BridgeNavy.der to AllDB database
certutil -A -n Bridge  -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der
chains.sh: #3243: Bridge: Importing certificate BridgeNavy.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der with flags  -d AllDB     -t Army
vfychain -d AllDB -pp -vv      UserBridge.der  -t Army
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128110459 (0x433d997b)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Wed Nov 28 16:04:58 2012
            Not After : Tue Nov 28 16:04:58 2062
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c8:e5:8a:98:5f:fe:4a:8f:90:14:d9:6a:41:db:75:ec:
                    73:ef:4f:dc:89:67:c3:3e:01:3a:52:15:7e:01:7c:54:
                    34:cd:f6:3a:75:0d:e5:c9:f3:3f:9f:cc:58:7c:77:1d:
                    64:c9:88:a0:e6:d8:6c:19:44:2a:b7:f1:16:4b:81:2b:
                    11:74:fc:9d:94:e8:2d:19:e4:65:c9:53:34:d6:0d:57:
                    e0:1a:d3:d3:65:af:6d:23:2b:70:1e:04:da:f4:6c:01:
                    3c:5d:8c:cb:1b:ed:19:5a:3a:50:74:b0:a7:f6:36:00:
                    11:30:af:20:25:59:79:3e:73:74:cb:3d:50:56:e9:ef
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ae:56:44:ff:15:65:ee:43:9e:93:63:61:cc:c8:2d:24:
        7b:49:63:23:15:b4:68:31:a1:ed:e6:d9:b4:cf:2a:b7:
        57:4d:21:f4:a2:f9:b1:42:6e:14:f1:4a:53:f4:45:ed:
        13:07:17:fb:97:ed:93:bd:f9:f0:48:53:63:90:65:8b:
        df:28:4d:5c:77:1e:4c:cf:b5:8c:ff:01:d5:62:86:11:
        a3:6b:03:13:d9:4d:45:ca:27:95:8f:8b:94:c8:74:05:
        2a:8c:55:16:00:ae:37:df:f6:3b:e1:59:b1:65:ce:5a:
        81:25:0a:f9:bc:e6:cd:cf:09:56:a5:42:be:58:2c:02
    Fingerprint (MD5):
        9F:BE:D5:5D:7E:C0:46:86:71:9B:78:52:A6:5A:C9:7E
    Fingerprint (SHA1):
        36:24:F3:B4:70:7E:A8:A0:31:B5:EE:8E:EB:42:A3:97:54:33:45:49

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #3244: Bridge: Verifying certificate(s)  UserBridge.der with flags  -d AllDB     -t Army - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der with flags  -d AllDB     -t Navy
vfychain -d AllDB -pp -vv      UserBridge.der  -t Navy
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128110460 (0x433d997c)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 16:04:59 2012
            Not After : Tue Nov 28 16:04:59 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:50:d3:0f:f2:19:9b:08:16:3e:c2:29:9a:18:5b:ca:
                    da:69:7d:f4:94:d7:1c:fe:4b:ef:87:21:1c:08:c2:e2:
                    95:ae:0f:3a:0b:ce:1c:c1:1d:ce:00:89:43:6e:ef:15:
                    6f:32:9a:72:0b:7e:c0:16:98:a9:f6:02:33:a7:9f:1e:
                    f6:62:b1:ad:87:5e:da:e9:8a:92:83:87:1b:71:20:48:
                    2f:7e:5e:e7:2b:2a:e2:15:0e:52:3b:e9:5f:87:6a:26:
                    e1:6e:c5:10:92:3e:8b:ed:39:e9:7e:72:06:0e:4b:2d:
                    29:ef:30:17:f9:a5:13:82:f8:7d:19:80:47:f4:05:49
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        66:a0:46:45:08:11:0c:2a:a9:4b:96:4b:a5:90:29:63:
        43:a3:49:1c:63:b7:85:98:34:5a:5c:7c:13:95:e9:e0:
        47:07:b5:2b:f6:9f:c9:80:b3:33:6a:1e:3c:95:a1:f1:
        a1:63:7e:1f:91:e2:12:d6:76:60:3e:ba:49:4a:9b:11:
        ac:55:08:a8:6e:5b:35:42:79:eb:f5:35:bb:82:88:1e:
        72:ba:2e:5b:f7:1c:c5:c4:db:27:bb:ae:1a:31:54:5d:
        3e:c1:e1:08:af:4b:a1:0f:67:15:0d:1a:a4:e8:f8:c4:
        69:f0:e2:53:7b:3c:71:f9:1a:ce:e9:f2:16:a9:b4:e6
    Fingerprint (MD5):
        80:3D:F4:CC:AA:57:89:AC:26:A4:F0:9D:81:18:71:0E
    Fingerprint (SHA1):
        73:AF:A5:4F:99:1A:B6:72:B2:AD:7A:E9:78:92:83:51:67:85:20:9B

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #3245: Bridge: Verifying certificate(s)  UserBridge.der with flags  -d AllDB     -t Navy - PASSED
chains.sh: Creating DB ArmyOnlyDB
certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd
chains.sh: #3246: Bridge: Creating DB ArmyOnlyDB  - PASSED
chains.sh: Importing certificate Army.der to ArmyOnlyDB database
certutil -A -n Army  -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der
chains.sh: #3247: Bridge: Importing certificate Army.der to ArmyOnlyDB database  - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der with flags  -d ArmyOnlyDB    
vfychain -d ArmyOnlyDB -pp -vv      UserBridge.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=User EE,O=User,C=US :
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Bridge Bridge,O=Bridge,C=US
Returned value is 1, expected result is fail
chains.sh: #3248: Bridge: Verifying certificate(s)  UserBridge.der with flags  -d ArmyOnlyDB     - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags  -d ArmyOnlyDB    
vfychain -d ArmyOnlyDB -pp -vv      UserBridge.der BridgeNavy.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. bridge@navy [Certificate Authority]:
Email Address(es): bridge@navy
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Navy ROOT CA,O=Navy,C=US
Returned value is 1, expected result is fail
chains.sh: #3249: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags  -d ArmyOnlyDB     - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der Navy.der with flags  -d ArmyOnlyDB    
vfychain -d ArmyOnlyDB -pp -vv      UserBridge.der BridgeNavy.der Navy.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user.
    CN=Navy ROOT CA,O=Navy,C=US
Returned value is 1, expected result is fail
chains.sh: #3250: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der Navy.der with flags  -d ArmyOnlyDB     - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der Navy.der with flags  -d ArmyOnlyDB     -t Navy.der
vfychain -d ArmyOnlyDB -pp -vv      UserBridge.der BridgeNavy.der Navy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128110460 (0x433d997c)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 16:04:59 2012
            Not After : Tue Nov 28 16:04:59 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:50:d3:0f:f2:19:9b:08:16:3e:c2:29:9a:18:5b:ca:
                    da:69:7d:f4:94:d7:1c:fe:4b:ef:87:21:1c:08:c2:e2:
                    95:ae:0f:3a:0b:ce:1c:c1:1d:ce:00:89:43:6e:ef:15:
                    6f:32:9a:72:0b:7e:c0:16:98:a9:f6:02:33:a7:9f:1e:
                    f6:62:b1:ad:87:5e:da:e9:8a:92:83:87:1b:71:20:48:
                    2f:7e:5e:e7:2b:2a:e2:15:0e:52:3b:e9:5f:87:6a:26:
                    e1:6e:c5:10:92:3e:8b:ed:39:e9:7e:72:06:0e:4b:2d:
                    29:ef:30:17:f9:a5:13:82:f8:7d:19:80:47:f4:05:49
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        66:a0:46:45:08:11:0c:2a:a9:4b:96:4b:a5:90:29:63:
        43:a3:49:1c:63:b7:85:98:34:5a:5c:7c:13:95:e9:e0:
        47:07:b5:2b:f6:9f:c9:80:b3:33:6a:1e:3c:95:a1:f1:
        a1:63:7e:1f:91:e2:12:d6:76:60:3e:ba:49:4a:9b:11:
        ac:55:08:a8:6e:5b:35:42:79:eb:f5:35:bb:82:88:1e:
        72:ba:2e:5b:f7:1c:c5:c4:db:27:bb:ae:1a:31:54:5d:
        3e:c1:e1:08:af:4b:a1:0f:67:15:0d:1a:a4:e8:f8:c4:
        69:f0:e2:53:7b:3c:71:f9:1a:ce:e9:f2:16:a9:b4:e6
    Fingerprint (MD5):
        80:3D:F4:CC:AA:57:89:AC:26:A4:F0:9D:81:18:71:0E
    Fingerprint (SHA1):
        73:AF:A5:4F:99:1A:B6:72:B2:AD:7A:E9:78:92:83:51:67:85:20:9B


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #3251: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der Navy.der with flags  -d ArmyOnlyDB     -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags  -d ArmyOnlyDB     -t Navy.der
vfychain -d ArmyOnlyDB -pp -vv      UserBridge.der BridgeNavy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128110460 (0x433d997c)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 16:04:59 2012
            Not After : Tue Nov 28 16:04:59 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:50:d3:0f:f2:19:9b:08:16:3e:c2:29:9a:18:5b:ca:
                    da:69:7d:f4:94:d7:1c:fe:4b:ef:87:21:1c:08:c2:e2:
                    95:ae:0f:3a:0b:ce:1c:c1:1d:ce:00:89:43:6e:ef:15:
                    6f:32:9a:72:0b:7e:c0:16:98:a9:f6:02:33:a7:9f:1e:
                    f6:62:b1:ad:87:5e:da:e9:8a:92:83:87:1b:71:20:48:
                    2f:7e:5e:e7:2b:2a:e2:15:0e:52:3b:e9:5f:87:6a:26:
                    e1:6e:c5:10:92:3e:8b:ed:39:e9:7e:72:06:0e:4b:2d:
                    29:ef:30:17:f9:a5:13:82:f8:7d:19:80:47:f4:05:49
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        66:a0:46:45:08:11:0c:2a:a9:4b:96:4b:a5:90:29:63:
        43:a3:49:1c:63:b7:85:98:34:5a:5c:7c:13:95:e9:e0:
        47:07:b5:2b:f6:9f:c9:80:b3:33:6a:1e:3c:95:a1:f1:
        a1:63:7e:1f:91:e2:12:d6:76:60:3e:ba:49:4a:9b:11:
        ac:55:08:a8:6e:5b:35:42:79:eb:f5:35:bb:82:88:1e:
        72:ba:2e:5b:f7:1c:c5:c4:db:27:bb:ae:1a:31:54:5d:
        3e:c1:e1:08:af:4b:a1:0f:67:15:0d:1a:a4:e8:f8:c4:
        69:f0:e2:53:7b:3c:71:f9:1a:ce:e9:f2:16:a9:b4:e6
    Fingerprint (MD5):
        80:3D:F4:CC:AA:57:89:AC:26:A4:F0:9D:81:18:71:0E
    Fingerprint (SHA1):
        73:AF:A5:4F:99:1A:B6:72:B2:AD:7A:E9:78:92:83:51:67:85:20:9B


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #3252: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags  -d ArmyOnlyDB     -t Navy.der - PASSED
chains.sh: Creating DB NavyOnlyDB
certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd
chains.sh: #3253: Bridge: Creating DB NavyOnlyDB  - PASSED
chains.sh: Importing certificate Navy.der to NavyOnlyDB database
certutil -A -n Navy  -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der
chains.sh: #3254: Bridge: Importing certificate Navy.der to NavyOnlyDB database  - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der with flags  -d NavyOnlyDB    
vfychain -d NavyOnlyDB -pp -vv      UserBridge.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=User EE,O=User,C=US :
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Bridge Bridge,O=Bridge,C=US
Returned value is 1, expected result is fail
chains.sh: #3255: Bridge: Verifying certificate(s)  UserBridge.der with flags  -d NavyOnlyDB     - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags  -d NavyOnlyDB    
vfychain -d NavyOnlyDB -pp -vv      UserBridge.der BridgeArmy.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. bridge@army [Certificate Authority]:
Email Address(es): bridge@army
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Army ROOT CA,O=Army,C=US
Returned value is 1, expected result is fail
chains.sh: #3256: Bridge: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags  -d NavyOnlyDB     - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeArmy.der Army.der with flags  -d NavyOnlyDB    
vfychain -d NavyOnlyDB -pp -vv      UserBridge.der BridgeArmy.der Army.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user.
    CN=Army ROOT CA,O=Army,C=US
Returned value is 1, expected result is fail
chains.sh: #3257: Bridge: Verifying certificate(s)  UserBridge.der BridgeArmy.der Army.der with flags  -d NavyOnlyDB     - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeArmy.der Army.der with flags  -d NavyOnlyDB     -t Army.der
vfychain -d NavyOnlyDB -pp -vv      UserBridge.der BridgeArmy.der Army.der  -t Army.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128110459 (0x433d997b)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Wed Nov 28 16:04:58 2012
            Not After : Tue Nov 28 16:04:58 2062
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c8:e5:8a:98:5f:fe:4a:8f:90:14:d9:6a:41:db:75:ec:
                    73:ef:4f:dc:89:67:c3:3e:01:3a:52:15:7e:01:7c:54:
                    34:cd:f6:3a:75:0d:e5:c9:f3:3f:9f:cc:58:7c:77:1d:
                    64:c9:88:a0:e6:d8:6c:19:44:2a:b7:f1:16:4b:81:2b:
                    11:74:fc:9d:94:e8:2d:19:e4:65:c9:53:34:d6:0d:57:
                    e0:1a:d3:d3:65:af:6d:23:2b:70:1e:04:da:f4:6c:01:
                    3c:5d:8c:cb:1b:ed:19:5a:3a:50:74:b0:a7:f6:36:00:
                    11:30:af:20:25:59:79:3e:73:74:cb:3d:50:56:e9:ef
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ae:56:44:ff:15:65:ee:43:9e:93:63:61:cc:c8:2d:24:
        7b:49:63:23:15:b4:68:31:a1:ed:e6:d9:b4:cf:2a:b7:
        57:4d:21:f4:a2:f9:b1:42:6e:14:f1:4a:53:f4:45:ed:
        13:07:17:fb:97:ed:93:bd:f9:f0:48:53:63:90:65:8b:
        df:28:4d:5c:77:1e:4c:cf:b5:8c:ff:01:d5:62:86:11:
        a3:6b:03:13:d9:4d:45:ca:27:95:8f:8b:94:c8:74:05:
        2a:8c:55:16:00:ae:37:df:f6:3b:e1:59:b1:65:ce:5a:
        81:25:0a:f9:bc:e6:cd:cf:09:56:a5:42:be:58:2c:02
    Fingerprint (MD5):
        9F:BE:D5:5D:7E:C0:46:86:71:9B:78:52:A6:5A:C9:7E
    Fingerprint (SHA1):
        36:24:F3:B4:70:7E:A8:A0:31:B5:EE:8E:EB:42:A3:97:54:33:45:49


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #3258: Bridge: Verifying certificate(s)  UserBridge.der BridgeArmy.der Army.der with flags  -d NavyOnlyDB     -t Army.der - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags  -d NavyOnlyDB     -t Army.der
vfychain -d NavyOnlyDB -pp -vv      UserBridge.der BridgeArmy.der  -t Army.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128110459 (0x433d997b)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Wed Nov 28 16:04:58 2012
            Not After : Tue Nov 28 16:04:58 2062
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c8:e5:8a:98:5f:fe:4a:8f:90:14:d9:6a:41:db:75:ec:
                    73:ef:4f:dc:89:67:c3:3e:01:3a:52:15:7e:01:7c:54:
                    34:cd:f6:3a:75:0d:e5:c9:f3:3f:9f:cc:58:7c:77:1d:
                    64:c9:88:a0:e6:d8:6c:19:44:2a:b7:f1:16:4b:81:2b:
                    11:74:fc:9d:94:e8:2d:19:e4:65:c9:53:34:d6:0d:57:
                    e0:1a:d3:d3:65:af:6d:23:2b:70:1e:04:da:f4:6c:01:
                    3c:5d:8c:cb:1b:ed:19:5a:3a:50:74:b0:a7:f6:36:00:
                    11:30:af:20:25:59:79:3e:73:74:cb:3d:50:56:e9:ef
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ae:56:44:ff:15:65:ee:43:9e:93:63:61:cc:c8:2d:24:
        7b:49:63:23:15:b4:68:31:a1:ed:e6:d9:b4:cf:2a:b7:
        57:4d:21:f4:a2:f9:b1:42:6e:14:f1:4a:53:f4:45:ed:
        13:07:17:fb:97:ed:93:bd:f9:f0:48:53:63:90:65:8b:
        df:28:4d:5c:77:1e:4c:cf:b5:8c:ff:01:d5:62:86:11:
        a3:6b:03:13:d9:4d:45:ca:27:95:8f:8b:94:c8:74:05:
        2a:8c:55:16:00:ae:37:df:f6:3b:e1:59:b1:65:ce:5a:
        81:25:0a:f9:bc:e6:cd:cf:09:56:a5:42:be:58:2c:02
    Fingerprint (MD5):
        9F:BE:D5:5D:7E:C0:46:86:71:9B:78:52:A6:5A:C9:7E
    Fingerprint (SHA1):
        36:24:F3:B4:70:7E:A8:A0:31:B5:EE:8E:EB:42:A3:97:54:33:45:49


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #3259: Bridge: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags  -d NavyOnlyDB     -t Army.der - PASSED
chains.sh: Creating DB Root1DB
certutil -N -d Root1DB -f Root1DB/dbpasswd
chains.sh: #3260: MegaBridge_3_2: Creating DB Root1DB  - PASSED
chains.sh: Creating Root CA Root1
certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1  -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1128110464 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3261: MegaBridge_3_2: Creating Root CA Root1  - PASSED
chains.sh: Exporting Root CA Root1.der
certutil -L -d Root1DB -r -n Root1 -o Root1.der
chains.sh: #3262: MegaBridge_3_2: Exporting Root CA Root1.der  - PASSED
chains.sh: Creating DB Root2DB
certutil -N -d Root2DB -f Root2DB/dbpasswd
chains.sh: #3263: MegaBridge_3_2: Creating DB Root2DB  - PASSED
chains.sh: Creating Root CA Root2
certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2  -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1128110465 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3264: MegaBridge_3_2: Creating Root CA Root2  - PASSED
chains.sh: Exporting Root CA Root2.der
certutil -L -d Root2DB -r -n Root2 -o Root2.der
chains.sh: #3265: MegaBridge_3_2: Exporting Root CA Root2.der  - PASSED
chains.sh: Creating DB Root3DB
certutil -N -d Root3DB -f Root3DB/dbpasswd
chains.sh: #3266: MegaBridge_3_2: Creating DB Root3DB  - PASSED
chains.sh: Creating Root CA Root3
certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3  -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1128110466 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3267: MegaBridge_3_2: Creating Root CA Root3  - PASSED
chains.sh: Exporting Root CA Root3.der
certutil -L -d Root3DB -r -n Root3 -o Root3.der
chains.sh: #3268: MegaBridge_3_2: Exporting Root CA Root3.der  - PASSED
chains.sh: Creating DB Root4DB
certutil -N -d Root4DB -f Root4DB/dbpasswd
chains.sh: #3269: MegaBridge_3_2: Creating DB Root4DB  - PASSED
chains.sh: Creating Root CA Root4
certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4  -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1128110467 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3270: MegaBridge_3_2: Creating Root CA Root4  - PASSED
chains.sh: Exporting Root CA Root4.der
certutil -L -d Root4DB -r -n Root4 -o Root4.der
chains.sh: #3271: MegaBridge_3_2: Exporting Root CA Root4.der  - PASSED
chains.sh: Creating DB Root5DB
certutil -N -d Root5DB -f Root5DB/dbpasswd
chains.sh: #3272: MegaBridge_3_2: Creating DB Root5DB  - PASSED
chains.sh: Creating Root CA Root5
certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5  -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1128110468 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3273: MegaBridge_3_2: Creating Root CA Root5  - PASSED
chains.sh: Exporting Root CA Root5.der
certutil -L -d Root5DB -r -n Root5 -o Root5.der
chains.sh: #3274: MegaBridge_3_2: Exporting Root CA Root5.der  - PASSED
chains.sh: Creating DB Root6DB
certutil -N -d Root6DB -f Root6DB/dbpasswd
chains.sh: #3275: MegaBridge_3_2: Creating DB Root6DB  - PASSED
chains.sh: Creating Root CA Root6
certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6  -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1128110469 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3276: MegaBridge_3_2: Creating Root CA Root6  - PASSED
chains.sh: Exporting Root CA Root6.der
certutil -L -d Root6DB -r -n Root6 -o Root6.der
chains.sh: #3277: MegaBridge_3_2: Exporting Root CA Root6.der  - PASSED
chains.sh: Creating DB Root7DB
certutil -N -d Root7DB -f Root7DB/dbpasswd
chains.sh: #3278: MegaBridge_3_2: Creating DB Root7DB  - PASSED
chains.sh: Creating Root CA Root7
certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7  -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1128110470 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3279: MegaBridge_3_2: Creating Root CA Root7  - PASSED
chains.sh: Exporting Root CA Root7.der
certutil -L -d Root7DB -r -n Root7 -o Root7.der
chains.sh: #3280: MegaBridge_3_2: Exporting Root CA Root7.der  - PASSED
chains.sh: Creating DB Root8DB
certutil -N -d Root8DB -f Root8DB/dbpasswd
chains.sh: #3281: MegaBridge_3_2: Creating DB Root8DB  - PASSED
chains.sh: Creating Root CA Root8
certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8  -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1128110471 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3282: MegaBridge_3_2: Creating Root CA Root8  - PASSED
chains.sh: Exporting Root CA Root8.der
certutil -L -d Root8DB -r -n Root8 -o Root8.der
chains.sh: #3283: MegaBridge_3_2: Exporting Root CA Root8.der  - PASSED
chains.sh: Creating DB Root9DB
certutil -N -d Root9DB -f Root9DB/dbpasswd
chains.sh: #3284: MegaBridge_3_2: Creating DB Root9DB  - PASSED
chains.sh: Creating Root CA Root9
certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9  -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1128110472 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3285: MegaBridge_3_2: Creating Root CA Root9  - PASSED
chains.sh: Exporting Root CA Root9.der
certutil -L -d Root9DB -r -n Root9 -o Root9.der
chains.sh: #3286: MegaBridge_3_2: Exporting Root CA Root9.der  - PASSED
chains.sh: Creating DB Bridge11DB
certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd
chains.sh: #3287: MegaBridge_3_2: Creating DB Bridge11DB  - PASSED
chains.sh: Creating Bridge certifiate request Bridge11Req.der
certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US"  -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o Bridge11Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3288: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der  - PASSED
chains.sh: Creating certficate Bridge11Root1.der signed by Root1
certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 1128110473 -7 Bridge11@Root1  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3289: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1  - PASSED
chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database
certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der
chains.sh: #3290: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database  - PASSED
chains.sh: Creating certficate Bridge11Root2.der signed by Root2
certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 1128110474 -7 Bridge11@Root2  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3291: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2  - PASSED
chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database
certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der
chains.sh: #3292: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database  - PASSED
chains.sh: Creating certficate Bridge11Root3.der signed by Root3
certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 1128110475 -7 Bridge11@Root3  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3293: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3  - PASSED
chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database
certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der
chains.sh: #3294: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database  - PASSED
chains.sh: Generating PKCS7 package from Bridge11DB database
cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7
chains.sh: #3295: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database  - PASSED
chains.sh: Creating DB Bridge12DB
certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd
chains.sh: #3296: MegaBridge_3_2: Creating DB Bridge12DB  - PASSED
chains.sh: Creating Bridge certifiate request Bridge12Req.der
certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US"  -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o Bridge12Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3297: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der  - PASSED
chains.sh: Creating certficate Bridge12Root4.der signed by Root4
certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 1128110476 -7 Bridge12@Root4  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3298: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4  - PASSED
chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database
certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der
chains.sh: #3299: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database  - PASSED
chains.sh: Creating certficate Bridge12Root5.der signed by Root5
certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 1128110477 -7 Bridge12@Root5  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3300: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5  - PASSED
chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database
certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der
chains.sh: #3301: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database  - PASSED
chains.sh: Creating certficate Bridge12Root6.der signed by Root6
certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 1128110478 -7 Bridge12@Root6  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3302: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6  - PASSED
chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database
certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der
chains.sh: #3303: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database  - PASSED
chains.sh: Generating PKCS7 package from Bridge12DB database
cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7
chains.sh: #3304: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database  - PASSED
chains.sh: Creating DB Bridge13DB
certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd
chains.sh: #3305: MegaBridge_3_2: Creating DB Bridge13DB  - PASSED
chains.sh: Creating Bridge certifiate request Bridge13Req.der
certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US"  -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o Bridge13Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3306: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der  - PASSED
chains.sh: Creating certficate Bridge13Root7.der signed by Root7
certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 1128110479 -7 Bridge13@Root7  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3307: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7  - PASSED
chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database
certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der
chains.sh: #3308: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database  - PASSED
chains.sh: Creating certficate Bridge13Root8.der signed by Root8
certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 1128110480 -7 Bridge13@Root8  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3309: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8  - PASSED
chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database
certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der
chains.sh: #3310: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database  - PASSED
chains.sh: Creating certficate Bridge13Root9.der signed by Root9
certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 1128110481 -7 Bridge13@Root9  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3311: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9  - PASSED
chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database
certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der
chains.sh: #3312: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database  - PASSED
chains.sh: Generating PKCS7 package from Bridge13DB database
cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7
chains.sh: #3313: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database  - PASSED
chains.sh: Creating DB Bridge21DB
certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd
chains.sh: #3314: MegaBridge_3_2: Creating DB Bridge21DB  - PASSED
chains.sh: Creating Bridge certifiate request Bridge21Req.der
certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US"  -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o Bridge21Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3315: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der  - PASSED
chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11
certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 1128110482 -7 Bridge21@Bridge11  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3316: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11  - PASSED
chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database
certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der
chains.sh: #3317: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database  - PASSED
chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12
certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 1128110483 -7 Bridge21@Bridge12  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3318: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12  - PASSED
chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database
certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der
chains.sh: #3319: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database  - PASSED
chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13
certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 1128110484 -7 Bridge21@Bridge13  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3320: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13  - PASSED
chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database
certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der
chains.sh: #3321: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database  - PASSED
chains.sh: Generating PKCS7 package from Bridge21DB database
cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7
chains.sh: #3322: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #3323: MegaBridge_3_2: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3324: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21
certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 1128110485   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3325: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21  - PASSED
chains.sh: Importing certificate CA1Bridge21.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der
chains.sh: #3326: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #3327: MegaBridge_3_2: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3328: MegaBridge_3_2: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1128110486   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3329: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE1CA1.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der
chains.sh: #3330: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database  - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags  -d EE1DB     -t Root1.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der  -t Root1.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128110464 (0x433d9980)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root1 ROOT CA,O=Root1,C=US"
        Validity:
            Not Before: Wed Nov 28 16:05:01 2012
            Not After : Tue Nov 28 16:05:01 2062
        Subject: "CN=Root1 ROOT CA,O=Root1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c9:a5:dc:39:ec:87:af:60:81:76:1a:63:ef:c0:12:23:
                    e4:55:00:64:ab:28:51:d0:d8:6d:c7:04:fd:39:53:3a:
                    fe:eb:81:55:85:a0:7d:5d:40:1c:1b:62:ac:df:56:9c:
                    3a:64:e4:ea:fe:67:28:81:02:2c:30:5d:17:93:c6:31:
                    63:01:f9:67:26:71:8d:25:47:88:c4:8a:f1:7f:c4:7d:
                    3a:67:05:2e:a2:66:6e:9f:b2:93:21:68:ec:0c:21:6a:
                    65:dd:f2:6c:aa:03:1f:e4:22:a8:81:7c:3b:ed:ab:e1:
                    1b:95:4e:d8:33:76:76:e8:bb:5b:9f:53:b6:a0:f0:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1b:94:85:04:94:b7:5d:ee:27:7d:24:63:58:e2:63:9a:
        cf:fb:ea:42:e0:d9:25:e9:5f:d8:ce:8e:fd:c5:ec:6c:
        e3:76:7c:46:6d:2c:d1:aa:51:4a:04:a7:60:e9:bc:67:
        08:a0:d2:f7:bc:06:08:c4:b1:a3:9e:35:18:f4:db:f5:
        9a:3a:2b:99:28:3c:77:4d:be:1a:20:c1:c1:77:a2:e9:
        f8:c7:b5:72:62:7b:98:1e:22:a7:47:ca:49:8f:26:17:
        a0:cf:61:f9:5e:4f:88:70:e8:50:c9:9c:2a:50:f0:35:
        e9:30:03:0f:a8:f2:19:93:a0:e3:a0:3f:7f:d8:56:74
    Fingerprint (MD5):
        A8:2E:68:72:42:3E:F9:0B:C3:F8:4D:E2:85:BD:14:51
    Fingerprint (SHA1):
        8B:47:7B:D8:AA:0C:80:C8:31:3C:7F:27:E3:9F:36:0F:C0:F0:C4:7E


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US"
Returned value is 0, expected result is pass
chains.sh: #3331: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags  -d EE1DB     -t Root1.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags  -d EE1DB     -t Root2.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der  -t Root2.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128110465 (0x433d9981)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root2 ROOT CA,O=Root2,C=US"
        Validity:
            Not Before: Wed Nov 28 16:05:01 2012
            Not After : Tue Nov 28 16:05:01 2062
        Subject: "CN=Root2 ROOT CA,O=Root2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    f6:b7:72:0b:30:6c:51:ef:60:28:96:9f:9a:8f:2b:e1:
                    47:2a:bd:f6:76:32:3e:45:30:21:8e:53:ae:18:d6:f0:
                    83:c3:6c:1b:c2:dc:83:f6:24:9f:3c:4f:f7:b4:36:3d:
                    67:30:6d:47:43:1d:6d:81:ff:8e:fd:a6:91:b5:d3:ae:
                    16:da:28:12:30:26:73:b0:86:a4:fb:a9:72:5c:3b:e0:
                    e0:db:ac:a9:6f:b3:d8:c7:d7:c3:cb:9e:82:d3:01:1a:
                    18:9f:e5:72:ad:52:db:6a:e1:0d:1d:b9:ba:1b:70:df:
                    f7:c2:dd:3a:0e:00:f5:93:8a:14:8b:85:cc:17:94:e3
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        49:1e:ad:8d:8b:f5:3a:c0:83:1f:6f:4e:40:6d:c0:a3:
        42:0d:d5:90:cd:8a:36:13:9c:45:8e:59:67:5c:10:17:
        66:e9:53:0b:c6:c0:c0:32:68:a6:be:51:5e:b8:21:3b:
        eb:3e:41:49:4f:46:0d:2a:b1:ee:43:f7:5a:a5:ed:f9:
        a1:b1:69:d9:87:91:00:d6:d6:f0:b4:be:2f:9d:6f:85:
        bd:76:22:e7:cb:b7:fb:a2:6d:cd:32:2f:ee:09:c4:d6:
        be:25:51:2a:c4:63:dc:80:45:c7:d4:23:d5:cf:c6:f6:
        db:8e:bd:6e:be:6e:e8:4c:a3:f9:61:4f:36:d2:c6:79
    Fingerprint (MD5):
        39:74:F3:CF:E1:4F:33:93:E9:F3:7B:C6:9C:A8:61:0C
    Fingerprint (SHA1):
        2D:5A:60:A9:4D:5A:D6:18:D8:90:A1:FB:8B:61:DA:5E:3C:28:96:94


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US"
Returned value is 0, expected result is pass
chains.sh: #3332: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags  -d EE1DB     -t Root2.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags  -d EE1DB     -t Root3.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der  -t Root3.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128110466 (0x433d9982)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root3 ROOT CA,O=Root3,C=US"
        Validity:
            Not Before: Wed Nov 28 16:05:01 2012
            Not After : Tue Nov 28 16:05:01 2062
        Subject: "CN=Root3 ROOT CA,O=Root3,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:bb:c1:6b:30:65:3d:9c:4b:1f:c2:99:36:f3:60:40:
                    da:76:a2:d5:f9:ee:0d:fe:77:43:50:f9:07:46:a1:64:
                    5b:49:af:f0:46:4f:cf:9e:3c:b5:ce:04:e1:28:dc:d2:
                    f5:7c:5d:7f:e4:a1:77:f0:7b:e4:48:67:5a:2e:23:8c:
                    21:2d:7e:61:37:a6:81:fc:58:4a:d3:44:17:93:b5:3a:
                    54:8f:b3:4f:c0:9c:44:f9:b4:80:cb:05:45:4e:37:be:
                    83:5f:70:f6:3d:49:93:73:c3:cb:81:96:7e:5f:11:31:
                    21:58:03:02:ef:01:c0:06:16:a6:47:30:3c:14:b3:61
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7f:a2:bb:31:24:a2:46:a1:3b:08:ff:79:24:9d:9d:2f:
        90:aa:87:43:4a:c5:17:73:6b:a2:85:ce:60:b0:ae:65:
        28:da:cc:9a:40:86:ac:9f:67:f4:3d:de:a6:ee:9d:e9:
        04:3e:98:d4:65:49:d8:68:8e:9d:0e:02:8a:bb:c9:71:
        c6:89:9f:7b:34:b9:16:5b:ba:1b:60:4b:ad:ed:24:bf:
        47:20:ea:6b:16:52:c6:df:56:c9:1a:db:33:ef:1d:a1:
        e7:35:25:b7:c6:39:33:8f:06:c5:84:35:2c:27:51:c3:
        a2:ed:5c:09:4f:8c:ce:69:a8:1f:eb:62:5d:9f:29:7d
    Fingerprint (MD5):
        51:1B:61:6F:FC:48:34:E0:5C:CE:B8:AB:81:D1:33:87
    Fingerprint (SHA1):
        02:CB:2A:3A:1D:78:90:1F:42:97:E3:88:00:42:99:F3:84:9E:2B:4B


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US"
Returned value is 0, expected result is pass
chains.sh: #3333: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags  -d EE1DB     -t Root3.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags  -d EE1DB     -t Root4.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der  -t Root4.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128110467 (0x433d9983)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root4 ROOT CA,O=Root4,C=US"
        Validity:
            Not Before: Wed Nov 28 16:05:01 2012
            Not After : Tue Nov 28 16:05:01 2062
        Subject: "CN=Root4 ROOT CA,O=Root4,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a8:de:4b:d1:72:54:4e:de:50:09:5b:4c:b2:33:37:eb:
                    8f:07:07:54:35:24:05:8c:d7:87:34:2f:3d:ba:9b:24:
                    e1:56:31:ac:55:29:05:f8:8d:a3:4a:8b:fe:d9:a0:fd:
                    ac:54:27:f9:ec:07:30:09:8a:36:6d:e5:8e:58:ab:36:
                    62:d7:87:01:2f:b7:fc:8f:1c:e0:be:dc:54:8d:cb:85:
                    42:39:ad:55:4e:15:ff:c1:5d:35:67:9f:6c:2a:70:d6:
                    aa:6e:01:56:cc:31:87:c1:1f:5d:1c:a3:75:98:f8:b3:
                    6d:bd:37:f5:c3:87:58:c9:86:50:66:17:b9:d6:c2:8d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9c:64:72:0e:93:a0:b2:e5:12:0a:8c:f3:69:ff:b5:d7:
        23:32:04:26:fb:fd:c1:66:ec:c3:90:60:5d:6e:df:5c:
        0b:f3:9b:73:c0:a5:14:d6:f7:a1:af:c6:b2:c1:6e:83:
        05:f2:86:c8:22:01:4f:af:6a:74:26:b1:70:9d:2f:f9:
        ed:9a:d1:c6:e6:0f:02:e7:13:6d:9b:ca:ba:59:69:69:
        92:52:d2:e0:5d:35:bb:ad:89:e2:e7:bb:f4:9d:b7:50:
        9a:c3:02:35:77:a9:a9:3f:e4:90:8d:3a:66:70:39:83:
        1b:1d:85:75:9a:01:e6:97:6c:f8:36:2a:69:c4:f0:66
    Fingerprint (MD5):
        05:43:60:33:EE:DF:A0:2D:1C:37:82:9C:E6:EF:29:16
    Fingerprint (SHA1):
        BF:86:18:6B:06:2D:9B:B3:D5:D8:3C:A1:C4:C7:67:73:CB:F9:E4:E6


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US"
Returned value is 0, expected result is pass
chains.sh: #3334: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags  -d EE1DB     -t Root4.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags  -d EE1DB     -t Root5.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der  -t Root5.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128110468 (0x433d9984)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root5 ROOT CA,O=Root5,C=US"
        Validity:
            Not Before: Wed Nov 28 16:05:02 2012
            Not After : Tue Nov 28 16:05:02 2062
        Subject: "CN=Root5 ROOT CA,O=Root5,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cb:05:8e:45:ba:98:be:9f:20:a7:1a:2c:0b:2e:98:48:
                    a9:7a:11:c4:84:d6:d0:77:7b:3e:a4:9e:17:18:1f:93:
                    9e:87:a0:46:d0:31:e2:a5:62:14:09:4f:dc:c1:50:f6:
                    9d:27:de:eb:1a:a1:b6:91:a9:78:97:ae:08:a0:1e:d7:
                    08:e1:0a:15:03:fb:b1:8d:6d:cb:db:7c:19:43:44:82:
                    d1:45:31:12:6b:94:8b:45:c7:72:7d:6c:a4:22:73:c3:
                    bb:30:4c:43:2c:9f:d0:86:39:0e:09:e2:2e:97:da:66:
                    65:dc:a1:b3:97:12:97:67:c1:66:f3:8d:20:2d:28:07
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        07:9c:18:a0:9d:a8:5f:3f:27:40:6e:3c:24:cd:b1:9a:
        23:a8:7f:e2:a8:0a:11:f0:8a:d7:f3:64:0c:9b:58:37:
        b8:55:d5:0a:75:b7:1e:f2:b8:b0:ac:ef:cc:a1:28:34:
        65:86:01:b8:85:b1:a0:3f:aa:d2:cf:75:79:ad:2b:e7:
        15:25:66:14:e8:c0:6a:e8:41:23:ae:34:78:72:d0:b6:
        d5:fb:7c:07:b2:e0:e3:ed:ae:c4:08:c7:fa:b2:7e:86:
        5a:4b:01:ca:f1:73:7c:8b:47:35:4d:f9:b6:b0:11:b5:
        33:b7:84:ff:eb:5d:6f:fc:af:4f:d8:53:60:08:f2:95
    Fingerprint (MD5):
        D7:4D:51:1C:38:C5:C1:5F:03:BC:8C:BC:19:66:5B:72
    Fingerprint (SHA1):
        5B:C3:C5:60:B7:01:AB:2C:8F:EC:C3:EF:8F:EC:88:3F:EF:E5:2B:88


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US"
Returned value is 0, expected result is pass
chains.sh: #3335: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags  -d EE1DB     -t Root5.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags  -d EE1DB     -t Root6.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der  -t Root6.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128110469 (0x433d9985)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root6 ROOT CA,O=Root6,C=US"
        Validity:
            Not Before: Wed Nov 28 16:05:02 2012
            Not After : Tue Nov 28 16:05:02 2062
        Subject: "CN=Root6 ROOT CA,O=Root6,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ad:ab:a6:fc:16:b6:e8:ae:3f:b7:04:43:21:97:db:14:
                    57:37:63:77:59:27:85:08:7b:23:27:19:07:74:b9:65:
                    ab:01:b6:51:ff:59:8c:ee:1d:bb:c5:a9:91:33:ac:62:
                    b1:29:61:4e:69:be:c3:ab:13:97:ee:e6:55:bc:fc:b4:
                    8c:bf:dd:7c:b4:93:74:76:b8:04:78:ef:89:0d:1c:f2:
                    0e:a4:ff:a2:6f:33:b9:2c:8b:a9:70:9a:b6:fa:36:0e:
                    91:ed:4a:a5:ad:be:62:8b:25:13:b0:0e:9b:ce:2a:0e:
                    3d:84:89:70:6b:09:0a:74:a3:7e:79:8e:7f:c2:9a:d5
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        62:37:5f:f5:1c:a1:e6:b6:02:52:1e:34:f7:93:ec:97:
        6b:16:8a:1f:f8:ee:15:a7:5d:25:c1:f4:fc:ff:15:c0:
        d1:6e:74:90:b6:01:31:e2:f4:4d:e6:87:3b:1a:fa:f9:
        4d:d1:cb:66:0c:ff:e2:8d:94:f6:81:6d:6b:7e:47:81:
        9d:7d:fb:43:04:f5:d4:a1:19:bf:65:8e:09:fa:58:a5:
        c1:d7:a0:16:96:ef:6f:f6:b7:32:42:ea:21:68:cc:9f:
        2b:7e:ed:89:d2:78:39:3c:a4:0d:3d:62:b6:3d:16:28:
        f0:a3:a5:b0:9b:a9:59:12:36:ff:3c:a2:49:50:19:1c
    Fingerprint (MD5):
        13:94:A2:A3:04:54:83:F8:A6:EE:CF:0D:10:2C:1B:38
    Fingerprint (SHA1):
        27:2D:DF:BE:16:95:E2:2B:0D:3D:81:7D:2D:78:D4:3F:0C:B3:F7:CE


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US"
Returned value is 0, expected result is pass
chains.sh: #3336: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags  -d EE1DB     -t Root6.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags  -d EE1DB     -t Root7.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der  -t Root7.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128110470 (0x433d9986)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root7 ROOT CA,O=Root7,C=US"
        Validity:
            Not Before: Wed Nov 28 16:05:02 2012
            Not After : Tue Nov 28 16:05:02 2062
        Subject: "CN=Root7 ROOT CA,O=Root7,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e0:6a:15:a5:2c:04:5f:07:b2:a4:af:93:f0:76:ba:18:
                    29:9f:24:a3:e9:05:99:6d:90:58:fd:d7:db:59:1d:de:
                    ab:8f:fd:72:6b:80:7e:a4:d5:c8:7e:23:8a:9c:13:b2:
                    a0:36:00:63:bb:62:a2:62:52:97:ae:60:b7:3a:3b:37:
                    95:da:05:28:3e:21:be:0e:08:8a:41:cb:b1:31:2e:d9:
                    55:5e:77:85:22:25:31:d1:af:b9:4a:49:f1:1b:fd:88:
                    c3:4e:24:0f:5b:84:67:c3:ec:a2:3e:a3:3e:7a:6e:56:
                    bc:58:70:ba:f0:2e:97:28:d8:65:fd:ee:3d:72:29:23
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9b:54:e3:ee:59:46:d9:55:fe:86:10:3b:25:d6:87:e0:
        7b:43:b3:78:92:69:09:7e:9a:27:73:ac:32:a2:65:7a:
        b5:23:8a:95:4a:d2:a3:c2:6d:40:27:ea:a0:73:7b:25:
        ab:08:60:b1:f8:9b:44:d1:d8:ad:44:05:a5:fc:fb:30:
        5f:40:a0:f3:ac:42:7f:6f:a0:8f:ed:e1:d1:f3:8c:01:
        f2:33:b7:c2:a2:3d:10:13:d0:f1:47:53:84:14:a3:88:
        4f:c8:b8:e1:03:2c:7e:64:bf:ab:bc:a7:1c:5c:06:bc:
        fe:25:5a:b2:7d:f1:e9:d6:2c:ef:70:25:f3:71:b0:05
    Fingerprint (MD5):
        9B:A9:C1:B0:25:07:6D:ED:7B:7D:3F:D2:A6:BD:FD:4B
    Fingerprint (SHA1):
        71:89:24:65:D8:15:97:77:D5:51:D6:2C:C8:B0:80:E5:22:D8:5A:AF


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US"
Returned value is 0, expected result is pass
chains.sh: #3337: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags  -d EE1DB     -t Root7.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags  -d EE1DB     -t Root8.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der  -t Root8.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128110471 (0x433d9987)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root8 ROOT CA,O=Root8,C=US"
        Validity:
            Not Before: Wed Nov 28 16:05:02 2012
            Not After : Tue Nov 28 16:05:02 2062
        Subject: "CN=Root8 ROOT CA,O=Root8,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b9:ea:39:41:03:40:75:40:23:23:76:14:22:ce:a6:65:
                    bf:5d:36:94:34:82:80:81:73:e1:45:c8:8f:c7:d6:cf:
                    54:01:4f:20:6f:9d:dd:a9:6f:3d:6d:c4:c9:41:2e:57:
                    38:e0:10:28:2b:31:4a:5f:ae:2f:7d:7b:bd:7d:1f:42:
                    1f:ae:f6:03:e6:fa:64:91:ce:71:90:13:0a:be:14:7b:
                    db:18:d4:d8:58:bf:3e:ba:30:bc:8d:b1:a1:51:12:39:
                    81:29:1a:d3:26:40:c7:3d:f5:e7:16:98:56:ce:22:b3:
                    13:66:c3:d8:1b:2d:3a:4c:cc:77:9f:99:7b:49:7a:83
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        57:e7:3e:92:1d:b2:08:4a:a3:4b:2c:8b:c0:34:46:ab:
        93:63:34:5e:ec:16:b5:7e:30:fb:32:07:21:23:ea:a7:
        97:49:52:aa:15:db:0e:79:de:de:5e:c1:ec:e4:5f:97:
        fe:a6:ca:e5:1c:34:d2:fb:22:6a:42:be:c0:38:1f:4f:
        ad:ca:1f:ec:68:c7:fb:d4:7b:5f:0c:76:d8:de:79:e7:
        15:ae:a6:a6:24:b6:d9:fa:2d:7e:70:73:09:dd:5e:7f:
        0a:b2:f5:15:4a:d3:bb:b8:0e:f6:da:f4:37:5c:27:1f:
        45:d3:a1:f7:a0:a6:b2:65:36:02:61:fc:98:b0:c3:54
    Fingerprint (MD5):
        B7:FA:EA:95:4B:98:BB:A5:E6:81:72:C6:7F:25:C3:5D
    Fingerprint (SHA1):
        7B:58:0B:20:24:AD:56:DB:94:0C:35:6A:2F:5A:19:52:A9:FC:09:07


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US"
Returned value is 0, expected result is pass
chains.sh: #3338: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags  -d EE1DB     -t Root8.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags  -d EE1DB     -t Root9.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der  -t Root9.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128110472 (0x433d9988)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root9 ROOT CA,O=Root9,C=US"
        Validity:
            Not Before: Wed Nov 28 16:05:03 2012
            Not After : Tue Nov 28 16:05:03 2062
        Subject: "CN=Root9 ROOT CA,O=Root9,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d1:f5:ff:c0:e3:b1:ac:24:dc:12:06:fa:08:5c:95:18:
                    e3:e9:ec:2c:d8:41:88:dc:ea:57:05:4c:aa:2a:73:ec:
                    94:38:f1:24:51:f9:be:64:17:c0:26:24:3d:e1:fb:a2:
                    1c:39:78:87:2e:90:d7:52:c6:a2:29:22:45:ae:28:68:
                    0d:e3:20:37:22:6c:98:bf:5d:e5:77:3e:a2:85:b3:a4:
                    b7:82:fa:0c:8b:3b:f2:2a:10:10:b2:19:ae:b3:8d:79:
                    83:67:d0:82:09:32:33:21:56:dd:0f:6f:27:cb:3b:95:
                    4c:c7:64:50:a9:9c:8f:30:19:3d:30:2a:e6:36:f9:cb
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        08:40:a7:c2:e9:76:7e:f5:6a:27:38:0a:71:eb:5c:3e:
        db:64:43:fb:93:2e:f7:f5:6d:29:ab:4c:99:5b:d5:16:
        64:a5:7f:40:64:d5:e9:67:a6:59:be:d8:45:77:00:90:
        77:7d:00:b6:44:ed:b4:14:c9:d7:be:f4:47:d0:8e:82:
        e1:4b:12:e2:8b:69:4f:02:34:01:f3:c4:12:0d:dd:13:
        63:25:ef:91:3f:c1:42:c0:d3:57:9e:8b:d9:2a:28:e7:
        c8:71:28:ff:c9:db:07:6c:5c:09:5d:13:0a:5e:6e:4d:
        17:0d:e9:23:be:73:69:fc:51:a9:d9:0e:47:80:ac:93
    Fingerprint (MD5):
        FA:CB:FF:F4:B1:80:F0:2E:7C:54:7A:2E:70:7B:46:FC
    Fingerprint (SHA1):
        DE:22:E5:D4:1B:6E:CA:72:A8:3B:B9:01:D3:07:35:75:F2:31:FC:6C


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US"
Returned value is 0, expected result is pass
chains.sh: #3339: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags  -d EE1DB     -t Root9.der - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #3340: Extension: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1128110487 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3341: Extension: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #3342: Extension: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #3343: Extension: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3344: Extension: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1128110488   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3345: Extension: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
chains.sh: #3346: Extension: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #3347: Extension: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3348: Extension: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1128110489   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3349: Extension: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
chains.sh: #3350: Extension: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB UserDB
certutil -N -d UserDB -f UserDB/dbpasswd
chains.sh: #3351: Extension: Creating DB UserDB  - PASSED
chains.sh: Creating EE certifiate request UserReq.der
certutil -s "CN=User EE, O=User, C=US"  -R  -d UserDB -f UserDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o UserReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3352: Extension: Creating EE certifiate request UserReq.der  - PASSED
chains.sh: Creating certficate UserCA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1128110490   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3353: Extension: Creating certficate UserCA2.der signed by CA2  - PASSED
chains.sh: Importing certificate UserCA2.der to UserDB database
certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der
chains.sh: #3354: Extension: Importing certificate UserCA2.der to UserDB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #3355: Extension: Creating DB AllDB  - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der CA2CA1.der CA1Root.der Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128110487 (0x433d9997)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:05:07 2012
            Not After : Tue Nov 28 16:05:07 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d0:79:79:63:bc:cf:f2:af:ee:ee:56:b9:e2:db:60:d5:
                    a1:58:b7:69:16:33:47:98:59:08:6f:b6:78:54:da:3c:
                    a3:29:be:0d:58:bb:bc:2b:e0:c9:23:dc:b3:73:67:c3:
                    46:6e:fe:6b:11:08:47:3c:38:55:7a:12:b1:74:76:c4:
                    ce:b7:52:86:b9:be:79:b4:ec:26:b4:36:72:19:85:bd:
                    27:98:e6:92:a1:30:21:31:ac:59:cd:23:ed:67:d5:28:
                    8c:b4:a9:0c:2c:93:19:3d:4d:3e:d4:c5:38:fa:73:e5:
                    aa:03:3e:b4:e6:50:10:b9:3c:1a:05:86:ab:27:ae:85
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        67:5b:7a:05:f4:74:96:9c:e0:0d:a2:c3:1f:d7:8f:d0:
        8c:44:85:e5:1d:e6:bd:87:bf:2e:11:90:54:c6:b9:34:
        d3:a4:60:b1:9c:39:17:58:e3:94:d5:b5:eb:45:6c:05:
        84:2a:55:fb:08:b3:25:dd:6c:e5:f6:fe:df:26:f2:33:
        a2:ea:e5:1a:c1:cb:7e:8e:2c:fe:53:38:09:65:26:c5:
        8a:7d:d5:73:f9:f7:ee:28:ed:35:78:ec:d6:aa:a2:b1:
        3b:1a:21:2d:c1:27:50:01:5c:e9:44:ec:c2:e6:0e:67:
        b1:9e:a9:a6:59:20:54:d0:44:3e:a3:8a:33:76:4c:91
    Fingerprint (MD5):
        B0:39:B9:BA:2D:26:BD:F4:66:4C:C9:0B:76:E0:23:DD
    Fingerprint (SHA1):
        25:04:30:4B:C6:55:15:DB:B8:CF:36:33:0A:40:37:55:1B:EC:0D:E6


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3356: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der Root.der with flags  -d AllDB    -o OID.2.0  -t Root.der
vfychain -d AllDB -pp -vv     -o OID.2.0  UserCA2.der CA2CA1.der CA1Root.der Root.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3357: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der Root.der with flags  -d AllDB    -o OID.2.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der with flags  -d AllDB    -o OID.1.0  -t CA1Root.der
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der CA2CA1.der CA1Root.der  -t CA1Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128110488 (0x433d9998)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:05:07 2012
            Not After : Tue Nov 28 16:05:07 2017
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cb:40:eb:5b:6b:0a:3f:0c:b1:09:47:80:89:c5:28:f9:
                    e1:59:5b:90:3f:89:c2:2b:93:3a:14:e8:69:af:8b:00:
                    6e:db:f7:27:3d:78:b0:0a:6b:ba:2e:59:4b:5b:0a:55:
                    a9:2c:3a:03:93:77:d3:4b:f3:3f:49:94:13:a2:da:15:
                    06:80:b7:bc:03:0f:ce:4b:62:c1:56:f3:e9:dc:34:fe:
                    69:54:e3:e7:16:9a:ab:1a:15:b0:5f:0a:16:ff:d8:3b:
                    ae:4b:0d:df:ef:2b:cf:97:ee:9f:84:c5:fd:18:f9:5d:
                    34:0f:be:d7:48:5d:76:c7:a2:a2:b3:de:a0:26:fa:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        b4:d6:46:69:7c:a8:55:62:be:64:05:1a:22:7f:38:10:
        22:3e:31:b6:c3:82:38:7b:56:26:e1:68:84:77:4e:8d:
        f4:51:eb:ac:1b:5e:08:d3:60:40:2a:fd:a8:cc:59:73:
        83:5f:b3:4c:1e:ce:19:7b:06:69:f6:0b:66:cf:82:93:
        f4:0c:2d:05:4d:39:c1:37:90:2e:cb:86:30:57:87:22:
        d1:a7:d7:f3:77:c3:75:57:29:f0:d7:87:19:21:1e:61:
        e3:c1:04:92:92:79:01:21:b1:dc:13:4b:11:be:c8:b6:
        b5:da:5c:58:1f:09:c6:17:df:0e:9d:68:f2:d8:7a:af
    Fingerprint (MD5):
        56:1F:71:AF:46:6B:4C:15:D4:B4:D7:D1:13:CE:1A:95
    Fingerprint (SHA1):
        96:67:00:5A:4F:79:A0:3F:55:65:0F:4B:69:74:2A:AD:3B:35:75:21


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #3358: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der with flags  -d AllDB    -o OID.1.0  -t CA1Root.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der with flags  -d AllDB    -o OID.2.0  -t CA1Root.der
vfychain -d AllDB -pp -vv     -o OID.2.0  UserCA2.der CA2CA1.der CA1Root.der  -t CA1Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3359: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der with flags  -d AllDB    -o OID.2.0  -t CA1Root.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags  -d AllDB    -o OID.1.0  -t CA2CA1.der
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der CA2CA1.der  -t CA2CA1.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128110489 (0x433d9999)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Wed Nov 28 16:05:08 2012
            Not After : Tue Nov 28 16:05:08 2017
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b1:d7:e9:92:8b:b7:10:a3:07:76:24:39:47:63:39:c4:
                    1a:90:92:87:41:90:43:f8:21:70:6b:c3:dd:2d:6c:3e:
                    9b:a7:4d:54:d7:d8:29:64:46:09:e0:73:e7:8b:d3:42:
                    b6:d6:13:bd:08:b2:85:2f:e1:f0:cd:41:9c:6d:d3:f8:
                    91:74:c1:64:9f:5a:25:68:89:17:c9:ec:b8:35:cd:9a:
                    8c:fd:63:fc:49:e3:f0:a7:c0:ed:f4:25:45:15:61:d4:
                    47:2f:66:1b:1e:9a:3d:e9:f3:d7:51:05:6e:a5:87:2c:
                    16:9e:34:8c:07:fb:0a:cb:a1:98:bf:57:c5:9c:f4:85
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        46:3d:3e:6c:3b:d8:c0:50:b1:a1:97:14:67:af:9c:24:
        1b:4e:3d:02:b1:2b:90:69:71:75:6a:8e:94:93:37:a9:
        9a:f4:8d:77:cf:39:06:8b:be:b6:f7:7d:a8:a4:05:11:
        37:98:03:a9:d9:e2:f0:84:8e:28:60:8e:13:96:c8:c6:
        4c:69:2a:57:9d:06:1c:fd:06:f7:08:71:4e:ee:45:3e:
        c3:ab:3c:1d:f4:94:a7:d6:b3:88:bb:97:09:d4:68:26:
        79:42:88:32:e6:a8:fa:50:78:aa:16:9d:28:d4:66:e4:
        e8:79:8d:9a:b4:c0:d0:e2:54:30:ec:91:99:ef:f7:fa
    Fingerprint (MD5):
        84:32:A9:35:E1:05:31:E0:CE:88:0F:1C:AF:03:75:02
    Fingerprint (SHA1):
        E2:89:94:B3:A5:BD:2F:8A:A4:36:DA:BB:3A:CA:9A:34:C2:D2:90:B1


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Returned value is 0, expected result is pass
chains.sh: #3360: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags  -d AllDB    -o OID.1.0  -t CA2CA1.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags  -d AllDB    -o OID.2.0  -t CA2CA1.der
vfychain -d AllDB -pp -vv     -o OID.2.0  UserCA2.der CA2CA1.der  -t CA2CA1.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3361: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags  -d AllDB    -o OID.2.0  -t CA2CA1.der - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #3362: Extension: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA1Root.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der
chains.sh: #3363: Extension: Importing certificate CA1Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA1.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der
chains.sh: #3364: Extension: Importing certificate CA2CA1.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t Root
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128110487 (0x433d9997)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:05:07 2012
            Not After : Tue Nov 28 16:05:07 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d0:79:79:63:bc:cf:f2:af:ee:ee:56:b9:e2:db:60:d5:
                    a1:58:b7:69:16:33:47:98:59:08:6f:b6:78:54:da:3c:
                    a3:29:be:0d:58:bb:bc:2b:e0:c9:23:dc:b3:73:67:c3:
                    46:6e:fe:6b:11:08:47:3c:38:55:7a:12:b1:74:76:c4:
                    ce:b7:52:86:b9:be:79:b4:ec:26:b4:36:72:19:85:bd:
                    27:98:e6:92:a1:30:21:31:ac:59:cd:23:ed:67:d5:28:
                    8c:b4:a9:0c:2c:93:19:3d:4d:3e:d4:c5:38:fa:73:e5:
                    aa:03:3e:b4:e6:50:10:b9:3c:1a:05:86:ab:27:ae:85
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        67:5b:7a:05:f4:74:96:9c:e0:0d:a2:c3:1f:d7:8f:d0:
        8c:44:85:e5:1d:e6:bd:87:bf:2e:11:90:54:c6:b9:34:
        d3:a4:60:b1:9c:39:17:58:e3:94:d5:b5:eb:45:6c:05:
        84:2a:55:fb:08:b3:25:dd:6c:e5:f6:fe:df:26:f2:33:
        a2:ea:e5:1a:c1:cb:7e:8e:2c:fe:53:38:09:65:26:c5:
        8a:7d:d5:73:f9:f7:ee:28:ed:35:78:ec:d6:aa:a2:b1:
        3b:1a:21:2d:c1:27:50:01:5c:e9:44:ec:c2:e6:0e:67:
        b1:9e:a9:a6:59:20:54:d0:44:3e:a3:8a:33:76:4c:91
    Fingerprint (MD5):
        B0:39:B9:BA:2D:26:BD:F4:66:4C:C9:0B:76:E0:23:DD
    Fingerprint (SHA1):
        25:04:30:4B:C6:55:15:DB:B8:CF:36:33:0A:40:37:55:1B:EC:0D:E6

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3365: Extension: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.2.0  -t Root
vfychain -d AllDB -pp -vv     -o OID.2.0  UserCA2.der  -t Root
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3366: Extension: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.2.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t CA1
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128110488 (0x433d9998)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:05:07 2012
            Not After : Tue Nov 28 16:05:07 2017
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cb:40:eb:5b:6b:0a:3f:0c:b1:09:47:80:89:c5:28:f9:
                    e1:59:5b:90:3f:89:c2:2b:93:3a:14:e8:69:af:8b:00:
                    6e:db:f7:27:3d:78:b0:0a:6b:ba:2e:59:4b:5b:0a:55:
                    a9:2c:3a:03:93:77:d3:4b:f3:3f:49:94:13:a2:da:15:
                    06:80:b7:bc:03:0f:ce:4b:62:c1:56:f3:e9:dc:34:fe:
                    69:54:e3:e7:16:9a:ab:1a:15:b0:5f:0a:16:ff:d8:3b:
                    ae:4b:0d:df:ef:2b:cf:97:ee:9f:84:c5:fd:18:f9:5d:
                    34:0f:be:d7:48:5d:76:c7:a2:a2:b3:de:a0:26:fa:67
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        b4:d6:46:69:7c:a8:55:62:be:64:05:1a:22:7f:38:10:
        22:3e:31:b6:c3:82:38:7b:56:26:e1:68:84:77:4e:8d:
        f4:51:eb:ac:1b:5e:08:d3:60:40:2a:fd:a8:cc:59:73:
        83:5f:b3:4c:1e:ce:19:7b:06:69:f6:0b:66:cf:82:93:
        f4:0c:2d:05:4d:39:c1:37:90:2e:cb:86:30:57:87:22:
        d1:a7:d7:f3:77:c3:75:57:29:f0:d7:87:19:21:1e:61:
        e3:c1:04:92:92:79:01:21:b1:dc:13:4b:11:be:c8:b6:
        b5:da:5c:58:1f:09:c6:17:df:0e:9d:68:f2:d8:7a:af
    Fingerprint (MD5):
        56:1F:71:AF:46:6B:4C:15:D4:B4:D7:D1:13:CE:1A:95
    Fingerprint (SHA1):
        96:67:00:5A:4F:79:A0:3F:55:65:0F:4B:69:74:2A:AD:3B:35:75:21

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #3367: Extension: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.2.0  -t CA1
vfychain -d AllDB -pp -vv     -o OID.2.0  UserCA2.der  -t CA1
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CA1 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3368: Extension: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.2.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t CA2
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128110489 (0x433d9999)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Wed Nov 28 16:05:08 2012
            Not After : Tue Nov 28 16:05:08 2017
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b1:d7:e9:92:8b:b7:10:a3:07:76:24:39:47:63:39:c4:
                    1a:90:92:87:41:90:43:f8:21:70:6b:c3:dd:2d:6c:3e:
                    9b:a7:4d:54:d7:d8:29:64:46:09:e0:73:e7:8b:d3:42:
                    b6:d6:13:bd:08:b2:85:2f:e1:f0:cd:41:9c:6d:d3:f8:
                    91:74:c1:64:9f:5a:25:68:89:17:c9:ec:b8:35:cd:9a:
                    8c:fd:63:fc:49:e3:f0:a7:c0:ed:f4:25:45:15:61:d4:
                    47:2f:66:1b:1e:9a:3d:e9:f3:d7:51:05:6e:a5:87:2c:
                    16:9e:34:8c:07:fb:0a:cb:a1:98:bf:57:c5:9c:f4:85
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        46:3d:3e:6c:3b:d8:c0:50:b1:a1:97:14:67:af:9c:24:
        1b:4e:3d:02:b1:2b:90:69:71:75:6a:8e:94:93:37:a9:
        9a:f4:8d:77:cf:39:06:8b:be:b6:f7:7d:a8:a4:05:11:
        37:98:03:a9:d9:e2:f0:84:8e:28:60:8e:13:96:c8:c6:
        4c:69:2a:57:9d:06:1c:fd:06:f7:08:71:4e:ee:45:3e:
        c3:ab:3c:1d:f4:94:a7:d6:b3:88:bb:97:09:d4:68:26:
        79:42:88:32:e6:a8:fa:50:78:aa:16:9d:28:d4:66:e4:
        e8:79:8d:9a:b4:c0:d0:e2:54:30:ec:91:99:ef:f7:fa
    Fingerprint (MD5):
        84:32:A9:35:E1:05:31:E0:CE:88:0F:1C:AF:03:75:02
    Fingerprint (SHA1):
        E2:89:94:B3:A5:BD:2F:8A:A4:36:DA:BB:3A:CA:9A:34:C2:D2:90:B1

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Returned value is 0, expected result is pass
chains.sh: #3369: Extension: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.2.0  -t CA2
vfychain -d AllDB -pp -vv     -o OID.2.0  UserCA2.der  -t CA2
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CA2 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3370: Extension: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.2.0  -t CA2 - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #3371: Extension2: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1128110491 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3372: Extension2: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #3373: Extension2: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #3374: Extension2: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3375: Extension2: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1128110492   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3376: Extension2: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
chains.sh: #3377: Extension2: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #3378: Extension2: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3379: Extension2: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1128110493   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3380: Extension2: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
chains.sh: #3381: Extension2: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB User1DB
certutil -N -d User1DB -f User1DB/dbpasswd
chains.sh: #3382: Extension2: Creating DB User1DB  - PASSED
chains.sh: Creating EE certifiate request User1Req.der
certutil -s "CN=User1 EE, O=User1, C=US"  -R  -d User1DB -f User1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o User1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3383: Extension2: Creating EE certifiate request User1Req.der  - PASSED
chains.sh: Creating certficate User1CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1128110494   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3384: Extension2: Creating certficate User1CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate User1CA2.der to User1DB database
certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der
chains.sh: #3385: Extension2: Importing certificate User1CA2.der to User1DB database  - PASSED
chains.sh: Creating DB User2DB
certutil -N -d User2DB -f User2DB/dbpasswd
chains.sh: #3386: Extension2: Creating DB User2DB  - PASSED
chains.sh: Creating EE certifiate request User2Req.der
certutil -s "CN=User2 EE, O=User2, C=US"  -R  -d User2DB -f User2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o User2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3387: Extension2: Creating EE certifiate request User2Req.der  - PASSED
chains.sh: Creating certficate User2CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1128110495   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3388: Extension2: Creating certficate User2CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate User2CA2.der to User2DB database
certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der
chains.sh: #3389: Extension2: Importing certificate User2CA2.der to User2DB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #3390: Extension2: Creating DB AllDB  - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der
vfychain -d AllDB -pp -vv     -o OID.1.0  User1CA2.der CA2CA1.der CA1Root.der Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128110491 (0x433d999b)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:05:10 2012
            Not After : Tue Nov 28 16:05:10 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cf:13:a1:a9:ce:3f:6c:d1:c6:2f:9d:79:b5:4a:eb:e6:
                    40:18:c9:34:86:3a:d0:9d:84:ff:a8:4f:fc:9a:1a:fd:
                    f6:97:80:1c:bb:b0:72:06:24:63:c1:e3:3e:16:cd:f7:
                    c5:04:0a:5a:88:54:f9:e5:a6:ad:c2:22:c8:e0:70:7a:
                    da:5f:14:3c:dd:df:92:cf:3c:38:bc:69:cc:69:5e:8e:
                    5a:41:fa:fa:c0:43:cc:d2:36:5f:d6:44:58:7a:93:34:
                    60:e0:04:42:db:71:72:16:2f:df:e8:0e:d5:c6:bb:a3:
                    70:e3:89:bb:dd:3d:0d:24:20:e2:9a:5f:e7:53:51:fd
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        19:48:f4:25:8d:f4:52:c8:f1:6f:c4:e4:c4:76:61:f7:
        05:60:ea:56:98:3a:4b:ce:7c:d4:bc:c8:60:5c:af:c0:
        8e:ee:37:07:ae:fd:79:25:24:de:da:d6:c9:03:45:d0:
        2e:35:fd:4d:70:be:e2:69:8f:65:02:a7:0b:4b:ef:33:
        86:c0:33:74:b4:89:92:43:b6:f4:69:ea:0f:e3:00:0f:
        49:c1:57:08:ab:00:ee:53:b2:c0:7b:64:c5:4a:73:08:
        7e:a6:a7:e5:6e:11:5a:4c:b3:b5:17:34:24:0a:b3:e7:
        d0:12:9a:0e:21:fc:c4:05:b5:78:65:a3:e8:b9:c5:81
    Fingerprint (MD5):
        14:E5:52:60:9E:D2:52:7D:00:26:12:73:21:3D:D7:C3
    Fingerprint (SHA1):
        32:04:35:74:B9:FE:CB:53:FD:2F:78:6F:BF:07:57:0C:A4:C1:63:66


Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3391: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der Root.der with flags  -d AllDB    -o OID.2.0  -t Root.der
vfychain -d AllDB -pp -vv     -o OID.2.0  User1CA2.der CA2CA1.der CA1Root.der Root.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3392: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der Root.der with flags  -d AllDB    -o OID.2.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der with flags  -d AllDB    -o OID.1.0  -t CA1Root.der
vfychain -d AllDB -pp -vv     -o OID.1.0  User1CA2.der CA2CA1.der CA1Root.der  -t CA1Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128110492 (0x433d999c)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:05:10 2012
            Not After : Tue Nov 28 16:05:10 2017
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e3:ae:0a:8b:57:61:97:20:cd:fb:67:13:f9:ca:1d:6b:
                    cc:08:7a:0a:15:5f:b7:16:bf:63:a1:a1:1f:b4:0d:a3:
                    70:bd:7c:7c:3f:2c:a1:f2:3d:47:bc:69:0a:95:41:9a:
                    4d:3a:ac:5d:ed:d4:2a:2b:95:2c:a7:40:bc:ad:58:d9:
                    fa:8e:d6:4c:d8:1d:aa:f6:83:9c:3d:30:3f:11:14:a5:
                    2d:fb:e1:f4:c5:32:c5:c2:2c:1d:b9:25:cf:04:c7:30:
                    be:ea:02:76:ea:41:92:34:2a:a8:60:3c:4d:25:45:b0:
                    33:64:4f:e9:79:d9:66:ed:52:e4:a0:50:a0:80:28:c1
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        cd:34:98:5d:c5:db:3d:b8:56:e6:bc:10:c6:c4:74:60:
        b8:7c:5d:ab:90:a4:7c:db:2d:ef:bb:95:a8:02:37:24:
        f4:b8:9c:4e:c8:cd:61:aa:fe:37:73:db:7c:9e:be:03:
        10:05:88:3f:aa:9e:1f:1e:e1:97:74:b5:e9:5f:f9:f9:
        9b:1a:54:bc:5b:5d:ff:93:b4:92:20:b9:d3:05:8a:ac:
        ea:e8:0c:f1:48:46:7c:81:81:d6:c5:9a:7a:39:82:11:
        38:0d:34:f0:5a:12:c4:ab:0e:c9:e3:8a:59:03:2d:79:
        52:16:54:da:00:a5:f3:52:e9:cd:56:d2:6a:58:b2:d4
    Fingerprint (MD5):
        7E:D0:F5:A8:13:D2:3F:B2:8B:0E:E5:1E:38:16:EE:72
    Fingerprint (SHA1):
        9F:00:4E:89:15:B0:DD:09:B3:EC:39:EE:4E:16:35:B1:F7:BF:7A:78


Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #3393: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der with flags  -d AllDB    -o OID.1.0  -t CA1Root.der - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der with flags  -d AllDB    -o OID.2.0  -t CA1Root.der
vfychain -d AllDB -pp -vv     -o OID.2.0  User1CA2.der CA2CA1.der CA1Root.der  -t CA1Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3394: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der with flags  -d AllDB    -o OID.2.0  -t CA1Root.der - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der with flags  -d AllDB    -o OID.1.0  -t CA2CA1.der
vfychain -d AllDB -pp -vv     -o OID.1.0  User1CA2.der CA2CA1.der  -t CA2CA1.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128110493 (0x433d999d)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Wed Nov 28 16:05:11 2012
            Not After : Tue Nov 28 16:05:11 2017
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b9:21:7e:6e:99:fa:70:e4:53:23:29:8e:b6:59:65:2b:
                    a5:e8:59:55:ec:f1:7c:71:70:93:bb:5d:3f:92:de:5a:
                    08:fe:2f:01:0d:1d:0e:70:3b:8a:b5:50:f0:a3:ec:3b:
                    8e:08:3f:80:80:8c:46:0c:47:88:d2:c8:80:51:ba:0d:
                    4b:ec:0e:0b:24:f9:83:0c:ba:45:cb:cf:ae:5a:1e:b0:
                    02:7e:f4:ed:e2:99:16:0a:fe:93:17:a2:1f:56:6e:93:
                    92:e8:5c:e8:dc:e3:ee:25:10:d6:16:58:79:e5:7d:04:
                    ac:a4:4f:98:44:47:61:06:2f:36:6b:c6:2e:b3:2d:b1
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        11:d5:c0:dc:a0:06:b9:95:1b:32:1f:19:a0:d8:c4:0b:
        c2:bf:df:16:7f:6f:f2:c1:9e:06:41:39:b9:e9:2a:cb:
        f8:f6:eb:3d:16:f6:75:30:53:8d:06:79:d7:a0:d0:43:
        7e:59:16:91:76:26:9c:65:35:b2:7d:0c:1f:cd:97:ea:
        9b:22:8d:3a:b4:d8:fc:d8:43:f1:63:40:9a:42:eb:fa:
        bd:91:af:67:cc:4a:6b:ca:e1:21:97:73:37:b4:95:15:
        ff:85:4b:0b:be:59:99:65:fa:26:55:bc:fe:29:8c:eb:
        69:b3:ef:52:e5:74:c2:eb:1d:92:6b:95:ed:1b:da:a1
    Fingerprint (MD5):
        13:2E:E9:8A:79:8E:CB:E2:FA:D5:3B:66:CD:B9:C7:D8
    Fingerprint (SHA1):
        7C:2F:64:2A:48:8B:79:7C:2F:A4:F6:D1:EE:D5:4A:79:C8:51:3F:49


Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3395: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der with flags  -d AllDB    -o OID.1.0  -t CA2CA1.der - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der with flags  -d AllDB    -o OID.2.0  -t CA2CA1.der
vfychain -d AllDB -pp -vv     -o OID.2.0  User1CA2.der CA2CA1.der  -t CA2CA1.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3396: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der with flags  -d AllDB    -o OID.2.0  -t CA2CA1.der - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #3397: Extension2: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA1Root.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der
chains.sh: #3398: Extension2: Importing certificate CA1Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA1.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der
chains.sh: #3399: Extension2: Importing certificate CA2CA1.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.1.0  -t Root
vfychain -d AllDB -pp -vv     -o OID.1.0  User1CA2.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128110491 (0x433d999b)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:05:10 2012
            Not After : Tue Nov 28 16:05:10 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cf:13:a1:a9:ce:3f:6c:d1:c6:2f:9d:79:b5:4a:eb:e6:
                    40:18:c9:34:86:3a:d0:9d:84:ff:a8:4f:fc:9a:1a:fd:
                    f6:97:80:1c:bb:b0:72:06:24:63:c1:e3:3e:16:cd:f7:
                    c5:04:0a:5a:88:54:f9:e5:a6:ad:c2:22:c8:e0:70:7a:
                    da:5f:14:3c:dd:df:92:cf:3c:38:bc:69:cc:69:5e:8e:
                    5a:41:fa:fa:c0:43:cc:d2:36:5f:d6:44:58:7a:93:34:
                    60:e0:04:42:db:71:72:16:2f:df:e8:0e:d5:c6:bb:a3:
                    70:e3:89:bb:dd:3d:0d:24:20:e2:9a:5f:e7:53:51:fd
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        19:48:f4:25:8d:f4:52:c8:f1:6f:c4:e4:c4:76:61:f7:
        05:60:ea:56:98:3a:4b:ce:7c:d4:bc:c8:60:5c:af:c0:
        8e:ee:37:07:ae:fd:79:25:24:de:da:d6:c9:03:45:d0:
        2e:35:fd:4d:70:be:e2:69:8f:65:02:a7:0b:4b:ef:33:
        86:c0:33:74:b4:89:92:43:b6:f4:69:ea:0f:e3:00:0f:
        49:c1:57:08:ab:00:ee:53:b2:c0:7b:64:c5:4a:73:08:
        7e:a6:a7:e5:6e:11:5a:4c:b3:b5:17:34:24:0a:b3:e7:
        d0:12:9a:0e:21:fc:c4:05:b5:78:65:a3:e8:b9:c5:81
    Fingerprint (MD5):
        14:E5:52:60:9E:D2:52:7D:00:26:12:73:21:3D:D7:C3
    Fingerprint (SHA1):
        32:04:35:74:B9:FE:CB:53:FD:2F:78:6F:BF:07:57:0C:A4:C1:63:66

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3400: Extension2: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.1.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.2.0  -t Root
vfychain -d AllDB -pp -vv     -o OID.2.0  User1CA2.der  -t Root
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3401: Extension2: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.2.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.1.0  -t CA1
vfychain -d AllDB -pp -vv     -o OID.1.0  User1CA2.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128110492 (0x433d999c)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:05:10 2012
            Not After : Tue Nov 28 16:05:10 2017
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e3:ae:0a:8b:57:61:97:20:cd:fb:67:13:f9:ca:1d:6b:
                    cc:08:7a:0a:15:5f:b7:16:bf:63:a1:a1:1f:b4:0d:a3:
                    70:bd:7c:7c:3f:2c:a1:f2:3d:47:bc:69:0a:95:41:9a:
                    4d:3a:ac:5d:ed:d4:2a:2b:95:2c:a7:40:bc:ad:58:d9:
                    fa:8e:d6:4c:d8:1d:aa:f6:83:9c:3d:30:3f:11:14:a5:
                    2d:fb:e1:f4:c5:32:c5:c2:2c:1d:b9:25:cf:04:c7:30:
                    be:ea:02:76:ea:41:92:34:2a:a8:60:3c:4d:25:45:b0:
                    33:64:4f:e9:79:d9:66:ed:52:e4:a0:50:a0:80:28:c1
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        cd:34:98:5d:c5:db:3d:b8:56:e6:bc:10:c6:c4:74:60:
        b8:7c:5d:ab:90:a4:7c:db:2d:ef:bb:95:a8:02:37:24:
        f4:b8:9c:4e:c8:cd:61:aa:fe:37:73:db:7c:9e:be:03:
        10:05:88:3f:aa:9e:1f:1e:e1:97:74:b5:e9:5f:f9:f9:
        9b:1a:54:bc:5b:5d:ff:93:b4:92:20:b9:d3:05:8a:ac:
        ea:e8:0c:f1:48:46:7c:81:81:d6:c5:9a:7a:39:82:11:
        38:0d:34:f0:5a:12:c4:ab:0e:c9:e3:8a:59:03:2d:79:
        52:16:54:da:00:a5:f3:52:e9:cd:56:d2:6a:58:b2:d4
    Fingerprint (MD5):
        7E:D0:F5:A8:13:D2:3F:B2:8B:0E:E5:1E:38:16:EE:72
    Fingerprint (SHA1):
        9F:00:4E:89:15:B0:DD:09:B3:EC:39:EE:4E:16:35:B1:F7:BF:7A:78

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #3402: Extension2: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.1.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.2.0  -t CA1
vfychain -d AllDB -pp -vv     -o OID.2.0  User1CA2.der  -t CA1
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CA1 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3403: Extension2: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.2.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.1.0  -t CA2
vfychain -d AllDB -pp -vv     -o OID.1.0  User1CA2.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128110493 (0x433d999d)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Wed Nov 28 16:05:11 2012
            Not After : Tue Nov 28 16:05:11 2017
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b9:21:7e:6e:99:fa:70:e4:53:23:29:8e:b6:59:65:2b:
                    a5:e8:59:55:ec:f1:7c:71:70:93:bb:5d:3f:92:de:5a:
                    08:fe:2f:01:0d:1d:0e:70:3b:8a:b5:50:f0:a3:ec:3b:
                    8e:08:3f:80:80:8c:46:0c:47:88:d2:c8:80:51:ba:0d:
                    4b:ec:0e:0b:24:f9:83:0c:ba:45:cb:cf:ae:5a:1e:b0:
                    02:7e:f4:ed:e2:99:16:0a:fe:93:17:a2:1f:56:6e:93:
                    92:e8:5c:e8:dc:e3:ee:25:10:d6:16:58:79:e5:7d:04:
                    ac:a4:4f:98:44:47:61:06:2f:36:6b:c6:2e:b3:2d:b1
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        11:d5:c0:dc:a0:06:b9:95:1b:32:1f:19:a0:d8:c4:0b:
        c2:bf:df:16:7f:6f:f2:c1:9e:06:41:39:b9:e9:2a:cb:
        f8:f6:eb:3d:16:f6:75:30:53:8d:06:79:d7:a0:d0:43:
        7e:59:16:91:76:26:9c:65:35:b2:7d:0c:1f:cd:97:ea:
        9b:22:8d:3a:b4:d8:fc:d8:43:f1:63:40:9a:42:eb:fa:
        bd:91:af:67:cc:4a:6b:ca:e1:21:97:73:37:b4:95:15:
        ff:85:4b:0b:be:59:99:65:fa:26:55:bc:fe:29:8c:eb:
        69:b3:ef:52:e5:74:c2:eb:1d:92:6b:95:ed:1b:da:a1
    Fingerprint (MD5):
        13:2E:E9:8A:79:8E:CB:E2:FA:D5:3B:66:CD:B9:C7:D8
    Fingerprint (SHA1):
        7C:2F:64:2A:48:8B:79:7C:2F:A4:F6:D1:EE:D5:4A:79:C8:51:3F:49

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3404: Extension2: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.1.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.2.0  -t CA2
vfychain -d AllDB -pp -vv     -o OID.2.0  User1CA2.der  -t CA2
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CA2 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3405: Extension2: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.2.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.1.0  -t Root
vfychain -d AllDB -pp -vv     -o OID.1.0  User2CA2.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128110491 (0x433d999b)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:05:10 2012
            Not After : Tue Nov 28 16:05:10 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cf:13:a1:a9:ce:3f:6c:d1:c6:2f:9d:79:b5:4a:eb:e6:
                    40:18:c9:34:86:3a:d0:9d:84:ff:a8:4f:fc:9a:1a:fd:
                    f6:97:80:1c:bb:b0:72:06:24:63:c1:e3:3e:16:cd:f7:
                    c5:04:0a:5a:88:54:f9:e5:a6:ad:c2:22:c8:e0:70:7a:
                    da:5f:14:3c:dd:df:92:cf:3c:38:bc:69:cc:69:5e:8e:
                    5a:41:fa:fa:c0:43:cc:d2:36:5f:d6:44:58:7a:93:34:
                    60:e0:04:42:db:71:72:16:2f:df:e8:0e:d5:c6:bb:a3:
                    70:e3:89:bb:dd:3d:0d:24:20:e2:9a:5f:e7:53:51:fd
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        19:48:f4:25:8d:f4:52:c8:f1:6f:c4:e4:c4:76:61:f7:
        05:60:ea:56:98:3a:4b:ce:7c:d4:bc:c8:60:5c:af:c0:
        8e:ee:37:07:ae:fd:79:25:24:de:da:d6:c9:03:45:d0:
        2e:35:fd:4d:70:be:e2:69:8f:65:02:a7:0b:4b:ef:33:
        86:c0:33:74:b4:89:92:43:b6:f4:69:ea:0f:e3:00:0f:
        49:c1:57:08:ab:00:ee:53:b2:c0:7b:64:c5:4a:73:08:
        7e:a6:a7:e5:6e:11:5a:4c:b3:b5:17:34:24:0a:b3:e7:
        d0:12:9a:0e:21:fc:c4:05:b5:78:65:a3:e8:b9:c5:81
    Fingerprint (MD5):
        14:E5:52:60:9E:D2:52:7D:00:26:12:73:21:3D:D7:C3
    Fingerprint (SHA1):
        32:04:35:74:B9:FE:CB:53:FD:2F:78:6F:BF:07:57:0C:A4:C1:63:66

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3406: Extension2: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.1.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.2.0  -t Root
vfychain -d AllDB -pp -vv     -o OID.2.0  User2CA2.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128110491 (0x433d999b)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:05:10 2012
            Not After : Tue Nov 28 16:05:10 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cf:13:a1:a9:ce:3f:6c:d1:c6:2f:9d:79:b5:4a:eb:e6:
                    40:18:c9:34:86:3a:d0:9d:84:ff:a8:4f:fc:9a:1a:fd:
                    f6:97:80:1c:bb:b0:72:06:24:63:c1:e3:3e:16:cd:f7:
                    c5:04:0a:5a:88:54:f9:e5:a6:ad:c2:22:c8:e0:70:7a:
                    da:5f:14:3c:dd:df:92:cf:3c:38:bc:69:cc:69:5e:8e:
                    5a:41:fa:fa:c0:43:cc:d2:36:5f:d6:44:58:7a:93:34:
                    60:e0:04:42:db:71:72:16:2f:df:e8:0e:d5:c6:bb:a3:
                    70:e3:89:bb:dd:3d:0d:24:20:e2:9a:5f:e7:53:51:fd
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        19:48:f4:25:8d:f4:52:c8:f1:6f:c4:e4:c4:76:61:f7:
        05:60:ea:56:98:3a:4b:ce:7c:d4:bc:c8:60:5c:af:c0:
        8e:ee:37:07:ae:fd:79:25:24:de:da:d6:c9:03:45:d0:
        2e:35:fd:4d:70:be:e2:69:8f:65:02:a7:0b:4b:ef:33:
        86:c0:33:74:b4:89:92:43:b6:f4:69:ea:0f:e3:00:0f:
        49:c1:57:08:ab:00:ee:53:b2:c0:7b:64:c5:4a:73:08:
        7e:a6:a7:e5:6e:11:5a:4c:b3:b5:17:34:24:0a:b3:e7:
        d0:12:9a:0e:21:fc:c4:05:b5:78:65:a3:e8:b9:c5:81
    Fingerprint (MD5):
        14:E5:52:60:9E:D2:52:7D:00:26:12:73:21:3D:D7:C3
    Fingerprint (SHA1):
        32:04:35:74:B9:FE:CB:53:FD:2F:78:6F:BF:07:57:0C:A4:C1:63:66

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3407: Extension2: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.2.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.1.0  -t CA1
vfychain -d AllDB -pp -vv     -o OID.1.0  User2CA2.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128110492 (0x433d999c)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:05:10 2012
            Not After : Tue Nov 28 16:05:10 2017
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e3:ae:0a:8b:57:61:97:20:cd:fb:67:13:f9:ca:1d:6b:
                    cc:08:7a:0a:15:5f:b7:16:bf:63:a1:a1:1f:b4:0d:a3:
                    70:bd:7c:7c:3f:2c:a1:f2:3d:47:bc:69:0a:95:41:9a:
                    4d:3a:ac:5d:ed:d4:2a:2b:95:2c:a7:40:bc:ad:58:d9:
                    fa:8e:d6:4c:d8:1d:aa:f6:83:9c:3d:30:3f:11:14:a5:
                    2d:fb:e1:f4:c5:32:c5:c2:2c:1d:b9:25:cf:04:c7:30:
                    be:ea:02:76:ea:41:92:34:2a:a8:60:3c:4d:25:45:b0:
                    33:64:4f:e9:79:d9:66:ed:52:e4:a0:50:a0:80:28:c1
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        cd:34:98:5d:c5:db:3d:b8:56:e6:bc:10:c6:c4:74:60:
        b8:7c:5d:ab:90:a4:7c:db:2d:ef:bb:95:a8:02:37:24:
        f4:b8:9c:4e:c8:cd:61:aa:fe:37:73:db:7c:9e:be:03:
        10:05:88:3f:aa:9e:1f:1e:e1:97:74:b5:e9:5f:f9:f9:
        9b:1a:54:bc:5b:5d:ff:93:b4:92:20:b9:d3:05:8a:ac:
        ea:e8:0c:f1:48:46:7c:81:81:d6:c5:9a:7a:39:82:11:
        38:0d:34:f0:5a:12:c4:ab:0e:c9:e3:8a:59:03:2d:79:
        52:16:54:da:00:a5:f3:52:e9:cd:56:d2:6a:58:b2:d4
    Fingerprint (MD5):
        7E:D0:F5:A8:13:D2:3F:B2:8B:0E:E5:1E:38:16:EE:72
    Fingerprint (SHA1):
        9F:00:4E:89:15:B0:DD:09:B3:EC:39:EE:4E:16:35:B1:F7:BF:7A:78

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #3408: Extension2: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.1.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.2.0  -t CA1
vfychain -d AllDB -pp -vv     -o OID.2.0  User2CA2.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128110492 (0x433d999c)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:05:10 2012
            Not After : Tue Nov 28 16:05:10 2017
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e3:ae:0a:8b:57:61:97:20:cd:fb:67:13:f9:ca:1d:6b:
                    cc:08:7a:0a:15:5f:b7:16:bf:63:a1:a1:1f:b4:0d:a3:
                    70:bd:7c:7c:3f:2c:a1:f2:3d:47:bc:69:0a:95:41:9a:
                    4d:3a:ac:5d:ed:d4:2a:2b:95:2c:a7:40:bc:ad:58:d9:
                    fa:8e:d6:4c:d8:1d:aa:f6:83:9c:3d:30:3f:11:14:a5:
                    2d:fb:e1:f4:c5:32:c5:c2:2c:1d:b9:25:cf:04:c7:30:
                    be:ea:02:76:ea:41:92:34:2a:a8:60:3c:4d:25:45:b0:
                    33:64:4f:e9:79:d9:66:ed:52:e4:a0:50:a0:80:28:c1
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: OID.1.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        cd:34:98:5d:c5:db:3d:b8:56:e6:bc:10:c6:c4:74:60:
        b8:7c:5d:ab:90:a4:7c:db:2d:ef:bb:95:a8:02:37:24:
        f4:b8:9c:4e:c8:cd:61:aa:fe:37:73:db:7c:9e:be:03:
        10:05:88:3f:aa:9e:1f:1e:e1:97:74:b5:e9:5f:f9:f9:
        9b:1a:54:bc:5b:5d:ff:93:b4:92:20:b9:d3:05:8a:ac:
        ea:e8:0c:f1:48:46:7c:81:81:d6:c5:9a:7a:39:82:11:
        38:0d:34:f0:5a:12:c4:ab:0e:c9:e3:8a:59:03:2d:79:
        52:16:54:da:00:a5:f3:52:e9:cd:56:d2:6a:58:b2:d4
    Fingerprint (MD5):
        7E:D0:F5:A8:13:D2:3F:B2:8B:0E:E5:1E:38:16:EE:72
    Fingerprint (SHA1):
        9F:00:4E:89:15:B0:DD:09:B3:EC:39:EE:4E:16:35:B1:F7:BF:7A:78

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #3409: Extension2: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.2.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.1.0  -t CA2
vfychain -d AllDB -pp -vv     -o OID.1.0  User2CA2.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128110493 (0x433d999d)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Wed Nov 28 16:05:11 2012
            Not After : Tue Nov 28 16:05:11 2017
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b9:21:7e:6e:99:fa:70:e4:53:23:29:8e:b6:59:65:2b:
                    a5:e8:59:55:ec:f1:7c:71:70:93:bb:5d:3f:92:de:5a:
                    08:fe:2f:01:0d:1d:0e:70:3b:8a:b5:50:f0:a3:ec:3b:
                    8e:08:3f:80:80:8c:46:0c:47:88:d2:c8:80:51:ba:0d:
                    4b:ec:0e:0b:24:f9:83:0c:ba:45:cb:cf:ae:5a:1e:b0:
                    02:7e:f4:ed:e2:99:16:0a:fe:93:17:a2:1f:56:6e:93:
                    92:e8:5c:e8:dc:e3:ee:25:10:d6:16:58:79:e5:7d:04:
                    ac:a4:4f:98:44:47:61:06:2f:36:6b:c6:2e:b3:2d:b1
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        11:d5:c0:dc:a0:06:b9:95:1b:32:1f:19:a0:d8:c4:0b:
        c2:bf:df:16:7f:6f:f2:c1:9e:06:41:39:b9:e9:2a:cb:
        f8:f6:eb:3d:16:f6:75:30:53:8d:06:79:d7:a0:d0:43:
        7e:59:16:91:76:26:9c:65:35:b2:7d:0c:1f:cd:97:ea:
        9b:22:8d:3a:b4:d8:fc:d8:43:f1:63:40:9a:42:eb:fa:
        bd:91:af:67:cc:4a:6b:ca:e1:21:97:73:37:b4:95:15:
        ff:85:4b:0b:be:59:99:65:fa:26:55:bc:fe:29:8c:eb:
        69:b3:ef:52:e5:74:c2:eb:1d:92:6b:95:ed:1b:da:a1
    Fingerprint (MD5):
        13:2E:E9:8A:79:8E:CB:E2:FA:D5:3B:66:CD:B9:C7:D8
    Fingerprint (SHA1):
        7C:2F:64:2A:48:8B:79:7C:2F:A4:F6:D1:EE:D5:4A:79:C8:51:3F:49

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Returned value is 0, expected result is pass
chains.sh: #3410: Extension2: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.1.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.2.0  -t CA2
vfychain -d AllDB -pp -vv     -o OID.2.0  User2CA2.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128110493 (0x433d999d)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Wed Nov 28 16:05:11 2012
            Not After : Tue Nov 28 16:05:11 2017
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b9:21:7e:6e:99:fa:70:e4:53:23:29:8e:b6:59:65:2b:
                    a5:e8:59:55:ec:f1:7c:71:70:93:bb:5d:3f:92:de:5a:
                    08:fe:2f:01:0d:1d:0e:70:3b:8a:b5:50:f0:a3:ec:3b:
                    8e:08:3f:80:80:8c:46:0c:47:88:d2:c8:80:51:ba:0d:
                    4b:ec:0e:0b:24:f9:83:0c:ba:45:cb:cf:ae:5a:1e:b0:
                    02:7e:f4:ed:e2:99:16:0a:fe:93:17:a2:1f:56:6e:93:
                    92:e8:5c:e8:dc:e3:ee:25:10:d6:16:58:79:e5:7d:04:
                    ac:a4:4f:98:44:47:61:06:2f:36:6b:c6:2e:b3:2d:b1
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: OID.1.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        11:d5:c0:dc:a0:06:b9:95:1b:32:1f:19:a0:d8:c4:0b:
        c2:bf:df:16:7f:6f:f2:c1:9e:06:41:39:b9:e9:2a:cb:
        f8:f6:eb:3d:16:f6:75:30:53:8d:06:79:d7:a0:d0:43:
        7e:59:16:91:76:26:9c:65:35:b2:7d:0c:1f:cd:97:ea:
        9b:22:8d:3a:b4:d8:fc:d8:43:f1:63:40:9a:42:eb:fa:
        bd:91:af:67:cc:4a:6b:ca:e1:21:97:73:37:b4:95:15:
        ff:85:4b:0b:be:59:99:65:fa:26:55:bc:fe:29:8c:eb:
        69:b3:ef:52:e5:74:c2:eb:1d:92:6b:95:ed:1b:da:a1
    Fingerprint (MD5):
        13:2E:E9:8A:79:8E:CB:E2:FA:D5:3B:66:CD:B9:C7:D8
    Fingerprint (SHA1):
        7C:2F:64:2A:48:8B:79:7C:2F:A4:F6:D1:EE:D5:4A:79:C8:51:3F:49

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Returned value is 0, expected result is pass
chains.sh: #3411: Extension2: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.2.0  -t CA2 - PASSED
chains.sh: Creating DB RootCADB
certutil -N -d RootCADB -f RootCADB/dbpasswd
chains.sh: #3412: AnyPolicy: Creating DB RootCADB  - PASSED
chains.sh: Creating Root CA RootCA
certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA  -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1128110496 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3413: AnyPolicy: Creating Root CA RootCA  - PASSED
chains.sh: Exporting Root CA RootCA.der
certutil -L -d RootCADB -r -n RootCA -o RootCA.der
chains.sh: #3414: AnyPolicy: Exporting Root CA RootCA.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #3415: AnyPolicy: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3416: AnyPolicy: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1RootCA.der signed by RootCA
certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1128110497   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3417: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA  - PASSED
chains.sh: Importing certificate CA1RootCA.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der
chains.sh: #3418: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #3419: AnyPolicy: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3420: AnyPolicy: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1128110498   --extCP --extIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n
0
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter the number of certs in the path permitted to use anyPolicy.
(press Enter for 0) > Is this a critical extension [y/N]?
chains.sh: #3421: AnyPolicy: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
chains.sh: #3422: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB CA3DB
certutil -N -d CA3DB -f CA3DB/dbpasswd
chains.sh: #3423: AnyPolicy: Creating DB CA3DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA3Req.der
certutil -s "CN=CA3 Intermediate, O=CA3, C=US"  -R -2 -d CA3DB -f CA3DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA3Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3424: AnyPolicy: Creating Intermediate certifiate request CA3Req.der  - PASSED
chains.sh: Creating certficate CA3CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 1128110499   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3425: AnyPolicy: Creating certficate CA3CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA3CA1.der to CA3DB database
certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der
chains.sh: #3426: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database  - PASSED
chains.sh: Creating DB User1DB
certutil -N -d User1DB -f User1DB/dbpasswd
chains.sh: #3427: AnyPolicy: Creating DB User1DB  - PASSED
chains.sh: Creating EE certifiate request User1Req.der
certutil -s "CN=User1 EE, O=User1, C=US"  -R  -d User1DB -f User1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o User1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3428: AnyPolicy: Creating EE certifiate request User1Req.der  - PASSED
chains.sh: Creating certficate User1CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1128110500   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3429: AnyPolicy: Creating certficate User1CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate User1CA2.der to User1DB database
certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der
chains.sh: #3430: AnyPolicy: Importing certificate User1CA2.der to User1DB database  - PASSED
chains.sh: Creating DB User2DB
certutil -N -d User2DB -f User2DB/dbpasswd
chains.sh: #3431: AnyPolicy: Creating DB User2DB  - PASSED
chains.sh: Creating EE certifiate request User2Req.der
certutil -s "CN=User2 EE, O=User2, C=US"  -R  -d User2DB -f User2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o User2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3432: AnyPolicy: Creating EE certifiate request User2Req.der  - PASSED
chains.sh: Creating certficate User2CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1128110501   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3433: AnyPolicy: Creating certficate User2CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate User2CA2.der to User2DB database
certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der
chains.sh: #3434: AnyPolicy: Importing certificate User2CA2.der to User2DB database  - PASSED
chains.sh: Creating DB User3DB
certutil -N -d User3DB -f User3DB/dbpasswd
chains.sh: #3435: AnyPolicy: Creating DB User3DB  - PASSED
chains.sh: Creating EE certifiate request User3Req.der
certutil -s "CN=User3 EE, O=User3, C=US"  -R  -d User3DB -f User3DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o User3Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3436: AnyPolicy: Creating EE certifiate request User3Req.der  - PASSED
chains.sh: Creating certficate User3CA3.der signed by CA3
certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 1128110502   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3437: AnyPolicy: Creating certficate User3CA3.der signed by CA3  - PASSED
chains.sh: Importing certificate User3CA3.der to User3DB database
certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der
chains.sh: #3438: AnyPolicy: Importing certificate User3CA3.der to User3DB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #3439: AnyPolicy: Creating DB AllDB  - PASSED
chains.sh: Importing certificate RootCA.der to AllDB database
certutil -A -n RootCA  -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der
chains.sh: #3440: AnyPolicy: Importing certificate RootCA.der to AllDB database  - PASSED
chains.sh: Importing certificate CA1RootCA.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der
chains.sh: #3441: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA1.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der
chains.sh: #3442: AnyPolicy: Importing certificate CA2CA1.der to AllDB database  - PASSED
chains.sh: Importing certificate CA3CA1.der to AllDB database
certutil -A -n CA3  -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der
chains.sh: #3443: AnyPolicy: Importing certificate CA3CA1.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.1.0  -t RootCA
vfychain -d AllDB -pp -vv     -o OID.1.0  User1CA2.der  -t RootCA
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128110496 (0x433d99a0)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 16:05:13 2012
            Not After : Tue Nov 28 16:05:13 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b1:c5:b8:e7:e6:2e:68:c2:84:52:44:3d:8e:8b:ab:82:
                    6b:63:85:cf:89:ba:1a:a8:f9:0d:49:13:d8:07:09:8a:
                    95:da:87:c6:f0:bc:56:01:24:88:13:fc:8d:18:68:96:
                    45:58:e9:d8:eb:d5:3a:3b:89:8b:79:2b:8f:f3:5b:0c:
                    0e:1f:68:60:5a:b6:31:8b:3e:89:2a:b0:1d:b8:d9:12:
                    d9:b3:83:06:9f:6a:c0:20:1a:80:3c:06:2f:bc:03:04:
                    4f:51:14:22:e6:44:4b:64:c0:da:d3:18:72:ad:cc:60:
                    fd:cd:9b:93:39:66:92:4b:2e:a6:1f:f8:b3:c2:93:b7
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        39:7f:3c:9b:d4:58:bd:ae:c4:99:57:19:b2:1a:71:3a:
        9b:97:24:eb:3b:bf:7a:01:c0:7a:88:79:a7:4f:fd:f3:
        68:37:7e:f0:f2:48:20:9b:ac:5c:68:06:86:ac:bf:3b:
        4a:68:07:dc:3b:6e:cd:2a:c1:d0:24:e9:f4:bb:c9:a5:
        d3:e0:a6:07:1b:c6:e3:63:f5:c8:43:89:51:8d:e4:7c:
        e8:80:5b:73:7c:f5:50:7c:a8:35:ff:d5:32:4b:fb:e3:
        f3:a4:e9:95:18:b0:41:ac:5b:b1:23:67:85:d4:0e:1f:
        f4:0a:0c:ec:58:59:94:06:2f:1c:c9:07:d6:7f:51:2f
    Fingerprint (MD5):
        66:58:C2:66:34:5D:6D:02:17:BA:4D:CB:AB:59:71:7E
    Fingerprint (SHA1):
        45:C9:16:49:16:D7:C7:F7:E7:EE:6D:5E:9C:B4:A7:B9:52:A2:F9:88

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3444: AnyPolicy: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.1.0  -t RootCA - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.2.0  -t RootCA
vfychain -d AllDB -pp -vv     -o OID.2.0  User1CA2.der  -t RootCA
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. RootCA [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3445: AnyPolicy: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.2.0  -t RootCA - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.1.0  -t RootCA
vfychain -d AllDB -pp -vv     -o OID.1.0  User2CA2.der  -t RootCA
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. RootCA [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3446: AnyPolicy: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.1.0  -t RootCA - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.2.0  -t RootCA
vfychain -d AllDB -pp -vv     -o OID.2.0  User2CA2.der  -t RootCA
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. RootCA [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3447: AnyPolicy: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.2.0  -t RootCA - PASSED
chains.sh: Verifying certificate(s)  User3CA3.der with flags  -d AllDB    -o OID.1.0  -t RootCA
vfychain -d AllDB -pp -vv     -o OID.1.0  User3CA3.der  -t RootCA
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128110496 (0x433d99a0)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 16:05:13 2012
            Not After : Tue Nov 28 16:05:13 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b1:c5:b8:e7:e6:2e:68:c2:84:52:44:3d:8e:8b:ab:82:
                    6b:63:85:cf:89:ba:1a:a8:f9:0d:49:13:d8:07:09:8a:
                    95:da:87:c6:f0:bc:56:01:24:88:13:fc:8d:18:68:96:
                    45:58:e9:d8:eb:d5:3a:3b:89:8b:79:2b:8f:f3:5b:0c:
                    0e:1f:68:60:5a:b6:31:8b:3e:89:2a:b0:1d:b8:d9:12:
                    d9:b3:83:06:9f:6a:c0:20:1a:80:3c:06:2f:bc:03:04:
                    4f:51:14:22:e6:44:4b:64:c0:da:d3:18:72:ad:cc:60:
                    fd:cd:9b:93:39:66:92:4b:2e:a6:1f:f8:b3:c2:93:b7
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        39:7f:3c:9b:d4:58:bd:ae:c4:99:57:19:b2:1a:71:3a:
        9b:97:24:eb:3b:bf:7a:01:c0:7a:88:79:a7:4f:fd:f3:
        68:37:7e:f0:f2:48:20:9b:ac:5c:68:06:86:ac:bf:3b:
        4a:68:07:dc:3b:6e:cd:2a:c1:d0:24:e9:f4:bb:c9:a5:
        d3:e0:a6:07:1b:c6:e3:63:f5:c8:43:89:51:8d:e4:7c:
        e8:80:5b:73:7c:f5:50:7c:a8:35:ff:d5:32:4b:fb:e3:
        f3:a4:e9:95:18:b0:41:ac:5b:b1:23:67:85:d4:0e:1f:
        f4:0a:0c:ec:58:59:94:06:2f:1c:c9:07:d6:7f:51:2f
    Fingerprint (MD5):
        66:58:C2:66:34:5D:6D:02:17:BA:4D:CB:AB:59:71:7E
    Fingerprint (SHA1):
        45:C9:16:49:16:D7:C7:F7:E7:EE:6D:5E:9C:B4:A7:B9:52:A2:F9:88

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User3 EE,O=User3,C=US"
Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3448: AnyPolicy: Verifying certificate(s)  User3CA3.der with flags  -d AllDB    -o OID.1.0  -t RootCA - PASSED
chains.sh: Verifying certificate(s)  User3CA3.der with flags  -d AllDB    -o OID.2.0  -t RootCA
vfychain -d AllDB -pp -vv     -o OID.2.0  User3CA3.der  -t RootCA
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. RootCA [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3449: AnyPolicy: Verifying certificate(s)  User3CA3.der with flags  -d AllDB    -o OID.2.0  -t RootCA - PASSED
chains.sh: Creating DB RootCADB
certutil -N -d RootCADB -f RootCADB/dbpasswd
chains.sh: #3450: AnyPolicyWithLevel: Creating DB RootCADB  - PASSED
chains.sh: Creating Root CA RootCA
certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA  -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1128110503 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3451: AnyPolicyWithLevel: Creating Root CA RootCA  - PASSED
chains.sh: Exporting Root CA RootCA.der
certutil -L -d RootCADB -r -n RootCA -o RootCA.der
chains.sh: #3452: AnyPolicyWithLevel: Exporting Root CA RootCA.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #3453: AnyPolicyWithLevel: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3454: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1RootCA.der signed by RootCA
certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1128110504   --extCP --extIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
any
1

n
n
n
1
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter the number of certs in the path permitted to use anyPolicy.
(press Enter for 0) > Is this a critical extension [y/N]?
chains.sh: #3455: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA  - PASSED
chains.sh: Importing certificate CA1RootCA.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der
chains.sh: #3456: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database  - PASSED
chains.sh: Creating DB CA12DB
certutil -N -d CA12DB -f CA12DB/dbpasswd
chains.sh: #3457: AnyPolicyWithLevel: Creating DB CA12DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA12Req.der
certutil -s "CN=CA12 Intermediate, O=CA12, C=US"  -R -2 -d CA12DB -f CA12DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA12Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3458: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der  - PASSED
chains.sh: Creating certficate CA12CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 1128110505   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3459: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA12CA1.der to CA12DB database
certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der
chains.sh: #3460: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database  - PASSED
chains.sh: Creating DB CA13DB
certutil -N -d CA13DB -f CA13DB/dbpasswd
chains.sh: #3461: AnyPolicyWithLevel: Creating DB CA13DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA13Req.der
certutil -s "CN=CA13 Intermediate, O=CA13, C=US"  -R -2 -d CA13DB -f CA13DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA13Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3462: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der  - PASSED
chains.sh: Creating certficate CA13CA12.der signed by CA12
certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 1128110506   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3463: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12  - PASSED
chains.sh: Importing certificate CA13CA12.der to CA13DB database
certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der
chains.sh: #3464: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #3465: AnyPolicyWithLevel: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3466: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA13.der signed by CA13
certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 1128110507   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3467: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13  - PASSED
chains.sh: Importing certificate EE1CA13.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der
chains.sh: #3468: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database  - PASSED
chains.sh: Creating DB CA22DB
certutil -N -d CA22DB -f CA22DB/dbpasswd
chains.sh: #3469: AnyPolicyWithLevel: Creating DB CA22DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA22Req.der
certutil -s "CN=CA22 Intermediate, O=CA22, C=US"  -R -2 -d CA22DB -f CA22DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA22Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3470: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der  - PASSED
chains.sh: Creating certficate CA22CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 1128110508   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3471: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA22CA1.der to CA22DB database
certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der
chains.sh: #3472: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database  - PASSED
chains.sh: Creating DB CA23DB
certutil -N -d CA23DB -f CA23DB/dbpasswd
chains.sh: #3473: AnyPolicyWithLevel: Creating DB CA23DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA23Req.der
certutil -s "CN=CA23 Intermediate, O=CA23, C=US"  -R -2 -d CA23DB -f CA23DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA23Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3474: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der  - PASSED
chains.sh: Creating certficate CA23CA22.der signed by CA22
certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 1128110509   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3475: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22  - PASSED
chains.sh: Importing certificate CA23CA22.der to CA23DB database
certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der
chains.sh: #3476: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database  - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #3477: AnyPolicyWithLevel: Creating DB EE2DB  - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US"  -R  -d EE2DB -f EE2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3478: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der  - PASSED
chains.sh: Creating certficate EE2CA23.der signed by CA23
certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 1128110510   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3479: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23  - PASSED
chains.sh: Importing certificate EE2CA23.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der
chains.sh: #3480: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database  - PASSED
chains.sh: Creating DB CA32DB
certutil -N -d CA32DB -f CA32DB/dbpasswd
chains.sh: #3481: AnyPolicyWithLevel: Creating DB CA32DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA32Req.der
certutil -s "CN=CA32 Intermediate, O=CA32, C=US"  -R -2 -d CA32DB -f CA32DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA32Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3482: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der  - PASSED
chains.sh: Creating certficate CA32CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 1128110511   --extCP --extIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
any
1

n
n
n
1
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter the number of certs in the path permitted to use anyPolicy.
(press Enter for 0) > Is this a critical extension [y/N]?
chains.sh: #3483: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA32CA1.der to CA32DB database
certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der
chains.sh: #3484: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database  - PASSED
chains.sh: Creating DB CA33DB
certutil -N -d CA33DB -f CA33DB/dbpasswd
chains.sh: #3485: AnyPolicyWithLevel: Creating DB CA33DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA33Req.der
certutil -s "CN=CA33 Intermediate, O=CA33, C=US"  -R -2 -d CA33DB -f CA33DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA33Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3486: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der  - PASSED
chains.sh: Creating certficate CA33CA32.der signed by CA32
certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 1128110512   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3487: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32  - PASSED
chains.sh: Importing certificate CA33CA32.der to CA33DB database
certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der
chains.sh: #3488: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database  - PASSED
chains.sh: Creating DB EE3DB
certutil -N -d EE3DB -f EE3DB/dbpasswd
chains.sh: #3489: AnyPolicyWithLevel: Creating DB EE3DB  - PASSED
chains.sh: Creating EE certifiate request EE3Req.der
certutil -s "CN=EE3 EE, O=EE3, C=US"  -R  -d EE3DB -f EE3DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE3Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3490: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der  - PASSED
chains.sh: Creating certficate EE3CA33.der signed by CA33
certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 1128110513   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3491: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33  - PASSED
chains.sh: Importing certificate EE3CA33.der to EE3DB database
certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der
chains.sh: #3492: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database  - PASSED
chains.sh: Creating DB CA42DB
certutil -N -d CA42DB -f CA42DB/dbpasswd
chains.sh: #3493: AnyPolicyWithLevel: Creating DB CA42DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA42Req.der
certutil -s "CN=CA42 Intermediate, O=CA42, C=US"  -R -2 -d CA42DB -f CA42DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA42Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3494: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der  - PASSED
chains.sh: Creating certficate CA42CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 1128110514   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
any
1

n
y
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3495: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA42CA1.der to CA42DB database
certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der
chains.sh: #3496: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database  - PASSED
chains.sh: Creating DB CA43DB
certutil -N -d CA43DB -f CA43DB/dbpasswd
chains.sh: #3497: AnyPolicyWithLevel: Creating DB CA43DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA43Req.der
certutil -s "CN=CA43 Intermediate, O=CA43, C=US"  -R -2 -d CA43DB -f CA43DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA43Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3498: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der  - PASSED
chains.sh: Creating certficate CA43CA42.der signed by CA42
certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 1128110515   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
any
1

n
y
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3499: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42  - PASSED
chains.sh: Importing certificate CA43CA42.der to CA43DB database
certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der
chains.sh: #3500: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database  - PASSED
chains.sh: Creating DB EE4DB
certutil -N -d EE4DB -f EE4DB/dbpasswd
chains.sh: #3501: AnyPolicyWithLevel: Creating DB EE4DB  - PASSED
chains.sh: Creating EE certifiate request EE4Req.der
certutil -s "CN=EE4 EE, O=EE4, C=US"  -R  -d EE4DB -f EE4DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE4Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3502: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der  - PASSED
chains.sh: Creating certficate EE4CA43.der signed by CA43
certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 1128110516   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3503: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43  - PASSED
chains.sh: Importing certificate EE4CA43.der to EE4DB database
certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der
chains.sh: #3504: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database  - PASSED
chains.sh: Creating DB CA52DB
certutil -N -d CA52DB -f CA52DB/dbpasswd
chains.sh: #3505: AnyPolicyWithLevel: Creating DB CA52DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA52Req.der
certutil -s "CN=CA52 Intermediate, O=CA52, C=US"  -R -2 -d CA52DB -f CA52DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA52Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3506: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der  - PASSED
chains.sh: Creating certficate CA52CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 1128110517   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
any
1

n
y
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3507: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA52CA1.der to CA52DB database
certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der
chains.sh: #3508: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database  - PASSED
chains.sh: Creating DB CA53DB
certutil -N -d CA53DB -f CA53DB/dbpasswd
chains.sh: #3509: AnyPolicyWithLevel: Creating DB CA53DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA53Req.der
certutil -s "CN=CA53 Intermediate, O=CA53, C=US"  -R -2 -d CA53DB -f CA53DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA53Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3510: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der  - PASSED
chains.sh: Creating certficate CA53CA52.der signed by CA52
certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 1128110518   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3511: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52  - PASSED
chains.sh: Importing certificate CA53CA52.der to CA53DB database
certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der
chains.sh: #3512: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database  - PASSED
chains.sh: Creating DB EE5DB
certutil -N -d EE5DB -f EE5DB/dbpasswd
chains.sh: #3513: AnyPolicyWithLevel: Creating DB EE5DB  - PASSED
chains.sh: Creating EE certifiate request EE5Req.der
certutil -s "CN=EE5 EE, O=EE5, C=US"  -R  -d EE5DB -f EE5DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE5Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3514: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der  - PASSED
chains.sh: Creating certficate EE5CA53.der signed by CA53
certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 1128110519   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3515: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53  - PASSED
chains.sh: Importing certificate EE5CA53.der to EE5DB database
certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der
chains.sh: #3516: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database  - PASSED
chains.sh: Creating DB CA61DB
certutil -N -d CA61DB -f CA61DB/dbpasswd
chains.sh: #3517: AnyPolicyWithLevel: Creating DB CA61DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA61Req.der
certutil -s "CN=CA61 Intermediate, O=CA61, C=US"  -R -2 -d CA61DB -f CA61DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA61Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3518: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der  - PASSED
chains.sh: Creating certficate CA61RootCA.der signed by RootCA
certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 1128110520   --extCP --extIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
any
1

n
n
n
5
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter the number of certs in the path permitted to use anyPolicy.
(press Enter for 0) > Is this a critical extension [y/N]?
chains.sh: #3519: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA  - PASSED
chains.sh: Importing certificate CA61RootCA.der to CA61DB database
certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der
chains.sh: #3520: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database  - PASSED
chains.sh: Creating DB CA62DB
certutil -N -d CA62DB -f CA62DB/dbpasswd
chains.sh: #3521: AnyPolicyWithLevel: Creating DB CA62DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA62Req.der
certutil -s "CN=CA62 Intermediate, O=CA62, C=US"  -R -2 -d CA62DB -f CA62DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA62Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3522: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der  - PASSED
chains.sh: Creating certficate CA62CA61.der signed by CA61
certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 1128110521   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3523: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61  - PASSED
chains.sh: Importing certificate CA62CA61.der to CA62DB database
certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der
chains.sh: #3524: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database  - PASSED
chains.sh: Creating DB EE62DB
certutil -N -d EE62DB -f EE62DB/dbpasswd
chains.sh: #3525: AnyPolicyWithLevel: Creating DB EE62DB  - PASSED
chains.sh: Creating EE certifiate request EE62Req.der
certutil -s "CN=EE62 EE, O=EE62, C=US"  -R  -d EE62DB -f EE62DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE62Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3526: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der  - PASSED
chains.sh: Creating certficate EE62CA62.der signed by CA62
certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 1128110522   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3527: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62  - PASSED
chains.sh: Importing certificate EE62CA62.der to EE62DB database
certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der
chains.sh: #3528: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database  - PASSED
chains.sh: Creating DB CA63DB
certutil -N -d CA63DB -f CA63DB/dbpasswd
chains.sh: #3529: AnyPolicyWithLevel: Creating DB CA63DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA63Req.der
certutil -s "CN=CA63 Intermediate, O=CA63, C=US"  -R -2 -d CA63DB -f CA63DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA63Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3530: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der  - PASSED
chains.sh: Creating certficate CA63CA62.der signed by CA62
certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 1128110523   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3531: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62  - PASSED
chains.sh: Importing certificate CA63CA62.der to CA63DB database
certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der
chains.sh: #3532: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database  - PASSED
chains.sh: Creating DB EE63DB
certutil -N -d EE63DB -f EE63DB/dbpasswd
chains.sh: #3533: AnyPolicyWithLevel: Creating DB EE63DB  - PASSED
chains.sh: Creating EE certifiate request EE63Req.der
certutil -s "CN=EE63 EE, O=EE63, C=US"  -R  -d EE63DB -f EE63DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE63Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3534: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der  - PASSED
chains.sh: Creating certficate EE63CA63.der signed by CA63
certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 1128110524   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3535: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63  - PASSED
chains.sh: Importing certificate EE63CA63.der to EE63DB database
certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der
chains.sh: #3536: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database  - PASSED
chains.sh: Creating DB CA64DB
certutil -N -d CA64DB -f CA64DB/dbpasswd
chains.sh: #3537: AnyPolicyWithLevel: Creating DB CA64DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA64Req.der
certutil -s "CN=CA64 Intermediate, O=CA64, C=US"  -R -2 -d CA64DB -f CA64DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA64Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3538: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der  - PASSED
chains.sh: Creating certficate CA64CA63.der signed by CA63
certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 1128110525   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3539: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63  - PASSED
chains.sh: Importing certificate CA64CA63.der to CA64DB database
certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der
chains.sh: #3540: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database  - PASSED
chains.sh: Creating DB EE64DB
certutil -N -d EE64DB -f EE64DB/dbpasswd
chains.sh: #3541: AnyPolicyWithLevel: Creating DB EE64DB  - PASSED
chains.sh: Creating EE certifiate request EE64Req.der
certutil -s "CN=EE64 EE, O=EE64, C=US"  -R  -d EE64DB -f EE64DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE64Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3542: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der  - PASSED
chains.sh: Creating certficate EE64CA64.der signed by CA64
certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 1128110526   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3543: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64  - PASSED
chains.sh: Importing certificate EE64CA64.der to EE64DB database
certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der
chains.sh: #3544: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database  - PASSED
chains.sh: Creating DB CA65DB
certutil -N -d CA65DB -f CA65DB/dbpasswd
chains.sh: #3545: AnyPolicyWithLevel: Creating DB CA65DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA65Req.der
certutil -s "CN=CA65 Intermediate, O=CA65, C=US"  -R -2 -d CA65DB -f CA65DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA65Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3546: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der  - PASSED
chains.sh: Creating certficate CA65CA64.der signed by CA64
certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 1128110527   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3547: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64  - PASSED
chains.sh: Importing certificate CA65CA64.der to CA65DB database
certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der
chains.sh: #3548: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database  - PASSED
chains.sh: Creating DB EE65DB
certutil -N -d EE65DB -f EE65DB/dbpasswd
chains.sh: #3549: AnyPolicyWithLevel: Creating DB EE65DB  - PASSED
chains.sh: Creating EE certifiate request EE65Req.der
certutil -s "CN=EE65 EE, O=EE65, C=US"  -R  -d EE65DB -f EE65DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE65Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3550: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der  - PASSED
chains.sh: Creating certficate EE65CA65.der signed by CA65
certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 1128110528   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3551: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65  - PASSED
chains.sh: Importing certificate EE65CA65.der to EE65DB database
certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der
chains.sh: #3552: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database  - PASSED
chains.sh: Creating DB CA66DB
certutil -N -d CA66DB -f CA66DB/dbpasswd
chains.sh: #3553: AnyPolicyWithLevel: Creating DB CA66DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA66Req.der
certutil -s "CN=CA66 Intermediate, O=CA66, C=US"  -R -2 -d CA66DB -f CA66DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA66Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3554: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der  - PASSED
chains.sh: Creating certficate CA66CA65.der signed by CA65
certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 1128110529   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3555: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65  - PASSED
chains.sh: Importing certificate CA66CA65.der to CA66DB database
certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der
chains.sh: #3556: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database  - PASSED
chains.sh: Creating DB EE66DB
certutil -N -d EE66DB -f EE66DB/dbpasswd
chains.sh: #3557: AnyPolicyWithLevel: Creating DB EE66DB  - PASSED
chains.sh: Creating EE certifiate request EE66Req.der
certutil -s "CN=EE66 EE, O=EE66, C=US"  -R  -d EE66DB -f EE66DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE66Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3558: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der  - PASSED
chains.sh: Creating certficate EE66CA66.der signed by CA66
certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 1128110530   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3559: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66  - PASSED
chains.sh: Importing certificate EE66CA66.der to EE66DB database
certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der
chains.sh: #3560: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database  - PASSED
chains.sh: Creating DB CA67DB
certutil -N -d CA67DB -f CA67DB/dbpasswd
chains.sh: #3561: AnyPolicyWithLevel: Creating DB CA67DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA67Req.der
certutil -s "CN=CA67 Intermediate, O=CA67, C=US"  -R -2 -d CA67DB -f CA67DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA67Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3562: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der  - PASSED
chains.sh: Creating certficate CA67CA66.der signed by CA66
certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 1128110531   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3563: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66  - PASSED
chains.sh: Importing certificate CA67CA66.der to CA67DB database
certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der
chains.sh: #3564: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database  - PASSED
chains.sh: Creating DB EE67DB
certutil -N -d EE67DB -f EE67DB/dbpasswd
chains.sh: #3565: AnyPolicyWithLevel: Creating DB EE67DB  - PASSED
chains.sh: Creating EE certifiate request EE67Req.der
certutil -s "CN=EE67 EE, O=EE67, C=US"  -R  -d EE67DB -f EE67DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE67Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3566: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der  - PASSED
chains.sh: Creating certficate EE67CA67.der signed by CA67
certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 1128110532   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3567: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67  - PASSED
chains.sh: Importing certificate EE67CA67.der to EE67DB database
certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der
chains.sh: #3568: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #3569: AnyPolicyWithLevel: Creating DB AllDB  - PASSED
chains.sh: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128110503 (0x433d99a7)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 16:05:16 2012
            Not After : Tue Nov 28 16:05:16 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a8:60:be:44:23:69:2c:55:83:90:e5:25:fc:9b:a3:7b:
                    26:e0:27:06:7e:4e:ba:79:4a:7d:d3:c3:ca:52:3e:3f:
                    30:ac:ef:24:23:86:11:d8:fc:de:61:41:2c:7b:0a:88:
                    ba:24:94:c2:a5:f2:02:75:8b:f7:f4:6e:c3:05:5b:7e:
                    65:6c:ae:d7:7c:49:f9:08:bc:cd:50:da:c6:ff:08:93:
                    e9:db:d1:e8:1a:2f:6f:b2:05:33:04:60:f0:c3:42:65:
                    46:14:d6:5f:ad:50:e8:51:2d:30:a6:d5:60:07:bf:12:
                    b1:f1:1b:f4:81:1f:01:08:84:7f:86:77:d9:98:69:e1
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        71:94:2b:b2:47:7f:c9:e0:05:8b:5d:67:7d:47:b1:f1:
        5f:9d:7c:b9:8c:95:72:a6:d7:61:d7:0a:41:d7:d6:12:
        5f:ed:95:ee:21:e4:5f:65:2e:23:3e:11:38:da:71:f0:
        ba:6c:3a:52:65:a9:f7:69:3f:32:df:e8:0d:02:b7:e3:
        3f:b8:ae:e1:9c:c4:bd:76:38:12:89:9e:6d:0e:5c:d8:
        1b:56:ab:3e:1e:e9:25:f2:ba:b0:ce:00:f5:2a:74:ca:
        f0:f2:42:8e:c1:08:4f:fe:ab:79:06:76:c7:26:cd:12:
        c8:45:74:59:89:99:3a:9e:3c:6d:f4:ea:03:30:a6:80
    Fingerprint (MD5):
        7E:E3:E3:FE:31:89:F8:C1:88:E4:C0:86:AB:E4:2A:88
    Fingerprint (SHA1):
        4C:6E:61:7F:98:52:2F:66:18:DC:78:B7:00:36:3E:01:35:18:5A:AD


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US"
Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3570: AnyPolicyWithLevel: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.0  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3571: AnyPolicyWithLevel: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.5.29.32.0  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128110503 (0x433d99a7)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 16:05:16 2012
            Not After : Tue Nov 28 16:05:16 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a8:60:be:44:23:69:2c:55:83:90:e5:25:fc:9b:a3:7b:
                    26:e0:27:06:7e:4e:ba:79:4a:7d:d3:c3:ca:52:3e:3f:
                    30:ac:ef:24:23:86:11:d8:fc:de:61:41:2c:7b:0a:88:
                    ba:24:94:c2:a5:f2:02:75:8b:f7:f4:6e:c3:05:5b:7e:
                    65:6c:ae:d7:7c:49:f9:08:bc:cd:50:da:c6:ff:08:93:
                    e9:db:d1:e8:1a:2f:6f:b2:05:33:04:60:f0:c3:42:65:
                    46:14:d6:5f:ad:50:e8:51:2d:30:a6:d5:60:07:bf:12:
                    b1:f1:1b:f4:81:1f:01:08:84:7f:86:77:d9:98:69:e1
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        71:94:2b:b2:47:7f:c9:e0:05:8b:5d:67:7d:47:b1:f1:
        5f:9d:7c:b9:8c:95:72:a6:d7:61:d7:0a:41:d7:d6:12:
        5f:ed:95:ee:21:e4:5f:65:2e:23:3e:11:38:da:71:f0:
        ba:6c:3a:52:65:a9:f7:69:3f:32:df:e8:0d:02:b7:e3:
        3f:b8:ae:e1:9c:c4:bd:76:38:12:89:9e:6d:0e:5c:d8:
        1b:56:ab:3e:1e:e9:25:f2:ba:b0:ce:00:f5:2a:74:ca:
        f0:f2:42:8e:c1:08:4f:fe:ab:79:06:76:c7:26:cd:12:
        c8:45:74:59:89:99:3a:9e:3c:6d:f4:ea:03:30:a6:80
    Fingerprint (MD5):
        7E:E3:E3:FE:31:89:F8:C1:88:E4:C0:86:AB:E4:2A:88
    Fingerprint (SHA1):
        4C:6E:61:7F:98:52:2F:66:18:DC:78:B7:00:36:3E:01:35:18:5A:AD


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US"
Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3572: AnyPolicyWithLevel: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3573: AnyPolicyWithLevel: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.0  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3574: AnyPolicyWithLevel: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.5.29.32.0  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3575: AnyPolicyWithLevel: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags  -d AllDB     -t RootCA.der
vfychain -d AllDB -pp -vv      EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128110503 (0x433d99a7)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 16:05:16 2012
            Not After : Tue Nov 28 16:05:16 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a8:60:be:44:23:69:2c:55:83:90:e5:25:fc:9b:a3:7b:
                    26:e0:27:06:7e:4e:ba:79:4a:7d:d3:c3:ca:52:3e:3f:
                    30:ac:ef:24:23:86:11:d8:fc:de:61:41:2c:7b:0a:88:
                    ba:24:94:c2:a5:f2:02:75:8b:f7:f4:6e:c3:05:5b:7e:
                    65:6c:ae:d7:7c:49:f9:08:bc:cd:50:da:c6:ff:08:93:
                    e9:db:d1:e8:1a:2f:6f:b2:05:33:04:60:f0:c3:42:65:
                    46:14:d6:5f:ad:50:e8:51:2d:30:a6:d5:60:07:bf:12:
                    b1:f1:1b:f4:81:1f:01:08:84:7f:86:77:d9:98:69:e1
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        71:94:2b:b2:47:7f:c9:e0:05:8b:5d:67:7d:47:b1:f1:
        5f:9d:7c:b9:8c:95:72:a6:d7:61:d7:0a:41:d7:d6:12:
        5f:ed:95:ee:21:e4:5f:65:2e:23:3e:11:38:da:71:f0:
        ba:6c:3a:52:65:a9:f7:69:3f:32:df:e8:0d:02:b7:e3:
        3f:b8:ae:e1:9c:c4:bd:76:38:12:89:9e:6d:0e:5c:d8:
        1b:56:ab:3e:1e:e9:25:f2:ba:b0:ce:00:f5:2a:74:ca:
        f0:f2:42:8e:c1:08:4f:fe:ab:79:06:76:c7:26:cd:12:
        c8:45:74:59:89:99:3a:9e:3c:6d:f4:ea:03:30:a6:80
    Fingerprint (MD5):
        7E:E3:E3:FE:31:89:F8:C1:88:E4:C0:86:AB:E4:2A:88
    Fingerprint (SHA1):
        4C:6E:61:7F:98:52:2F:66:18:DC:78:B7:00:36:3E:01:35:18:5A:AD


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US"
Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3576: AnyPolicyWithLevel: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags  -d AllDB     -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3577: AnyPolicyWithLevel: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.0  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3578: AnyPolicyWithLevel: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.5.29.32.0  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3579: AnyPolicyWithLevel: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags  -d AllDB     -t RootCA.der
vfychain -d AllDB -pp -vv      EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128110503 (0x433d99a7)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 16:05:16 2012
            Not After : Tue Nov 28 16:05:16 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a8:60:be:44:23:69:2c:55:83:90:e5:25:fc:9b:a3:7b:
                    26:e0:27:06:7e:4e:ba:79:4a:7d:d3:c3:ca:52:3e:3f:
                    30:ac:ef:24:23:86:11:d8:fc:de:61:41:2c:7b:0a:88:
                    ba:24:94:c2:a5:f2:02:75:8b:f7:f4:6e:c3:05:5b:7e:
                    65:6c:ae:d7:7c:49:f9:08:bc:cd:50:da:c6:ff:08:93:
                    e9:db:d1:e8:1a:2f:6f:b2:05:33:04:60:f0:c3:42:65:
                    46:14:d6:5f:ad:50:e8:51:2d:30:a6:d5:60:07:bf:12:
                    b1:f1:1b:f4:81:1f:01:08:84:7f:86:77:d9:98:69:e1
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        71:94:2b:b2:47:7f:c9:e0:05:8b:5d:67:7d:47:b1:f1:
        5f:9d:7c:b9:8c:95:72:a6:d7:61:d7:0a:41:d7:d6:12:
        5f:ed:95:ee:21:e4:5f:65:2e:23:3e:11:38:da:71:f0:
        ba:6c:3a:52:65:a9:f7:69:3f:32:df:e8:0d:02:b7:e3:
        3f:b8:ae:e1:9c:c4:bd:76:38:12:89:9e:6d:0e:5c:d8:
        1b:56:ab:3e:1e:e9:25:f2:ba:b0:ce:00:f5:2a:74:ca:
        f0:f2:42:8e:c1:08:4f:fe:ab:79:06:76:c7:26:cd:12:
        c8:45:74:59:89:99:3a:9e:3c:6d:f4:ea:03:30:a6:80
    Fingerprint (MD5):
        7E:E3:E3:FE:31:89:F8:C1:88:E4:C0:86:AB:E4:2A:88
    Fingerprint (SHA1):
        4C:6E:61:7F:98:52:2F:66:18:DC:78:B7:00:36:3E:01:35:18:5A:AD


Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US"
Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US"
Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3580: AnyPolicyWithLevel: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags  -d AllDB     -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128110503 (0x433d99a7)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 16:05:16 2012
            Not After : Tue Nov 28 16:05:16 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a8:60:be:44:23:69:2c:55:83:90:e5:25:fc:9b:a3:7b:
                    26:e0:27:06:7e:4e:ba:79:4a:7d:d3:c3:ca:52:3e:3f:
                    30:ac:ef:24:23:86:11:d8:fc:de:61:41:2c:7b:0a:88:
                    ba:24:94:c2:a5:f2:02:75:8b:f7:f4:6e:c3:05:5b:7e:
                    65:6c:ae:d7:7c:49:f9:08:bc:cd:50:da:c6:ff:08:93:
                    e9:db:d1:e8:1a:2f:6f:b2:05:33:04:60:f0:c3:42:65:
                    46:14:d6:5f:ad:50:e8:51:2d:30:a6:d5:60:07:bf:12:
                    b1:f1:1b:f4:81:1f:01:08:84:7f:86:77:d9:98:69:e1
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        71:94:2b:b2:47:7f:c9:e0:05:8b:5d:67:7d:47:b1:f1:
        5f:9d:7c:b9:8c:95:72:a6:d7:61:d7:0a:41:d7:d6:12:
        5f:ed:95:ee:21:e4:5f:65:2e:23:3e:11:38:da:71:f0:
        ba:6c:3a:52:65:a9:f7:69:3f:32:df:e8:0d:02:b7:e3:
        3f:b8:ae:e1:9c:c4:bd:76:38:12:89:9e:6d:0e:5c:d8:
        1b:56:ab:3e:1e:e9:25:f2:ba:b0:ce:00:f5:2a:74:ca:
        f0:f2:42:8e:c1:08:4f:fe:ab:79:06:76:c7:26:cd:12:
        c8:45:74:59:89:99:3a:9e:3c:6d:f4:ea:03:30:a6:80
    Fingerprint (MD5):
        7E:E3:E3:FE:31:89:F8:C1:88:E4:C0:86:AB:E4:2A:88
    Fingerprint (SHA1):
        4C:6E:61:7F:98:52:2F:66:18:DC:78:B7:00:36:3E:01:35:18:5A:AD


Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US"
Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US"
Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3581: AnyPolicyWithLevel: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.0  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3582: AnyPolicyWithLevel: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.5.29.32.0  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128110503 (0x433d99a7)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 16:05:16 2012
            Not After : Tue Nov 28 16:05:16 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a8:60:be:44:23:69:2c:55:83:90:e5:25:fc:9b:a3:7b:
                    26:e0:27:06:7e:4e:ba:79:4a:7d:d3:c3:ca:52:3e:3f:
                    30:ac:ef:24:23:86:11:d8:fc:de:61:41:2c:7b:0a:88:
                    ba:24:94:c2:a5:f2:02:75:8b:f7:f4:6e:c3:05:5b:7e:
                    65:6c:ae:d7:7c:49:f9:08:bc:cd:50:da:c6:ff:08:93:
                    e9:db:d1:e8:1a:2f:6f:b2:05:33:04:60:f0:c3:42:65:
                    46:14:d6:5f:ad:50:e8:51:2d:30:a6:d5:60:07:bf:12:
                    b1:f1:1b:f4:81:1f:01:08:84:7f:86:77:d9:98:69:e1
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        71:94:2b:b2:47:7f:c9:e0:05:8b:5d:67:7d:47:b1:f1:
        5f:9d:7c:b9:8c:95:72:a6:d7:61:d7:0a:41:d7:d6:12:
        5f:ed:95:ee:21:e4:5f:65:2e:23:3e:11:38:da:71:f0:
        ba:6c:3a:52:65:a9:f7:69:3f:32:df:e8:0d:02:b7:e3:
        3f:b8:ae:e1:9c:c4:bd:76:38:12:89:9e:6d:0e:5c:d8:
        1b:56:ab:3e:1e:e9:25:f2:ba:b0:ce:00:f5:2a:74:ca:
        f0:f2:42:8e:c1:08:4f:fe:ab:79:06:76:c7:26:cd:12:
        c8:45:74:59:89:99:3a:9e:3c:6d:f4:ea:03:30:a6:80
    Fingerprint (MD5):
        7E:E3:E3:FE:31:89:F8:C1:88:E4:C0:86:AB:E4:2A:88
    Fingerprint (SHA1):
        4C:6E:61:7F:98:52:2F:66:18:DC:78:B7:00:36:3E:01:35:18:5A:AD


Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US"
Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US"
Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3583: AnyPolicyWithLevel: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3584: AnyPolicyWithLevel: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.0  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3585: AnyPolicyWithLevel: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.5.29.32.0  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3586: AnyPolicyWithLevel: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags  -d AllDB     -t RootCA.der
vfychain -d AllDB -pp -vv      EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128110503 (0x433d99a7)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 16:05:16 2012
            Not After : Tue Nov 28 16:05:16 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a8:60:be:44:23:69:2c:55:83:90:e5:25:fc:9b:a3:7b:
                    26:e0:27:06:7e:4e:ba:79:4a:7d:d3:c3:ca:52:3e:3f:
                    30:ac:ef:24:23:86:11:d8:fc:de:61:41:2c:7b:0a:88:
                    ba:24:94:c2:a5:f2:02:75:8b:f7:f4:6e:c3:05:5b:7e:
                    65:6c:ae:d7:7c:49:f9:08:bc:cd:50:da:c6:ff:08:93:
                    e9:db:d1:e8:1a:2f:6f:b2:05:33:04:60:f0:c3:42:65:
                    46:14:d6:5f:ad:50:e8:51:2d:30:a6:d5:60:07:bf:12:
                    b1:f1:1b:f4:81:1f:01:08:84:7f:86:77:d9:98:69:e1
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        71:94:2b:b2:47:7f:c9:e0:05:8b:5d:67:7d:47:b1:f1:
        5f:9d:7c:b9:8c:95:72:a6:d7:61:d7:0a:41:d7:d6:12:
        5f:ed:95:ee:21:e4:5f:65:2e:23:3e:11:38:da:71:f0:
        ba:6c:3a:52:65:a9:f7:69:3f:32:df:e8:0d:02:b7:e3:
        3f:b8:ae:e1:9c:c4:bd:76:38:12:89:9e:6d:0e:5c:d8:
        1b:56:ab:3e:1e:e9:25:f2:ba:b0:ce:00:f5:2a:74:ca:
        f0:f2:42:8e:c1:08:4f:fe:ab:79:06:76:c7:26:cd:12:
        c8:45:74:59:89:99:3a:9e:3c:6d:f4:ea:03:30:a6:80
    Fingerprint (MD5):
        7E:E3:E3:FE:31:89:F8:C1:88:E4:C0:86:AB:E4:2A:88
    Fingerprint (SHA1):
        4C:6E:61:7F:98:52:2F:66:18:DC:78:B7:00:36:3E:01:35:18:5A:AD


Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US"
Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US"
Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3587: AnyPolicyWithLevel: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags  -d AllDB     -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128110503 (0x433d99a7)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 16:05:16 2012
            Not After : Tue Nov 28 16:05:16 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a8:60:be:44:23:69:2c:55:83:90:e5:25:fc:9b:a3:7b:
                    26:e0:27:06:7e:4e:ba:79:4a:7d:d3:c3:ca:52:3e:3f:
                    30:ac:ef:24:23:86:11:d8:fc:de:61:41:2c:7b:0a:88:
                    ba:24:94:c2:a5:f2:02:75:8b:f7:f4:6e:c3:05:5b:7e:
                    65:6c:ae:d7:7c:49:f9:08:bc:cd:50:da:c6:ff:08:93:
                    e9:db:d1:e8:1a:2f:6f:b2:05:33:04:60:f0:c3:42:65:
                    46:14:d6:5f:ad:50:e8:51:2d:30:a6:d5:60:07:bf:12:
                    b1:f1:1b:f4:81:1f:01:08:84:7f:86:77:d9:98:69:e1
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        71:94:2b:b2:47:7f:c9:e0:05:8b:5d:67:7d:47:b1:f1:
        5f:9d:7c:b9:8c:95:72:a6:d7:61:d7:0a:41:d7:d6:12:
        5f:ed:95:ee:21:e4:5f:65:2e:23:3e:11:38:da:71:f0:
        ba:6c:3a:52:65:a9:f7:69:3f:32:df:e8:0d:02:b7:e3:
        3f:b8:ae:e1:9c:c4:bd:76:38:12:89:9e:6d:0e:5c:d8:
        1b:56:ab:3e:1e:e9:25:f2:ba:b0:ce:00:f5:2a:74:ca:
        f0:f2:42:8e:c1:08:4f:fe:ab:79:06:76:c7:26:cd:12:
        c8:45:74:59:89:99:3a:9e:3c:6d:f4:ea:03:30:a6:80
    Fingerprint (MD5):
        7E:E3:E3:FE:31:89:F8:C1:88:E4:C0:86:AB:E4:2A:88
    Fingerprint (SHA1):
        4C:6E:61:7F:98:52:2F:66:18:DC:78:B7:00:36:3E:01:35:18:5A:AD


Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US"
Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US"
Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US"
Returned value is 0, expected result is pass
chains.sh: #3588: AnyPolicyWithLevel: Verifying certificate(s)  EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128110503 (0x433d99a7)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 16:05:16 2012
            Not After : Tue Nov 28 16:05:16 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a8:60:be:44:23:69:2c:55:83:90:e5:25:fc:9b:a3:7b:
                    26:e0:27:06:7e:4e:ba:79:4a:7d:d3:c3:ca:52:3e:3f:
                    30:ac:ef:24:23:86:11:d8:fc:de:61:41:2c:7b:0a:88:
                    ba:24:94:c2:a5:f2:02:75:8b:f7:f4:6e:c3:05:5b:7e:
                    65:6c:ae:d7:7c:49:f9:08:bc:cd:50:da:c6:ff:08:93:
                    e9:db:d1:e8:1a:2f:6f:b2:05:33:04:60:f0:c3:42:65:
                    46:14:d6:5f:ad:50:e8:51:2d:30:a6:d5:60:07:bf:12:
                    b1:f1:1b:f4:81:1f:01:08:84:7f:86:77:d9:98:69:e1
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        71:94:2b:b2:47:7f:c9:e0:05:8b:5d:67:7d:47:b1:f1:
        5f:9d:7c:b9:8c:95:72:a6:d7:61:d7:0a:41:d7:d6:12:
        5f:ed:95:ee:21:e4:5f:65:2e:23:3e:11:38:da:71:f0:
        ba:6c:3a:52:65:a9:f7:69:3f:32:df:e8:0d:02:b7:e3:
        3f:b8:ae:e1:9c:c4:bd:76:38:12:89:9e:6d:0e:5c:d8:
        1b:56:ab:3e:1e:e9:25:f2:ba:b0:ce:00:f5:2a:74:ca:
        f0:f2:42:8e:c1:08:4f:fe:ab:79:06:76:c7:26:cd:12:
        c8:45:74:59:89:99:3a:9e:3c:6d:f4:ea:03:30:a6:80
    Fingerprint (MD5):
        7E:E3:E3:FE:31:89:F8:C1:88:E4:C0:86:AB:E4:2A:88
    Fingerprint (SHA1):
        4C:6E:61:7F:98:52:2F:66:18:DC:78:B7:00:36:3E:01:35:18:5A:AD


Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US"
Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US"
Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US"
Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US"
Returned value is 0, expected result is pass
chains.sh: #3589: AnyPolicyWithLevel: Verifying certificate(s)  EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128110503 (0x433d99a7)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 16:05:16 2012
            Not After : Tue Nov 28 16:05:16 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a8:60:be:44:23:69:2c:55:83:90:e5:25:fc:9b:a3:7b:
                    26:e0:27:06:7e:4e:ba:79:4a:7d:d3:c3:ca:52:3e:3f:
                    30:ac:ef:24:23:86:11:d8:fc:de:61:41:2c:7b:0a:88:
                    ba:24:94:c2:a5:f2:02:75:8b:f7:f4:6e:c3:05:5b:7e:
                    65:6c:ae:d7:7c:49:f9:08:bc:cd:50:da:c6:ff:08:93:
                    e9:db:d1:e8:1a:2f:6f:b2:05:33:04:60:f0:c3:42:65:
                    46:14:d6:5f:ad:50:e8:51:2d:30:a6:d5:60:07:bf:12:
                    b1:f1:1b:f4:81:1f:01:08:84:7f:86:77:d9:98:69:e1
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        71:94:2b:b2:47:7f:c9:e0:05:8b:5d:67:7d:47:b1:f1:
        5f:9d:7c:b9:8c:95:72:a6:d7:61:d7:0a:41:d7:d6:12:
        5f:ed:95:ee:21:e4:5f:65:2e:23:3e:11:38:da:71:f0:
        ba:6c:3a:52:65:a9:f7:69:3f:32:df:e8:0d:02:b7:e3:
        3f:b8:ae:e1:9c:c4:bd:76:38:12:89:9e:6d:0e:5c:d8:
        1b:56:ab:3e:1e:e9:25:f2:ba:b0:ce:00:f5:2a:74:ca:
        f0:f2:42:8e:c1:08:4f:fe:ab:79:06:76:c7:26:cd:12:
        c8:45:74:59:89:99:3a:9e:3c:6d:f4:ea:03:30:a6:80
    Fingerprint (MD5):
        7E:E3:E3:FE:31:89:F8:C1:88:E4:C0:86:AB:E4:2A:88
    Fingerprint (SHA1):
        4C:6E:61:7F:98:52:2F:66:18:DC:78:B7:00:36:3E:01:35:18:5A:AD


Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US"
Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US"
Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US"
Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US"
Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US"
Returned value is 0, expected result is pass
chains.sh: #3590: AnyPolicyWithLevel: Verifying certificate(s)  EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128110503 (0x433d99a7)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 16:05:16 2012
            Not After : Tue Nov 28 16:05:16 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a8:60:be:44:23:69:2c:55:83:90:e5:25:fc:9b:a3:7b:
                    26:e0:27:06:7e:4e:ba:79:4a:7d:d3:c3:ca:52:3e:3f:
                    30:ac:ef:24:23:86:11:d8:fc:de:61:41:2c:7b:0a:88:
                    ba:24:94:c2:a5:f2:02:75:8b:f7:f4:6e:c3:05:5b:7e:
                    65:6c:ae:d7:7c:49:f9:08:bc:cd:50:da:c6:ff:08:93:
                    e9:db:d1:e8:1a:2f:6f:b2:05:33:04:60:f0:c3:42:65:
                    46:14:d6:5f:ad:50:e8:51:2d:30:a6:d5:60:07:bf:12:
                    b1:f1:1b:f4:81:1f:01:08:84:7f:86:77:d9:98:69:e1
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        71:94:2b:b2:47:7f:c9:e0:05:8b:5d:67:7d:47:b1:f1:
        5f:9d:7c:b9:8c:95:72:a6:d7:61:d7:0a:41:d7:d6:12:
        5f:ed:95:ee:21:e4:5f:65:2e:23:3e:11:38:da:71:f0:
        ba:6c:3a:52:65:a9:f7:69:3f:32:df:e8:0d:02:b7:e3:
        3f:b8:ae:e1:9c:c4:bd:76:38:12:89:9e:6d:0e:5c:d8:
        1b:56:ab:3e:1e:e9:25:f2:ba:b0:ce:00:f5:2a:74:ca:
        f0:f2:42:8e:c1:08:4f:fe:ab:79:06:76:c7:26:cd:12:
        c8:45:74:59:89:99:3a:9e:3c:6d:f4:ea:03:30:a6:80
    Fingerprint (MD5):
        7E:E3:E3:FE:31:89:F8:C1:88:E4:C0:86:AB:E4:2A:88
    Fingerprint (SHA1):
        4C:6E:61:7F:98:52:2F:66:18:DC:78:B7:00:36:3E:01:35:18:5A:AD


Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US"
Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US"
Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US"
Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US"
Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US"
Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US"
Returned value is 0, expected result is pass
chains.sh: #3591: AnyPolicyWithLevel: Verifying certificate(s)  EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128110503 (0x433d99a7)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 16:05:16 2012
            Not After : Tue Nov 28 16:05:16 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a8:60:be:44:23:69:2c:55:83:90:e5:25:fc:9b:a3:7b:
                    26:e0:27:06:7e:4e:ba:79:4a:7d:d3:c3:ca:52:3e:3f:
                    30:ac:ef:24:23:86:11:d8:fc:de:61:41:2c:7b:0a:88:
                    ba:24:94:c2:a5:f2:02:75:8b:f7:f4:6e:c3:05:5b:7e:
                    65:6c:ae:d7:7c:49:f9:08:bc:cd:50:da:c6:ff:08:93:
                    e9:db:d1:e8:1a:2f:6f:b2:05:33:04:60:f0:c3:42:65:
                    46:14:d6:5f:ad:50:e8:51:2d:30:a6:d5:60:07:bf:12:
                    b1:f1:1b:f4:81:1f:01:08:84:7f:86:77:d9:98:69:e1
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        71:94:2b:b2:47:7f:c9:e0:05:8b:5d:67:7d:47:b1:f1:
        5f:9d:7c:b9:8c:95:72:a6:d7:61:d7:0a:41:d7:d6:12:
        5f:ed:95:ee:21:e4:5f:65:2e:23:3e:11:38:da:71:f0:
        ba:6c:3a:52:65:a9:f7:69:3f:32:df:e8:0d:02:b7:e3:
        3f:b8:ae:e1:9c:c4:bd:76:38:12:89:9e:6d:0e:5c:d8:
        1b:56:ab:3e:1e:e9:25:f2:ba:b0:ce:00:f5:2a:74:ca:
        f0:f2:42:8e:c1:08:4f:fe:ab:79:06:76:c7:26:cd:12:
        c8:45:74:59:89:99:3a:9e:3c:6d:f4:ea:03:30:a6:80
    Fingerprint (MD5):
        7E:E3:E3:FE:31:89:F8:C1:88:E4:C0:86:AB:E4:2A:88
    Fingerprint (SHA1):
        4C:6E:61:7F:98:52:2F:66:18:DC:78:B7:00:36:3E:01:35:18:5A:AD


Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US"
Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US"
Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US"
Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US"
Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US"
Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US"
Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US"
Returned value is 0, expected result is pass
chains.sh: #3592: AnyPolicyWithLevel: Verifying certificate(s)  EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3593: AnyPolicyWithLevel: Verifying certificate(s)  EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #3594: explicitPolicy: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1128110533 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3595: explicitPolicy: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #3596: explicitPolicy: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB nonEVCADB
certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd
chains.sh: #3597: explicitPolicy: Creating DB nonEVCADB  - PASSED
chains.sh: Creating Intermediate certifiate request nonEVCAReq.der
certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US"  -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o nonEVCAReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3598: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der  - PASSED
chains.sh: Creating certficate nonEVCARoot.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 1128110534   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3599: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root  - PASSED
chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database
certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der
chains.sh: #3600: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database  - PASSED
chains.sh: Creating DB EVCADB
certutil -N -d EVCADB -f EVCADB/dbpasswd
chains.sh: #3601: explicitPolicy: Creating DB EVCADB  - PASSED
chains.sh: Creating Intermediate certifiate request EVCAReq.der
certutil -s "CN=EVCA Intermediate, O=EVCA, C=US"  -R -2 -d EVCADB -f EVCADB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o EVCAReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3602: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der  - PASSED
chains.sh: Creating certficate EVCARoot.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 1128110535   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3603: explicitPolicy: Creating certficate EVCARoot.der signed by Root  - PASSED
chains.sh: Importing certificate EVCARoot.der to EVCADB database
certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der
chains.sh: #3604: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database  - PASSED
chains.sh: Creating DB otherEVCADB
certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd
chains.sh: #3605: explicitPolicy: Creating DB otherEVCADB  - PASSED
chains.sh: Creating Intermediate certifiate request otherEVCAReq.der
certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US"  -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o otherEVCAReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3606: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der  - PASSED
chains.sh: Creating certficate otherEVCARoot.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 1128110536   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3607: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root  - PASSED
chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database
certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der
chains.sh: #3608: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database  - PASSED
chains.sh: Creating DB validEVDB
certutil -N -d validEVDB -f validEVDB/dbpasswd
chains.sh: #3609: explicitPolicy: Creating DB validEVDB  - PASSED
chains.sh: Creating EE certifiate request validEVReq.der
certutil -s "CN=validEV EE, O=validEV, C=US"  -R  -d validEVDB -f validEVDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o validEVReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3610: explicitPolicy: Creating EE certifiate request validEVReq.der  - PASSED
chains.sh: Creating certficate validEVEVCA.der signed by EVCA
certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 1128110537   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3611: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA  - PASSED
chains.sh: Importing certificate validEVEVCA.der to validEVDB database
certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der
chains.sh: #3612: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database  - PASSED
chains.sh: Creating DB invalidEVDB
certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd
chains.sh: #3613: explicitPolicy: Creating DB invalidEVDB  - PASSED
chains.sh: Creating EE certifiate request invalidEVReq.der
certutil -s "CN=invalidEV EE, O=invalidEV, C=US"  -R  -d invalidEVDB -f invalidEVDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o invalidEVReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3614: explicitPolicy: Creating EE certifiate request invalidEVReq.der  - PASSED
chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA
certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 1128110538   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3615: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA  - PASSED
chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database
certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der
chains.sh: #3616: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database  - PASSED
chains.sh: Creating DB wrongEVOIDDB
certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd
chains.sh: #3617: explicitPolicy: Creating DB wrongEVOIDDB  - PASSED
chains.sh: Creating EE certifiate request wrongEVOIDReq.der
certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US"  -R  -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o wrongEVOIDReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3618: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der  - PASSED
chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA
certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 1128110539   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3619: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA  - PASSED
chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database
certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der
chains.sh: #3620: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #3621: explicitPolicy: Creating DB AllDB  - PASSED
chains.sh: Verifying certificate(s)  validEVEVCA.der EVCARoot.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der
vfychain -d AllDB -pp -vv     -o OID.1.0  validEVEVCA.der EVCARoot.der Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128110533 (0x433d99c5)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:05:31 2012
            Not After : Tue Nov 28 16:05:31 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    f2:70:20:19:30:b6:e8:d8:47:e6:70:04:a0:66:08:77:
                    e9:af:6d:9d:88:8d:53:b3:f4:31:0b:a8:21:d1:12:7f:
                    86:67:69:9a:43:12:43:68:0b:da:df:8c:15:b9:46:13:
                    8e:a5:6c:a3:62:5a:e4:5c:bd:2e:2f:1d:0f:6f:3c:bc:
                    2f:6f:f6:5e:aa:8e:8d:6d:9c:ed:c0:e9:72:db:2a:cf:
                    ce:4d:e3:55:b2:d4:cd:63:5d:84:b3:e6:7f:6f:fc:b6:
                    b5:55:e1:95:69:be:d8:b6:9a:5b:c3:5a:a8:0c:4e:4b:
                    f8:cd:d6:eb:d3:c3:f1:ed:80:be:14:a5:e2:cd:51:a7
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8c:6f:67:f7:52:51:69:59:d2:47:be:e1:58:41:ba:22:
        bb:78:6c:d8:81:1f:bf:06:b5:22:b2:ff:f1:55:8f:f8:
        84:fe:51:a8:3a:b2:b1:f6:03:77:ba:43:d3:2a:ca:3f:
        57:64:1a:ce:b7:45:6e:d5:32:c5:0a:05:41:20:e0:3d:
        6c:92:f2:c9:3a:50:a6:5c:df:59:d8:b9:10:17:03:0a:
        eb:c3:d7:1f:34:2e:fb:36:e2:e2:88:49:51:21:b5:f6:
        5a:bb:bd:b4:58:e7:8a:c9:cd:ed:b8:1b:59:77:33:04:
        a2:b1:db:7e:f1:c7:21:d0:7c:57:59:3c:7d:95:2c:5e
    Fingerprint (MD5):
        A2:73:2D:0F:56:9F:09:CF:34:D7:C9:ED:B3:8E:55:7D
    Fingerprint (SHA1):
        27:3B:4F:58:54:5F:82:BC:94:88:7E:20:79:51:94:78:1C:80:DD:01


Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US"
Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US"
Returned value is 0, expected result is pass
chains.sh: #3622: explicitPolicy: Verifying certificate(s)  validEVEVCA.der EVCARoot.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der
vfychain -d AllDB -pp -vv     -o OID.1.0  invalidEVnonEVCA.der nonEVCARoot.der Root.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3623: explicitPolicy: Verifying certificate(s)  invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der
vfychain -d AllDB -pp -vv     -o OID.1.0  wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3624: explicitPolicy: Verifying certificate(s)  wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #3625: explicitPolicy: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  validEVEVCA.der EVCARoot.der with flags  -d AllDB    -o OID.1.0 
vfychain -d AllDB -pp -vv     -o OID.1.0  validEVEVCA.der EVCARoot.der 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128110533 (0x433d99c5)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:05:31 2012
            Not After : Tue Nov 28 16:05:31 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    f2:70:20:19:30:b6:e8:d8:47:e6:70:04:a0:66:08:77:
                    e9:af:6d:9d:88:8d:53:b3:f4:31:0b:a8:21:d1:12:7f:
                    86:67:69:9a:43:12:43:68:0b:da:df:8c:15:b9:46:13:
                    8e:a5:6c:a3:62:5a:e4:5c:bd:2e:2f:1d:0f:6f:3c:bc:
                    2f:6f:f6:5e:aa:8e:8d:6d:9c:ed:c0:e9:72:db:2a:cf:
                    ce:4d:e3:55:b2:d4:cd:63:5d:84:b3:e6:7f:6f:fc:b6:
                    b5:55:e1:95:69:be:d8:b6:9a:5b:c3:5a:a8:0c:4e:4b:
                    f8:cd:d6:eb:d3:c3:f1:ed:80:be:14:a5:e2:cd:51:a7
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8c:6f:67:f7:52:51:69:59:d2:47:be:e1:58:41:ba:22:
        bb:78:6c:d8:81:1f:bf:06:b5:22:b2:ff:f1:55:8f:f8:
        84:fe:51:a8:3a:b2:b1:f6:03:77:ba:43:d3:2a:ca:3f:
        57:64:1a:ce:b7:45:6e:d5:32:c5:0a:05:41:20:e0:3d:
        6c:92:f2:c9:3a:50:a6:5c:df:59:d8:b9:10:17:03:0a:
        eb:c3:d7:1f:34:2e:fb:36:e2:e2:88:49:51:21:b5:f6:
        5a:bb:bd:b4:58:e7:8a:c9:cd:ed:b8:1b:59:77:33:04:
        a2:b1:db:7e:f1:c7:21:d0:7c:57:59:3c:7d:95:2c:5e
    Fingerprint (MD5):
        A2:73:2D:0F:56:9F:09:CF:34:D7:C9:ED:B3:8E:55:7D
    Fingerprint (SHA1):
        27:3B:4F:58:54:5F:82:BC:94:88:7E:20:79:51:94:78:1C:80:DD:01

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US"
Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US"
Returned value is 0, expected result is pass
chains.sh: #3626: explicitPolicy: Verifying certificate(s)  validEVEVCA.der EVCARoot.der with flags  -d AllDB    -o OID.1.0  - PASSED
chains.sh: Verifying certificate(s)  invalidEVnonEVCA.der nonEVCARoot.der with flags  -d AllDB    -o OID.1.0 
vfychain -d AllDB -pp -vv     -o OID.1.0  invalidEVnonEVCA.der nonEVCARoot.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3627: explicitPolicy: Verifying certificate(s)  invalidEVnonEVCA.der nonEVCARoot.der with flags  -d AllDB    -o OID.1.0  - PASSED
chains.sh: Verifying certificate(s)  wrongEVOIDotherEVCA.der otherEVCARoot.der with flags  -d AllDB    -o OID.1.0 
vfychain -d AllDB -pp -vv     -o OID.1.0  wrongEVOIDotherEVCA.der otherEVCARoot.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3628: explicitPolicy: Verifying certificate(s)  wrongEVOIDotherEVCA.der otherEVCARoot.der with flags  -d AllDB    -o OID.1.0  - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #3629: Mapping: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1128110540 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3630: Mapping: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #3631: Mapping: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #3632: Mapping: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3633: Mapping: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1128110541   --extCP --extPM < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n
OID.1.0
OID.1.1
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N]
Is this a critical extension [y/N]?
chains.sh: #3634: Mapping: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
chains.sh: #3635: Mapping: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #3636: Mapping: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3637: Mapping: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1128110542   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3638: Mapping: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
chains.sh: #3639: Mapping: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB UserDB
certutil -N -d UserDB -f UserDB/dbpasswd
chains.sh: #3640: Mapping: Creating DB UserDB  - PASSED
chains.sh: Creating EE certifiate request UserReq.der
certutil -s "CN=User EE, O=User, C=US"  -R  -d UserDB -f UserDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o UserReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3641: Mapping: Creating EE certifiate request UserReq.der  - PASSED
chains.sh: Creating certficate UserCA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1128110543   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3642: Mapping: Creating certficate UserCA2.der signed by CA2  - PASSED
chains.sh: Importing certificate UserCA2.der to UserDB database
certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der
chains.sh: #3643: Mapping: Importing certificate UserCA2.der to UserDB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #3644: Mapping: Creating DB AllDB  - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #3645: Mapping: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA1Root.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der
chains.sh: #3646: Mapping: Importing certificate CA1Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA1.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der
chains.sh: #3647: Mapping: Importing certificate CA2CA1.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t Root
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128110540 (0x433d99cc)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:05:33 2012
            Not After : Tue Nov 28 16:05:33 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d5:fa:0d:f6:6e:3e:1b:8c:cf:d1:de:90:50:b7:f4:7b:
                    3d:93:ee:7f:e6:ba:89:ea:48:63:ae:fc:eb:36:6f:7d:
                    4c:a2:7c:21:33:b9:cd:f7:17:c0:06:e8:f0:3d:73:2e:
                    8d:b7:e8:a2:e7:62:f3:d3:1b:86:6d:83:86:7b:ac:6a:
                    0c:98:e4:35:8d:bc:1e:b2:f7:52:ef:de:28:ac:97:97:
                    e9:33:79:df:d2:38:b8:c0:af:e1:9b:21:d1:92:9c:a4:
                    86:c9:f7:4a:43:68:2b:f1:c3:06:ac:0e:22:c3:01:d7:
                    fb:b8:11:4d:07:ba:dc:af:ca:ac:b7:1f:f3:f7:85:77
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8a:51:b7:14:28:66:47:aa:10:65:d8:53:99:f6:3e:aa:
        43:80:39:0d:8f:a2:59:80:06:c4:25:43:a7:cf:e7:fa:
        8f:38:7f:79:83:3e:c8:ea:ec:b3:2b:0a:34:b5:0c:be:
        bf:1b:a6:bf:0d:6e:3f:0b:36:3c:e2:5f:ba:41:b9:1c:
        0b:4a:e5:f8:0c:73:cd:f1:5e:8c:0e:45:d3:55:2e:62:
        c0:7d:1f:ae:0f:33:a4:0c:31:88:fa:3e:13:93:8b:cf:
        39:6b:46:84:c6:91:d5:80:7f:c8:31:ae:85:69:ef:2d:
        9d:6a:e3:67:18:92:95:d9:64:6f:46:73:46:f3:06:d6
    Fingerprint (MD5):
        01:D8:2E:3E:5A:E0:82:DE:08:04:3B:82:E4:BB:FE:7C
    Fingerprint (SHA1):
        C8:09:07:EB:11:94:2A:D6:B7:88:EB:28:C4:49:CE:45:7B:DD:81:DC

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3648: Mapping: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.1  -t Root
vfychain -d AllDB -pp -vv     -o OID.1.1  UserCA2.der  -t Root
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3649: Mapping: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.1  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t CA1
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der  -t CA1
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CA1 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3650: Mapping: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.1  -t CA1
vfychain -d AllDB -pp -vv     -o OID.1.1  UserCA2.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128110541 (0x433d99cd)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:05:34 2012
            Not After : Tue Nov 28 16:05:34 2017
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d5:09:db:a0:d0:7e:6c:92:f1:7a:d1:a9:44:e0:93:13:
                    5c:85:58:b6:1d:4e:12:90:fd:d4:d3:49:86:cc:c8:21:
                    e3:c2:d1:05:a7:31:87:86:e0:b6:7a:27:b1:af:c9:33:
                    2c:86:5f:b3:e2:44:63:9c:03:57:65:fc:83:29:25:f3:
                    0b:88:de:92:21:f1:98:ee:b8:c2:34:22:81:38:d8:65:
                    92:5d:92:81:8f:f4:6d:b7:62:e1:f2:60:3e:00:12:aa:
                    84:22:41:ed:ff:51:e9:12:98:d6:fe:00:0e:56:96:2f:
                    63:9b:26:c3:30:fa:a1:be:ab:b3:aa:c2:71:18:84:93
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policy Mappings
            Data: Sequence {
                Sequence {
                    OID.1.0
                    User Defined Policy OID
                }
            }

            Name: Certificate Policies
            Data: 
                Policy Name: OID.1.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9a:cc:2d:15:ab:6e:cf:3d:d6:09:82:05:91:d7:ef:8d:
        d5:8c:fb:cf:8f:f6:b4:db:41:fe:8b:82:b8:a4:4e:cc:
        3d:7e:c5:1f:d6:ce:5e:4c:7b:77:12:3f:a3:b5:4c:05:
        e0:cd:e5:55:68:dc:12:12:04:b5:00:68:67:3e:8c:ea:
        6e:f2:a1:f6:75:fd:83:8b:2b:a2:e8:ea:8a:99:5b:cd:
        40:ce:74:bc:4e:ba:34:37:74:86:78:ff:f2:68:d7:26:
        36:99:65:4e:95:79:79:9e:48:d7:9a:0a:a8:ec:14:b6:
        da:eb:ed:5a:88:94:69:f2:bd:7c:8d:22:d3:5e:6b:00
    Fingerprint (MD5):
        E0:80:7C:DC:44:B1:2F:14:E5:B3:0D:2F:E6:C3:DA:17
    Fingerprint (SHA1):
        64:46:80:56:02:47:63:3F:B8:D9:10:B4:02:8A:07:C7:29:8A:02:4C

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #3651: Mapping: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.1  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t CA2
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der  -t CA2
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CA2 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3652: Mapping: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.1  -t CA2
vfychain -d AllDB -pp -vv     -o OID.1.1  UserCA2.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128110542 (0x433d99ce)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Wed Nov 28 16:05:34 2012
            Not After : Tue Nov 28 16:05:34 2017
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bf:5e:52:96:1b:e6:4d:91:64:6e:aa:cf:f1:01:ec:ea:
                    0c:99:19:84:5f:07:37:de:07:a3:ee:de:c9:ca:19:79:
                    16:39:d2:6a:19:e1:5f:2f:97:2d:1d:4a:63:81:d0:16:
                    15:32:69:95:20:98:a3:f1:ce:e8:07:8b:80:4e:b7:c2:
                    8d:77:44:f2:16:fc:5b:f1:33:cf:8c:ab:7a:9a:64:76:
                    6e:ca:80:db:69:f3:ab:e6:dc:be:31:ca:c8:32:96:c1:
                    b8:21:5c:77:7d:dd:36:17:d2:9d:b9:95:d6:6e:22:98:
                    d0:ac:0d:e0:e9:98:8f:0a:82:29:f4:09:e7:92:53:2d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        54:e0:a0:9d:ee:3f:e6:36:50:08:18:7a:60:d6:c3:49:
        5b:f3:e8:d6:09:c8:47:27:16:f3:0b:35:64:fc:07:d6:
        92:94:32:08:24:c9:1d:15:f6:52:24:a6:56:e6:59:d5:
        b8:11:55:ea:e4:78:4a:37:7b:e5:59:4f:a6:25:bb:8c:
        1b:fa:71:25:19:ff:ca:25:a1:cd:d6:c4:d9:cf:0b:04:
        86:00:07:a8:65:fb:0f:f6:47:0b:f8:6b:f5:08:1c:9e:
        3d:c0:5d:d6:0f:45:60:71:c0:3b:0d:3b:fe:9d:9e:6b:
        c9:ec:5a:6e:5b:19:b3:f0:28:ad:48:74:d3:e5:9f:fe
    Fingerprint (MD5):
        92:27:87:0F:39:73:E9:9D:85:09:66:45:2A:64:1A:97
    Fingerprint (SHA1):
        23:F3:86:F7:89:29:C8:C2:61:94:DA:F6:8E:26:8D:3A:A3:DD:B2:FA

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Returned value is 0, expected result is pass
chains.sh: #3653: Mapping: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.1  -t CA2 - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #3654: Mapping2: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1128110544 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3655: Mapping2: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #3656: Mapping2: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #3657: Mapping2: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3658: Mapping2: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1128110545   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3659: Mapping2: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
chains.sh: #3660: Mapping2: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #3661: Mapping2: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3662: Mapping2: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1128110546   --extCP --extPM < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n
OID.1.0
OID.1.1
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N]
Is this a critical extension [y/N]?
chains.sh: #3663: Mapping2: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
chains.sh: #3664: Mapping2: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB CA3DB
certutil -N -d CA3DB -f CA3DB/dbpasswd
chains.sh: #3665: Mapping2: Creating DB CA3DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA3Req.der
certutil -s "CN=CA3 Intermediate, O=CA3, C=US"  -R -2 -d CA3DB -f CA3DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA3Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3666: Mapping2: Creating Intermediate certifiate request CA3Req.der  - PASSED
chains.sh: Creating certficate CA3CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 1128110547   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3667: Mapping2: Creating certficate CA3CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate CA3CA2.der to CA3DB database
certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der
chains.sh: #3668: Mapping2: Importing certificate CA3CA2.der to CA3DB database  - PASSED
chains.sh: Creating DB UserDB
certutil -N -d UserDB -f UserDB/dbpasswd
chains.sh: #3669: Mapping2: Creating DB UserDB  - PASSED
chains.sh: Creating EE certifiate request UserReq.der
certutil -s "CN=User EE, O=User, C=US"  -R  -d UserDB -f UserDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o UserReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3670: Mapping2: Creating EE certifiate request UserReq.der  - PASSED
chains.sh: Creating certficate UserCA3.der signed by CA3
certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 1128110548   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3671: Mapping2: Creating certficate UserCA3.der signed by CA3  - PASSED
chains.sh: Importing certificate UserCA3.der to UserDB database
certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der
chains.sh: #3672: Mapping2: Importing certificate UserCA3.der to UserDB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #3673: Mapping2: Creating DB AllDB  - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #3674: Mapping2: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA1Root.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der
chains.sh: #3675: Mapping2: Importing certificate CA1Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA1.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der
chains.sh: #3676: Mapping2: Importing certificate CA2CA1.der to AllDB database  - PASSED
chains.sh: Importing certificate CA3CA2.der to AllDB database
certutil -A -n CA3  -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der
chains.sh: #3677: Mapping2: Importing certificate CA3CA2.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.0  -t Root
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA3.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128110544 (0x433d99d0)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:05:36 2012
            Not After : Tue Nov 28 16:05:36 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:bb:32:8a:99:f6:0b:58:dd:26:0f:0d:df:5d:5c:10:
                    bb:28:17:83:d0:bf:fd:94:57:47:27:d8:60:25:87:80:
                    f8:1a:a2:cf:c7:d4:20:6a:cd:47:80:df:3e:13:2a:a2:
                    08:ed:1b:5b:e9:b5:ef:cc:9b:7b:fa:ee:dc:f5:c0:9d:
                    f5:ca:e4:c9:28:bd:97:e7:f0:3b:f5:dd:74:69:2a:6e:
                    25:0c:d1:11:23:43:59:82:1f:05:9a:d5:a9:ff:38:4e:
                    93:9f:8c:09:d4:a2:c0:f6:bf:b5:53:bc:5a:9e:fd:0b:
                    3c:02:db:19:20:ff:e3:31:77:48:af:53:04:c8:58:d7
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        b6:38:50:da:12:de:98:80:16:d1:15:ad:28:64:c2:0f:
        b6:aa:b1:d9:5e:24:8c:04:04:7b:d9:68:bf:e3:ab:6f:
        78:9b:d6:c2:51:0b:a8:bb:97:6c:46:7c:2b:54:42:ff:
        39:2a:df:11:4b:10:02:cf:ca:b9:42:9b:d1:c2:fc:2e:
        85:3b:e4:2f:e9:cd:39:cc:2c:17:49:67:c4:1e:3a:62:
        95:91:d8:71:59:5b:03:0d:a1:21:5a:6c:9e:d1:9a:d4:
        dc:c9:9f:cb:86:92:c3:6d:29:86:80:25:16:e9:25:e1:
        42:0f:4f:0e:10:c2:e2:d6:c4:d5:83:0c:b3:4a:cb:ea
    Fingerprint (MD5):
        04:43:2F:45:56:EB:A4:3E:5B:D6:BA:AE:26:FA:5E:D3
    Fingerprint (SHA1):
        7E:23:3B:8E:65:35:01:66:55:54:F4:04:C9:83:54:3E:6B:9A:B0:17

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US"
Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3678: Mapping2: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.1  -t Root
vfychain -d AllDB -pp -vv     -o OID.1.1  UserCA3.der  -t Root
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3679: Mapping2: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.1  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.0  -t CA1
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA3.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128110545 (0x433d99d1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:05:36 2012
            Not After : Tue Nov 28 16:05:36 2017
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bd:64:be:ac:fc:d8:6f:f4:87:b5:72:04:72:3a:46:2f:
                    43:b4:98:7d:2e:6b:45:20:d6:ef:68:79:eb:ba:62:7e:
                    ea:e8:1d:8d:07:d9:2e:9a:bc:16:d5:bc:c2:81:54:fa:
                    c0:7e:55:ac:9d:8b:4d:77:eb:f2:d3:12:1c:cb:a8:aa:
                    66:5f:f6:90:fe:8b:62:bc:25:e4:f1:6e:5a:02:62:ad:
                    ee:3e:20:6a:81:5d:68:d8:83:12:84:53:cd:d4:1b:75:
                    bf:77:84:54:0e:a7:5f:dd:66:2d:29:6c:be:1c:e1:8a:
                    6a:e2:52:be:c5:b2:35:cc:d1:ff:66:74:51:e0:70:01
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ab:d2:40:55:af:ff:28:dc:7b:4f:ad:ae:b7:cb:e7:de:
        ab:57:16:02:dc:cf:08:ce:3c:55:a2:9e:39:52:59:4b:
        e8:9e:2e:c1:b0:21:ba:0f:73:73:b4:ee:6d:e0:28:47:
        93:5f:f7:63:13:ae:b2:54:97:48:e7:6c:6d:47:5c:b1:
        83:c0:8d:08:6b:8f:41:9a:9c:5e:af:40:92:74:da:53:
        02:40:16:e5:54:5f:3b:70:2b:3a:35:54:3d:13:76:1f:
        8c:1f:a8:9f:6b:d9:43:a1:3c:96:61:f7:a2:ed:24:ec:
        46:c7:a6:a9:1d:28:81:2a:ce:89:73:04:c4:cd:e6:a3
    Fingerprint (MD5):
        21:73:AF:C9:A3:CB:A1:2B:7E:39:16:1E:CC:8B:AF:7D
    Fingerprint (SHA1):
        5F:46:50:22:4E:E4:27:B6:A4:35:73:FE:56:32:77:D7:6C:02:A2:DC

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US"
Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #3680: Mapping2: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.1  -t CA1
vfychain -d AllDB -pp -vv     -o OID.1.1  UserCA3.der  -t CA1
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. CA1 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3681: Mapping2: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.1  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.0  -t CA2
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA3.der  -t CA2
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CA2 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3682: Mapping2: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.1  -t CA2
vfychain -d AllDB -pp -vv     -o OID.1.1  UserCA3.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128110546 (0x433d99d2)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Wed Nov 28 16:05:36 2012
            Not After : Tue Nov 28 16:05:36 2017
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d0:3f:54:b5:41:8e:37:bd:85:c1:99:9b:6c:7c:b0:68:
                    9f:27:5a:8b:24:10:21:72:05:1a:81:88:2a:eb:c6:6a:
                    b6:94:36:8b:dd:04:89:6d:65:0c:a4:c4:21:65:b8:cc:
                    02:df:df:21:46:4a:01:67:7a:82:4b:fd:e4:b1:39:de:
                    8c:d4:4b:df:50:ce:97:3d:79:40:09:75:cc:9d:c5:b0:
                    63:b2:5a:c9:be:ff:a5:3a:6d:a6:27:3e:30:60:d2:c8:
                    0d:94:c8:3a:40:d8:7c:e6:bb:18:52:f5:2b:1f:55:54:
                    2b:dc:07:0e:e9:10:aa:e6:c5:be:bd:67:67:ed:4f:a1
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policy Mappings
            Data: Sequence {
                Sequence {
                    OID.1.0
                    User Defined Policy OID
                }
            }

            Name: Certificate Policies
            Data: 
                Policy Name: OID.1.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        73:98:44:33:76:31:03:26:97:d3:ba:a7:1d:34:d3:ef:
        f7:76:47:59:e3:d9:00:0d:f4:f1:29:6f:7f:aa:3d:5a:
        52:13:d6:ce:5d:4b:1f:d3:a8:fe:47:f3:2c:24:10:3e:
        17:f9:74:73:ef:a3:ff:fb:56:ee:98:51:03:40:31:0c:
        01:85:40:e2:c6:15:ec:17:98:17:79:13:70:f9:e1:da:
        fc:65:a9:e1:cd:6b:8f:80:10:f4:49:12:fe:07:3c:39:
        4a:24:38:7d:79:3c:0d:a4:3b:3d:38:3c:c9:21:f1:18:
        94:0e:95:26:6c:f7:bd:87:f5:7e:22:e1:c6:33:49:94
    Fingerprint (MD5):
        22:E9:3E:8C:7B:3C:E7:FF:7D:F2:3D:A9:4C:D9:D5:7C
    Fingerprint (SHA1):
        A7:5D:0F:EB:9D:4A:24:81:53:DD:BA:38:E3:D8:7F:77:3A:87:48:2D

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US"
Returned value is 0, expected result is pass
chains.sh: #3683: Mapping2: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.1  -t CA2 - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #3684: AIA: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1128110549 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3685: AIA: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #3686: AIA: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #3687: AIA: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3688: AIA: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1128110550   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3689: AIA: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
chains.sh: #3690: AIA: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #3691: AIA: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3692: AIA: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1128110551   --extAIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8556/buildnss02-10869-CA1Root-1128110459.der
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #3693: AIA: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
chains.sh: #3694: AIA: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB UserDB
certutil -N -d UserDB -f UserDB/dbpasswd
chains.sh: #3695: AIA: Creating DB UserDB  - PASSED
chains.sh: Creating EE certifiate request UserReq.der
certutil -s "CN=User EE, O=User, C=US"  -R  -d UserDB -f UserDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o UserReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3696: AIA: Creating EE certifiate request UserReq.der  - PASSED
chains.sh: Creating certficate UserCA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1128110552   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3697: AIA: Creating certficate UserCA2.der signed by CA2  - PASSED
chains.sh: Importing certificate UserCA2.der to UserDB database
certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der
chains.sh: #3698: AIA: Importing certificate UserCA2.der to UserDB database  - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags  -d UserDB     -t Root.der
vfychain -d UserDB -pp -vv      UserCA2.der CA2CA1.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]:
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=CA1 Intermediate,O=CA1,C=US
Returned value is 1, expected result is fail
chains.sh: #3699: AIA: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags  -d UserDB     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags  -d UserDB -f    -t Root.der
vfychain -d UserDB -pp -vv  -f    UserCA2.der CA2CA1.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128110549 (0x433d99d5)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:05:38 2012
            Not After : Tue Nov 28 16:05:38 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cc:c9:9a:a6:e4:25:c3:61:89:e4:29:ae:0a:b8:94:fd:
                    90:d3:77:81:64:99:e4:8e:3d:66:b6:ba:fb:be:93:07:
                    70:16:33:6c:2d:96:89:e0:d7:57:bf:98:53:d5:1f:31:
                    b5:64:73:59:31:88:77:72:3e:3c:3b:8d:50:59:1d:94:
                    ab:1a:1a:d6:63:90:e5:7d:43:8e:54:5e:7f:77:13:76:
                    e8:04:af:61:90:32:bc:b6:55:75:c1:c9:e4:e8:35:6f:
                    3f:23:26:ee:f9:ba:29:c8:3e:bd:5e:84:9c:76:3b:93:
                    d7:45:3c:29:7c:32:34:1c:1d:ef:20:03:f3:62:c2:ab
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        36:26:0f:81:3a:60:f6:69:03:43:25:e9:e7:a3:0c:0d:
        22:28:c6:55:09:ff:33:0c:2a:96:ac:45:ed:ac:07:af:
        6c:85:0b:5e:f3:2b:44:14:38:4e:61:9b:45:7e:d8:07:
        d8:2e:dc:5c:19:6e:93:88:f2:41:1d:c2:05:8b:0b:05:
        5c:94:7c:b9:3b:9c:4a:4d:17:00:41:79:f5:3c:8e:7f:
        97:95:e3:21:83:42:bc:5e:c1:7f:0f:d6:a1:89:4e:dc:
        11:f0:07:98:ec:09:f4:09:4b:41:28:cc:7a:f0:3d:84:
        eb:5e:69:fd:46:d1:f2:51:c6:ea:b9:07:4d:aa:46:83
    Fingerprint (MD5):
        AF:1F:4B:FF:7A:53:6D:DF:E5:98:C8:D5:B6:17:DE:71
    Fingerprint (SHA1):
        BB:3E:DC:06:E4:52:06:B4:A4:BF:0E:83:E0:42:DC:5D:FB:62:61:10


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3700: AIA: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags  -d UserDB -f    -t Root.der - PASSED
chains.sh: Creating DB ArmyDB
certutil -N -d ArmyDB -f ArmyDB/dbpasswd
chains.sh: #3701: BridgeWithAIA: Creating DB ArmyDB  - PASSED
chains.sh: Creating Root CA Army
certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army  -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1128110553 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3702: BridgeWithAIA: Creating Root CA Army  - PASSED
chains.sh: Exporting Root CA Army.der
certutil -L -d ArmyDB -r -n Army -o Army.der
chains.sh: #3703: BridgeWithAIA: Exporting Root CA Army.der  - PASSED
chains.sh: Creating DB NavyDB
certutil -N -d NavyDB -f NavyDB/dbpasswd
chains.sh: #3704: BridgeWithAIA: Creating DB NavyDB  - PASSED
chains.sh: Creating Root CA Navy
certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy  -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1128110554 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3705: BridgeWithAIA: Creating Root CA Navy  - PASSED
chains.sh: Exporting Root CA Navy.der
certutil -L -d NavyDB -r -n Navy -o Navy.der
chains.sh: #3706: BridgeWithAIA: Exporting Root CA Navy.der  - PASSED
chains.sh: Creating DB BridgeDB
certutil -N -d BridgeDB -f BridgeDB/dbpasswd
chains.sh: #3707: BridgeWithAIA: Creating DB BridgeDB  - PASSED
chains.sh: Creating Bridge certifiate request BridgeReq.der
certutil -s "CN=Bridge Bridge, O=Bridge, C=US"  -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o BridgeReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3708: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der  - PASSED
chains.sh: Creating certficate BridgeArmy.der signed by Army
certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1128110555 -7 Bridge@Army  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3709: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army  - PASSED
chains.sh: Importing certificate BridgeArmy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der
chains.sh: #3710: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database  - PASSED
chains.sh: Creating certficate BridgeNavy.der signed by Navy
certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1128110556 -7 Bridge@Navy  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3711: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy  - PASSED
chains.sh: Importing certificate BridgeNavy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der
chains.sh: #3712: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database  - PASSED
chains.sh: Generating PKCS7 package from BridgeDB database
cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7
chains.sh: #3713: BridgeWithAIA: Generating PKCS7 package from BridgeDB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #3714: BridgeWithAIA: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3715: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Bridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1128110557   --extAIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8556/buildnss02-10869-Bridge-1128110460.p7
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #3716: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate CA1Bridge.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der
chains.sh: #3717: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #3718: BridgeWithAIA: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3719: BridgeWithAIA: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1128110558   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3720: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE1CA1.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der
chains.sh: #3721: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database  - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB     -t Army.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]:
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Bridge Bridge,O=Bridge,C=US
Returned value is 1, expected result is fail
chains.sh: #3722: BridgeWithAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB     -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB -f    -t Army.der
vfychain -d EE1DB -pp -vv  -f    EE1CA1.der CA1Bridge.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. bridge@navy [Certificate Authority]:
Email Address(es): bridge@navy
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Navy ROOT CA,O=Navy,C=US
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Navy ROOT CA,O=Navy,C=US
Returned value is 1, expected result is fail
chains.sh: #3723: BridgeWithAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB -f    -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB -f    -t Navy.der
vfychain -d EE1DB -pp -vv  -f    EE1CA1.der CA1Bridge.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128110554 (0x433d99da)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 16:05:42 2012
            Not After : Tue Nov 28 16:05:42 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b8:74:6d:1b:65:26:b0:e8:e2:ec:2c:b1:e4:05:88:41:
                    f7:ca:f4:2a:ee:d2:5a:56:92:f1:e7:e6:42:e7:cb:a3:
                    c8:07:2b:a5:24:f1:63:fd:9a:67:19:cb:cd:d1:40:3c:
                    9d:49:82:36:ba:72:7a:4d:9b:4c:a7:46:11:d0:82:3b:
                    ea:05:3c:e4:40:9a:af:4a:4e:68:0b:f0:7d:94:2e:45:
                    56:fd:38:d1:f3:b9:b5:6c:50:4b:fd:f4:23:d1:9b:67:
                    0f:d0:60:82:c9:99:46:2a:91:22:de:93:09:9c:8c:5e:
                    b2:09:5a:4a:d9:4f:dd:08:a9:0c:50:a8:b7:68:27:51
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        12:6a:e2:43:b1:01:d9:11:1f:46:7c:ad:92:a9:df:cf:
        45:03:49:2a:ee:c0:e5:22:d4:ab:fe:35:e1:f1:62:90:
        e8:28:30:83:53:ee:f9:5e:52:d4:d6:2d:19:90:42:b6:
        66:6c:06:cd:64:1d:4e:04:73:4c:95:7c:6b:99:f0:ef:
        7c:2a:95:fd:58:f9:9d:f4:3f:0b:a2:06:b7:64:ea:c2:
        ba:c7:b1:4b:5d:7c:81:26:a7:db:67:af:1f:4c:d7:f2:
        67:03:e3:59:9c:43:83:d7:d2:53:03:a0:de:0a:ab:5f:
        e6:54:35:bf:a2:e0:b2:90:63:ac:84:59:e0:19:38:81
    Fingerprint (MD5):
        5C:93:7A:87:25:20:27:A2:F4:65:2F:66:E5:40:F2:77
    Fingerprint (SHA1):
        04:1F:9C:20:99:5A:8C:B0:D4:83:FB:24:C9:B6:FD:EF:01:CD:F4:91


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #3724: BridgeWithAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB -f    -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeArmy.der with flags  -d EE1DB -f    -t Navy.der
vfychain -d EE1DB -pp -vv  -f    EE1CA1.der CA1Bridge.der BridgeArmy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128110554 (0x433d99da)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 16:05:42 2012
            Not After : Tue Nov 28 16:05:42 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b8:74:6d:1b:65:26:b0:e8:e2:ec:2c:b1:e4:05:88:41:
                    f7:ca:f4:2a:ee:d2:5a:56:92:f1:e7:e6:42:e7:cb:a3:
                    c8:07:2b:a5:24:f1:63:fd:9a:67:19:cb:cd:d1:40:3c:
                    9d:49:82:36:ba:72:7a:4d:9b:4c:a7:46:11:d0:82:3b:
                    ea:05:3c:e4:40:9a:af:4a:4e:68:0b:f0:7d:94:2e:45:
                    56:fd:38:d1:f3:b9:b5:6c:50:4b:fd:f4:23:d1:9b:67:
                    0f:d0:60:82:c9:99:46:2a:91:22:de:93:09:9c:8c:5e:
                    b2:09:5a:4a:d9:4f:dd:08:a9:0c:50:a8:b7:68:27:51
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        12:6a:e2:43:b1:01:d9:11:1f:46:7c:ad:92:a9:df:cf:
        45:03:49:2a:ee:c0:e5:22:d4:ab:fe:35:e1:f1:62:90:
        e8:28:30:83:53:ee:f9:5e:52:d4:d6:2d:19:90:42:b6:
        66:6c:06:cd:64:1d:4e:04:73:4c:95:7c:6b:99:f0:ef:
        7c:2a:95:fd:58:f9:9d:f4:3f:0b:a2:06:b7:64:ea:c2:
        ba:c7:b1:4b:5d:7c:81:26:a7:db:67:af:1f:4c:d7:f2:
        67:03:e3:59:9c:43:83:d7:d2:53:03:a0:de:0a:ab:5f:
        e6:54:35:bf:a2:e0:b2:90:63:ac:84:59:e0:19:38:81
    Fingerprint (MD5):
        5C:93:7A:87:25:20:27:A2:F4:65:2F:66:E5:40:F2:77
    Fingerprint (SHA1):
        04:1F:9C:20:99:5A:8C:B0:D4:83:FB:24:C9:B6:FD:EF:01:CD:F4:91


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #3725: BridgeWithAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeArmy.der with flags  -d EE1DB -f    -t Navy.der - PASSED
chains.sh: Creating DB ArmyDB
certutil -N -d ArmyDB -f ArmyDB/dbpasswd
chains.sh: #3726: BridgeWithHalfAIA: Creating DB ArmyDB  - PASSED
chains.sh: Creating Root CA Army
certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army  -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1128110559 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3727: BridgeWithHalfAIA: Creating Root CA Army  - PASSED
chains.sh: Exporting Root CA Army.der
certutil -L -d ArmyDB -r -n Army -o Army.der
chains.sh: #3728: BridgeWithHalfAIA: Exporting Root CA Army.der  - PASSED
chains.sh: Creating DB NavyDB
certutil -N -d NavyDB -f NavyDB/dbpasswd
chains.sh: #3729: BridgeWithHalfAIA: Creating DB NavyDB  - PASSED
chains.sh: Creating Root CA Navy
certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy  -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1128110560 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3730: BridgeWithHalfAIA: Creating Root CA Navy  - PASSED
chains.sh: Exporting Root CA Navy.der
certutil -L -d NavyDB -r -n Navy -o Navy.der
chains.sh: #3731: BridgeWithHalfAIA: Exporting Root CA Navy.der  - PASSED
chains.sh: Creating DB BridgeDB
certutil -N -d BridgeDB -f BridgeDB/dbpasswd
chains.sh: #3732: BridgeWithHalfAIA: Creating DB BridgeDB  - PASSED
chains.sh: Creating Bridge certifiate request BridgeReq.der
certutil -s "CN=Bridge Bridge, O=Bridge, C=US"  -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o BridgeReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3733: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der  - PASSED
chains.sh: Creating certficate BridgeArmy.der signed by Army
certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1128110561 -7 Bridge@Army  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3734: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army  - PASSED
chains.sh: Importing certificate BridgeArmy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der
chains.sh: #3735: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database  - PASSED
chains.sh: Creating certficate BridgeNavy.der signed by Navy
certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1128110562 -7 Bridge@Navy  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3736: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy  - PASSED
chains.sh: Importing certificate BridgeNavy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der
chains.sh: #3737: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database  - PASSED
chains.sh: Generating PKCS7 package from BridgeDB database
cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7
chains.sh: #3738: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #3739: BridgeWithHalfAIA: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3740: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Bridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1128110563   --extAIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8556/buildnss02-10869-Bridge-1128110461.p7
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #3741: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate CA1Bridge.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der
chains.sh: #3742: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #3743: BridgeWithHalfAIA: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3744: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1128110564   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3745: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE1CA1.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der
chains.sh: #3746: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #3747: BridgeWithHalfAIA: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3748: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2Bridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1128110565   --extAIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8556/buildnss02-10869-BridgeNavy-1128110462.der
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #3749: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate CA2Bridge.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der
chains.sh: #3750: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database  - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #3751: BridgeWithHalfAIA: Creating DB EE2DB  - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US"  -R  -d EE2DB -f EE2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3752: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der  - PASSED
chains.sh: Creating certficate EE2CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1128110566   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3753: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate EE2CA2.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der
chains.sh: #3754: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database  - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB     -t Army.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]:
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Bridge Bridge,O=Bridge,C=US
Returned value is 1, expected result is fail
chains.sh: #3755: BridgeWithHalfAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB     -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB -f    -t Army.der
vfychain -d EE1DB -pp -vv  -f    EE1CA1.der CA1Bridge.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. bridge@navy [Certificate Authority]:
Email Address(es): bridge@navy
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Navy ROOT CA,O=Navy,C=US
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Navy ROOT CA,O=Navy,C=US
Returned value is 1, expected result is fail
chains.sh: #3756: BridgeWithHalfAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB -f    -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB -f    -t Navy.der
vfychain -d EE1DB -pp -vv  -f    EE1CA1.der CA1Bridge.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128110560 (0x433d99e0)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 16:05:44 2012
            Not After : Tue Nov 28 16:05:44 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cd:0b:1d:e2:13:88:aa:46:f1:bf:d7:30:d9:27:95:7f:
                    f7:01:2d:4b:70:af:fb:3b:03:21:9c:7c:0c:c3:51:8e:
                    34:44:15:15:6b:d6:bc:2d:d2:4b:99:d4:84:2e:e3:de:
                    bb:dc:8a:52:17:01:83:12:9c:20:06:df:00:e8:0f:e5:
                    05:65:a1:dd:77:9d:62:b8:1b:29:ee:a0:0b:55:fd:fc:
                    e2:b9:67:27:ba:3d:09:1a:e7:43:dd:f8:d1:d4:ce:75:
                    e4:1d:37:6a:5c:5e:41:81:97:e6:aa:d6:f3:80:b8:a7:
                    04:60:d5:9e:06:5c:6b:d8:a6:a7:b5:81:99:5e:ee:ef
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        0b:f4:e6:1a:65:09:c3:cf:11:b0:27:34:3c:58:fb:14:
        ee:e4:2a:f9:32:bc:a4:8a:0f:be:03:e1:ea:bf:e8:30:
        6a:81:01:88:48:73:17:d6:18:3b:7f:d3:6c:22:f8:a5:
        2e:da:51:ac:87:92:ed:82:7d:15:71:80:93:20:1a:50:
        d7:a5:1e:af:43:9e:3b:a8:e3:96:18:e1:80:1b:a6:5a:
        31:03:13:ef:82:56:69:f8:ba:5c:d3:fd:8b:6d:dc:40:
        a0:18:ce:36:38:70:06:2e:9d:2f:c5:14:f0:eb:d1:74:
        85:f5:91:79:8d:c0:7d:b5:b5:10:91:4d:b1:0c:2d:8e
    Fingerprint (MD5):
        C2:79:A2:28:9F:78:1A:B7:03:CF:6A:90:81:D6:63:57
    Fingerprint (SHA1):
        8F:13:23:20:65:7E:A7:89:C3:8E:AB:10:7B:15:4C:21:4B:8D:F2:52


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #3757: BridgeWithHalfAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB -f    -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeArmy.der with flags  -d EE1DB -f    -t Navy.der
vfychain -d EE1DB -pp -vv  -f    EE1CA1.der CA1Bridge.der BridgeArmy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128110560 (0x433d99e0)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 16:05:44 2012
            Not After : Tue Nov 28 16:05:44 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cd:0b:1d:e2:13:88:aa:46:f1:bf:d7:30:d9:27:95:7f:
                    f7:01:2d:4b:70:af:fb:3b:03:21:9c:7c:0c:c3:51:8e:
                    34:44:15:15:6b:d6:bc:2d:d2:4b:99:d4:84:2e:e3:de:
                    bb:dc:8a:52:17:01:83:12:9c:20:06:df:00:e8:0f:e5:
                    05:65:a1:dd:77:9d:62:b8:1b:29:ee:a0:0b:55:fd:fc:
                    e2:b9:67:27:ba:3d:09:1a:e7:43:dd:f8:d1:d4:ce:75:
                    e4:1d:37:6a:5c:5e:41:81:97:e6:aa:d6:f3:80:b8:a7:
                    04:60:d5:9e:06:5c:6b:d8:a6:a7:b5:81:99:5e:ee:ef
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        0b:f4:e6:1a:65:09:c3:cf:11:b0:27:34:3c:58:fb:14:
        ee:e4:2a:f9:32:bc:a4:8a:0f:be:03:e1:ea:bf:e8:30:
        6a:81:01:88:48:73:17:d6:18:3b:7f:d3:6c:22:f8:a5:
        2e:da:51:ac:87:92:ed:82:7d:15:71:80:93:20:1a:50:
        d7:a5:1e:af:43:9e:3b:a8:e3:96:18:e1:80:1b:a6:5a:
        31:03:13:ef:82:56:69:f8:ba:5c:d3:fd:8b:6d:dc:40:
        a0:18:ce:36:38:70:06:2e:9d:2f:c5:14:f0:eb:d1:74:
        85:f5:91:79:8d:c0:7d:b5:b5:10:91:4d:b1:0c:2d:8e
    Fingerprint (MD5):
        C2:79:A2:28:9F:78:1A:B7:03:CF:6A:90:81:D6:63:57
    Fingerprint (SHA1):
        8F:13:23:20:65:7E:A7:89:C3:8E:AB:10:7B:15:4C:21:4B:8D:F2:52


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #3758: BridgeWithHalfAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeArmy.der with flags  -d EE1DB -f    -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der BridgeArmy.der with flags  -d EE1DB -f    -t Army.der
vfychain -d EE1DB -pp -vv  -f    EE2CA2.der BridgeArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=EE2 EE,O=EE2,C=US :
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=CA2 Intermediate,O=CA2,C=US
Returned value is 1, expected result is fail
chains.sh: #3759: BridgeWithHalfAIA: Verifying certificate(s)  EE2CA2.der BridgeArmy.der with flags  -d EE1DB -f    -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeArmy.der with flags  -d EE1DB -f    -t Army.der
vfychain -d EE1DB -pp -vv  -f    EE2CA2.der CA2Bridge.der BridgeArmy.der  -t Army.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128110559 (0x433d99df)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Wed Nov 28 16:05:43 2012
            Not After : Tue Nov 28 16:05:43 2062
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c8:56:84:6f:7c:8a:d5:da:bd:14:27:f4:2f:f9:7a:f4:
                    72:ed:24:57:c5:d9:e7:3d:5f:87:58:f6:9e:16:b1:c4:
                    64:0d:c7:96:ff:d3:13:88:23:9a:32:cb:bb:95:cb:b8:
                    98:66:30:45:cb:aa:29:dd:db:89:17:38:78:0a:e7:56:
                    14:aa:1f:2e:b2:bf:69:b7:bf:2d:15:04:be:1a:4c:13:
                    2e:01:05:98:f0:ee:48:9c:81:84:80:c2:65:6c:9d:2d:
                    70:42:39:cd:57:46:d2:d4:43:20:bf:1c:6d:6d:ec:0c:
                    33:be:a0:98:93:64:e4:f4:65:e9:5a:c7:c4:7b:04:17
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1c:56:c0:e8:9e:aa:37:1c:59:2b:61:c4:56:28:3f:fe:
        8e:f4:fe:e3:ae:0a:b2:74:b3:04:ef:50:ec:e5:e7:89:
        b5:33:75:b4:3b:0f:07:ac:3b:c8:ac:69:98:59:04:57:
        a5:55:73:04:e7:22:35:d9:e1:c9:cb:90:e7:e1:dd:ef:
        7e:68:2a:0c:88:69:b3:73:b8:fe:0b:94:13:42:cc:4e:
        ba:4c:8e:63:1d:4e:ee:df:ca:e0:f9:e4:54:fa:f1:dc:
        d7:c2:06:d6:ce:00:72:a8:d0:54:ef:f8:46:38:a7:cf:
        ca:9a:5f:00:b2:92:39:5f:1f:fd:06:1f:5e:f8:d3:6f
    Fingerprint (MD5):
        63:C5:31:6E:97:75:21:C5:CD:64:22:90:42:07:31:56
    Fingerprint (SHA1):
        F4:51:27:2C:9D:77:5B:52:B2:E5:61:0D:72:79:B2:69:E3:88:57:AA


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #3760: BridgeWithHalfAIA: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeArmy.der with flags  -d EE1DB -f    -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der with flags  -d EE1DB -f    -t Navy.der
vfychain -d EE1DB -pp -vv  -f    EE2CA2.der CA2Bridge.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128110560 (0x433d99e0)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 16:05:44 2012
            Not After : Tue Nov 28 16:05:44 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cd:0b:1d:e2:13:88:aa:46:f1:bf:d7:30:d9:27:95:7f:
                    f7:01:2d:4b:70:af:fb:3b:03:21:9c:7c:0c:c3:51:8e:
                    34:44:15:15:6b:d6:bc:2d:d2:4b:99:d4:84:2e:e3:de:
                    bb:dc:8a:52:17:01:83:12:9c:20:06:df:00:e8:0f:e5:
                    05:65:a1:dd:77:9d:62:b8:1b:29:ee:a0:0b:55:fd:fc:
                    e2:b9:67:27:ba:3d:09:1a:e7:43:dd:f8:d1:d4:ce:75:
                    e4:1d:37:6a:5c:5e:41:81:97:e6:aa:d6:f3:80:b8:a7:
                    04:60:d5:9e:06:5c:6b:d8:a6:a7:b5:81:99:5e:ee:ef
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        0b:f4:e6:1a:65:09:c3:cf:11:b0:27:34:3c:58:fb:14:
        ee:e4:2a:f9:32:bc:a4:8a:0f:be:03:e1:ea:bf:e8:30:
        6a:81:01:88:48:73:17:d6:18:3b:7f:d3:6c:22:f8:a5:
        2e:da:51:ac:87:92:ed:82:7d:15:71:80:93:20:1a:50:
        d7:a5:1e:af:43:9e:3b:a8:e3:96:18:e1:80:1b:a6:5a:
        31:03:13:ef:82:56:69:f8:ba:5c:d3:fd:8b:6d:dc:40:
        a0:18:ce:36:38:70:06:2e:9d:2f:c5:14:f0:eb:d1:74:
        85:f5:91:79:8d:c0:7d:b5:b5:10:91:4d:b1:0c:2d:8e
    Fingerprint (MD5):
        C2:79:A2:28:9F:78:1A:B7:03:CF:6A:90:81:D6:63:57
    Fingerprint (SHA1):
        8F:13:23:20:65:7E:A7:89:C3:8E:AB:10:7B:15:4C:21:4B:8D:F2:52


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #3761: BridgeWithHalfAIA: Verifying certificate(s)  EE2CA2.der CA2Bridge.der with flags  -d EE1DB -f    -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeArmy.der with flags  -d EE1DB -f    -t Navy.der
vfychain -d EE1DB -pp -vv  -f    EE2CA2.der CA2Bridge.der BridgeArmy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128110560 (0x433d99e0)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 16:05:44 2012
            Not After : Tue Nov 28 16:05:44 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cd:0b:1d:e2:13:88:aa:46:f1:bf:d7:30:d9:27:95:7f:
                    f7:01:2d:4b:70:af:fb:3b:03:21:9c:7c:0c:c3:51:8e:
                    34:44:15:15:6b:d6:bc:2d:d2:4b:99:d4:84:2e:e3:de:
                    bb:dc:8a:52:17:01:83:12:9c:20:06:df:00:e8:0f:e5:
                    05:65:a1:dd:77:9d:62:b8:1b:29:ee:a0:0b:55:fd:fc:
                    e2:b9:67:27:ba:3d:09:1a:e7:43:dd:f8:d1:d4:ce:75:
                    e4:1d:37:6a:5c:5e:41:81:97:e6:aa:d6:f3:80:b8:a7:
                    04:60:d5:9e:06:5c:6b:d8:a6:a7:b5:81:99:5e:ee:ef
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        0b:f4:e6:1a:65:09:c3:cf:11:b0:27:34:3c:58:fb:14:
        ee:e4:2a:f9:32:bc:a4:8a:0f:be:03:e1:ea:bf:e8:30:
        6a:81:01:88:48:73:17:d6:18:3b:7f:d3:6c:22:f8:a5:
        2e:da:51:ac:87:92:ed:82:7d:15:71:80:93:20:1a:50:
        d7:a5:1e:af:43:9e:3b:a8:e3:96:18:e1:80:1b:a6:5a:
        31:03:13:ef:82:56:69:f8:ba:5c:d3:fd:8b:6d:dc:40:
        a0:18:ce:36:38:70:06:2e:9d:2f:c5:14:f0:eb:d1:74:
        85:f5:91:79:8d:c0:7d:b5:b5:10:91:4d:b1:0c:2d:8e
    Fingerprint (MD5):
        C2:79:A2:28:9F:78:1A:B7:03:CF:6A:90:81:D6:63:57
    Fingerprint (SHA1):
        8F:13:23:20:65:7E:A7:89:C3:8E:AB:10:7B:15:4C:21:4B:8D:F2:52


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #3762: BridgeWithHalfAIA: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeArmy.der with flags  -d EE1DB -f    -t Navy.der - PASSED
chains.sh: Creating DB ArmyDB
certutil -N -d ArmyDB -f ArmyDB/dbpasswd
chains.sh: #3763: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB  - PASSED
chains.sh: Creating Root CA Army
certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army  -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1128110567 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3764: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army  - PASSED
chains.sh: Exporting Root CA Army.der
certutil -L -d ArmyDB -r -n Army -o Army.der
chains.sh: #3765: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der  - PASSED
chains.sh: Creating DB NavyDB
certutil -N -d NavyDB -f NavyDB/dbpasswd
chains.sh: #3766: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB  - PASSED
chains.sh: Creating Root CA Navy
certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy  -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1128110568 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3767: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy  - PASSED
chains.sh: Exporting Root CA Navy.der
certutil -L -d NavyDB -r -n Navy -o Navy.der
chains.sh: #3768: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der  - PASSED
chains.sh: Creating DB CAArmyDB
certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd
chains.sh: #3769: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB  - PASSED
chains.sh: Creating Intermediate certifiate request CAArmyReq.der
certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US"  -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o CAArmyReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3770: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der  - PASSED
chains.sh: Creating certficate CAArmyArmy.der signed by Army
certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 1128110569   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.1.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3771: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army  - PASSED
chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database
certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der
chains.sh: #3772: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database  - PASSED
chains.sh: Creating DB CANavyDB
certutil -N -d CANavyDB -f CANavyDB/dbpasswd
chains.sh: #3773: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB  - PASSED
chains.sh: Creating Intermediate certifiate request CANavyReq.der
certutil -s "CN=CANavy Intermediate, O=CANavy, C=US"  -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o CANavyReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3774: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der  - PASSED
chains.sh: Creating certficate CANavyNavy.der signed by Navy
certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 1128110570   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.2.0
1

n
y
OID.2.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3775: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy  - PASSED
chains.sh: Importing certificate CANavyNavy.der to CANavyDB database
certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der
chains.sh: #3776: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database  - PASSED
chains.sh: Creating DB BridgeDB
certutil -N -d BridgeDB -f BridgeDB/dbpasswd
chains.sh: #3777: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB  - PASSED
chains.sh: Creating Bridge certifiate request BridgeReq.der
certutil -s "CN=Bridge Bridge, O=Bridge, C=US"  -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o BridgeReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3778: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der  - PASSED
chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy
certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 1128110571 -7 Bridge@CAArmy  --extCP --extPM < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.1.1
1

n
n
n
OID.1.1
OID.2.1
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N]
Is this a critical extension [y/N]?
chains.sh: #3779: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy  - PASSED
chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der
chains.sh: #3780: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database  - PASSED
chains.sh: Creating certficate BridgeCANavy.der signed by CANavy
certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 1128110572 -7 Bridge@CANavy  --extCP --extPM < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.2.0
1

n
y
OID.2.1
1

n
n
n
OID.2.1
OID.1.1
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N]
Is this a critical extension [y/N]?
chains.sh: #3781: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy  - PASSED
chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der
chains.sh: #3782: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database  - PASSED
chains.sh: Generating PKCS7 package from BridgeDB database
cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7
chains.sh: #3783: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #3784: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3785: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Bridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1128110573   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.1
1

n
y
OID.2.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3786: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate CA1Bridge.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der
chains.sh: #3787: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #3788: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3789: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2Bridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1128110574   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3790: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate CA2Bridge.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der
chains.sh: #3791: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #3792: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3793: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1128110575   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.2.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3794: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE1CA1.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der
chains.sh: #3795: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database  - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #3796: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB  - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US"  -R  -d EE2DB -f EE2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3797: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der  - PASSED
chains.sh: Creating certficate EE2CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1128110576   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3798: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate EE2CA2.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der
chains.sh: #3799: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database  - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.1.0  -t Army.der
vfychain  -pp -vv     -o OID.1.0  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3800: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.1.0  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.1.1  -t Army.der
vfychain  -pp -vv     -o OID.1.1  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128110567 (0x433d99e7)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Wed Nov 28 16:05:47 2012
            Not After : Tue Nov 28 16:05:47 2062
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    db:0b:8f:4d:7f:f2:93:4b:f7:0f:e9:89:b0:45:c0:2c:
                    87:f0:79:37:69:d8:b6:88:85:96:81:37:34:59:74:f9:
                    af:a7:e8:b9:e0:09:c8:8a:6e:ea:c2:48:08:87:e3:ab:
                    93:9e:52:6b:c7:39:91:32:9e:f2:96:2f:49:28:60:b8:
                    15:14:7e:44:11:c6:5b:a0:c4:46:00:1b:6d:36:3e:7e:
                    f6:32:5a:23:ae:10:b1:bc:bc:6f:8c:0f:3b:c7:ba:2c:
                    09:d8:d6:d0:d7:59:c6:97:b9:5f:7c:bb:16:41:32:0a:
                    56:ad:9a:44:b7:ed:b3:0d:90:4a:b6:5e:03:67:7b:c9
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        4a:1a:98:14:bd:10:d2:8a:6f:d9:a2:98:86:37:fd:ca:
        63:90:9e:f0:df:c8:58:f1:f5:da:d4:7f:b7:14:5c:23:
        f3:42:b8:de:31:23:6a:03:2b:79:50:da:11:7a:96:b0:
        e9:d8:09:3e:dd:c3:d3:a0:bb:c8:3b:0b:1a:12:f4:67:
        a0:fa:81:e3:c7:d8:9e:f1:b2:06:80:99:bc:ba:69:23:
        14:5c:83:4c:3e:b5:c1:39:29:09:7a:4b:52:7c:63:7f:
        8e:21:40:2c:48:a7:da:62:88:96:f7:0c:fa:4a:df:82:
        d3:2c:06:01:7c:52:0a:0b:f3:dd:1d:82:a9:88:73:23
    Fingerprint (MD5):
        5E:48:16:FF:21:CD:AA:97:69:B7:F4:CF:88:AC:59:2B
    Fingerprint (SHA1):
        72:05:FA:38:5A:A5:1E:0C:76:A2:F3:72:7B:CB:C4:10:3D:61:F6:82


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US"
Returned value is 0, expected result is pass
chains.sh: #3801: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.1.1  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.2.0  -t Army.der
vfychain  -pp -vv     -o OID.2.0  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3802: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.2.0  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.2.1  -t Army.der
vfychain  -pp -vv     -o OID.2.1  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3803: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.2.1  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.1.0  -t Navy.der
vfychain  -pp -vv     -o OID.1.0  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3804: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.1.0  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.1.1  -t Navy.der
vfychain  -pp -vv     -o OID.1.1  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3805: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.1.1  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.2.0  -t Navy.der
vfychain  -pp -vv     -o OID.2.0  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3806: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.2.0  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.2.1  -t Navy.der
vfychain  -pp -vv     -o OID.2.1  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3807: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.2.1  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.1.0  -t Navy.der
vfychain  -pp -vv     -o OID.1.0  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3808: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.1.0  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.1.1  -t Navy.der
vfychain  -pp -vv     -o OID.1.1  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3809: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.1.1  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.2.0  -t Navy.der
vfychain  -pp -vv     -o OID.2.0  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128110568 (0x433d99e8)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 16:05:47 2012
            Not After : Tue Nov 28 16:05:47 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:7e:05:f0:96:46:21:6b:62:18:be:ec:a2:09:4f:b6:
                    c1:d9:75:b0:66:cc:c9:d3:d0:f1:13:3b:ff:fc:2a:86:
                    5d:5a:91:b1:98:0b:6c:79:e1:ce:32:c5:d0:17:f9:40:
                    54:e7:d9:5a:35:d8:74:a0:eb:a0:0c:96:c6:68:c5:d7:
                    2c:94:90:f5:10:c0:8f:46:f6:19:1b:e0:62:1a:64:e6:
                    f7:93:bf:3e:80:98:24:14:0a:76:a3:aa:aa:c2:32:b1:
                    e6:14:f7:4c:29:b5:8b:93:c4:2d:a4:7b:d6:dc:0c:14:
                    67:d5:4e:02:c6:c1:99:39:58:94:f9:6a:f7:5e:75:c1
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1f:bc:bf:f7:0e:26:94:71:97:bb:40:9b:21:4a:a6:94:
        1b:5f:47:69:b5:74:76:c6:5d:03:ec:fd:b4:1c:25:ad:
        45:9a:b1:81:20:0e:ab:32:21:67:54:66:55:ce:7f:d5:
        d7:90:fd:0f:90:c6:fd:71:61:95:0b:51:68:a0:19:bf:
        2e:40:f3:64:3b:cc:d2:6f:11:33:03:02:8d:5c:0f:30:
        fd:ad:d2:8a:30:f4:5d:aa:31:88:bd:87:ef:fc:9a:4f:
        c3:7f:6a:cd:7f:f4:c5:33:91:2a:41:6d:44:91:d5:53:
        e5:93:99:75:ff:1e:89:7a:70:4e:b0:18:74:c5:0a:e9
    Fingerprint (MD5):
        E3:24:B3:80:35:61:21:EA:0F:54:50:6B:39:3E:16:0E
    Fingerprint (SHA1):
        EA:CF:17:86:FD:D1:BA:D6:1D:BD:E7:09:4D:EF:B8:AD:69:4F:12:DE


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US"
Returned value is 0, expected result is pass
chains.sh: #3810: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.2.0  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.2.1  -t Navy.der
vfychain  -pp -vv     -o OID.2.1  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3811: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.2.1  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.1.0  -t Army.der
vfychain  -pp -vv     -o OID.1.0  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3812: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.1.0  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.1.1  -t Army.der
vfychain  -pp -vv     -o OID.1.1  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3813: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.1.1  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.2.0  -t Army.der
vfychain  -pp -vv     -o OID.2.0  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3814: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.2.0  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.2.1  -t Army.der
vfychain  -pp -vv     -o OID.2.1  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3815: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.2.1  -t Army.der - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #3816: RealCerts: Creating DB AllDB  - PASSED
chains.sh: Importing certificate TestCA.ca.cert to AllDB database
certutil -A -n TestCA.ca  -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/TestCA.ca.cert
chains.sh: #3817: RealCerts: Importing certificate TestCA.ca.cert to AllDB database  - PASSED
chains.sh: Importing certificate TestUser50.cert to AllDB database
certutil -A -n TestUser50  -t "" -d AllDB -f AllDB/dbpasswd -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/TestUser50.cert
chains.sh: #3818: RealCerts: Importing certificate TestUser50.cert to AllDB database  - PASSED
chains.sh: Importing certificate TestUser51.cert to AllDB database
certutil -A -n TestUser51  -t "" -d AllDB -f AllDB/dbpasswd -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/TestUser51.cert
chains.sh: #3819: RealCerts: Importing certificate TestUser51.cert to AllDB database  - PASSED
chains.sh: Importing certificate PayPalRootCA.cert to AllDB database
certutil -A -n PayPalRootCA  -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/PayPalRootCA.cert
chains.sh: #3820: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database  - PASSED
chains.sh: Importing certificate PayPalICA.cert to AllDB database
certutil -A -n PayPalICA  -t "" -d AllDB -f AllDB/dbpasswd -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/PayPalICA.cert
chains.sh: #3821: RealCerts: Importing certificate PayPalICA.cert to AllDB database  - PASSED
chains.sh: Importing certificate PayPalEE.cert to AllDB database
certutil -A -n PayPalEE  -t "" -d AllDB -f AllDB/dbpasswd -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/PayPalEE.cert
chains.sh: #3822: RealCerts: Importing certificate PayPalEE.cert to AllDB database  - PASSED
chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database
certutil -A -n BrAirWaysBadSig  -t "" -d AllDB -f AllDB/dbpasswd -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/BrAirWaysBadSig.cert
chains.sh: #3823: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  TestUser50.cert with flags  -d AllDB    
vfychain -d AllDB -pp -vv      /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/TestUser50.cert 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Mar 19 21:04:25 2008
            Not After : Tue Mar 19 21:04:25 2058
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e6:a7:fb:18:60:23:4e:1f:bf:76:e3:9f:4d:ee:69:61:
                    fa:17:51:d8:fa:ed:9b:5a:8d:77:eb:bd:cf:3a:33:82:
                    9b:ef:08:fb:8f:7e:b9:53:65:b6:9f:e4:a1:e6:d9:ae:
                    c5:66:16:6f:eb:ae:59:e6:e2:ab:af:53:37:67:e2:03:
                    a6:ec:29:e4:2d:65:3f:51:c8:29:44:c0:f5:d8:a5:c0:
                    a3:e8:7c:f5:78:88:1e:39:1b:f9:af:85:c6:45:dc:3b:
                    2c:df:27:4d:c3:36:72:cf:d8:b2:61:58:8f:43:bc:d9:
                    aa:9a:55:96:99:d1:c2:56:42:4a:f8:b1:a3:25:b4:fd
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        b1:93:e9:b7:f6:40:fc:3d:20:5d:b6:e7:bd:a6:5d:0e:
        0c:cf:09:ac:09:70:cc:e1:12:e7:c8:f4:3d:53:8f:18:
        57:b9:c7:5c:60:66:fa:83:e1:82:78:e1:d9:21:66:dc:
        58:e1:03:b4:c3:75:6f:a4:3f:25:73:02:b5:e8:e2:38:
        5c:b1:61:eb:dc:86:15:3e:3c:c7:f6:db:94:b8:08:62:
        57:44:92:fe:5c:15:fb:67:7a:d4:83:22:44:ef:4f:55:
        0b:5b:b9:ec:0b:f3:da:c5:03:f2:39:e9:5b:dc:b9:6a:
        f5:01:9b:02:5f:d5:6f:0d:4d:2b:7a:0d:38:eb:84:d7
    Fingerprint (MD5):
        35:D0:B2:A4:9D:E6:0A:4C:D6:04:28:C9:B5:5F:18:27
    Fingerprint (SHA1):
        52:7C:99:B3:6C:71:6D:F8:22:66:4E:60:D0:08:90:A7:90:94:FB:AC

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=TestUser50,E=TestUser50@bogus.com,O=BOGUS NSS,L=Mo
    untain View,ST=California,C=US"
Returned value is 0, expected result is pass
chains.sh: #3824: RealCerts: Verifying certificate(s)  TestUser50.cert with flags  -d AllDB     - PASSED
chains.sh: Verifying certificate(s)  TestUser51.cert with flags  -d AllDB    
vfychain -d AllDB -pp -vv      /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/TestUser51.cert 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Mar 19 21:04:25 2008
            Not After : Tue Mar 19 21:04:25 2058
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e6:a7:fb:18:60:23:4e:1f:bf:76:e3:9f:4d:ee:69:61:
                    fa:17:51:d8:fa:ed:9b:5a:8d:77:eb:bd:cf:3a:33:82:
                    9b:ef:08:fb:8f:7e:b9:53:65:b6:9f:e4:a1:e6:d9:ae:
                    c5:66:16:6f:eb:ae:59:e6:e2:ab:af:53:37:67:e2:03:
                    a6:ec:29:e4:2d:65:3f:51:c8:29:44:c0:f5:d8:a5:c0:
                    a3:e8:7c:f5:78:88:1e:39:1b:f9:af:85:c6:45:dc:3b:
                    2c:df:27:4d:c3:36:72:cf:d8:b2:61:58:8f:43:bc:d9:
                    aa:9a:55:96:99:d1:c2:56:42:4a:f8:b1:a3:25:b4:fd
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        b1:93:e9:b7:f6:40:fc:3d:20:5d:b6:e7:bd:a6:5d:0e:
        0c:cf:09:ac:09:70:cc:e1:12:e7:c8:f4:3d:53:8f:18:
        57:b9:c7:5c:60:66:fa:83:e1:82:78:e1:d9:21:66:dc:
        58:e1:03:b4:c3:75:6f:a4:3f:25:73:02:b5:e8:e2:38:
        5c:b1:61:eb:dc:86:15:3e:3c:c7:f6:db:94:b8:08:62:
        57:44:92:fe:5c:15:fb:67:7a:d4:83:22:44:ef:4f:55:
        0b:5b:b9:ec:0b:f3:da:c5:03:f2:39:e9:5b:dc:b9:6a:
        f5:01:9b:02:5f:d5:6f:0d:4d:2b:7a:0d:38:eb:84:d7
    Fingerprint (MD5):
        35:D0:B2:A4:9D:E6:0A:4C:D6:04:28:C9:B5:5F:18:27
    Fingerprint (SHA1):
        52:7C:99:B3:6C:71:6D:F8:22:66:4E:60:D0:08:90:A7:90:94:FB:AC

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=TestUser51,E=TestUser51@bogus.com,O=BOGUS NSS,L=Mo
    untain View,ST=California,C=US"
Returned value is 0, expected result is pass
chains.sh: #3825: RealCerts: Verifying certificate(s)  TestUser51.cert with flags  -d AllDB     - PASSED
chains.sh: Verifying certificate(s)  PayPalEE.cert with flags  -d AllDB    -o OID.2.16.840.1.113733.1.7.23.6 
vfychain -d AllDB -pp -vv     -o OID.2.16.840.1.113733.1.7.23.6  /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/PayPalEE.cert 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            58:f3:9e:5c:01:2b:19:47:21:a9:8e:e4:ee:e0:f8:bf
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "OU=Class 3 Public Primary Certification Authority,O="VeriSig
            n, Inc.",C=US"
        Validity:
            Not Before: Wed Nov 08 00:00:00 2006
            Not After : Sun Nov 07 23:59:59 2021
        Subject: "CN=VeriSign Class 3 Public Primary Certification Authority 
            - G5,OU="(c) 2006 VeriSign, Inc. - For authorized use only",OU=Ve
            riSign Trust Network,O="VeriSign, Inc.",C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    af:24:08:08:29:7a:35:9e:60:0c:aa:e7:4b:3b:4e:dc:
                    7c:bc:3c:45:1c:bb:2b:e0:fe:29:02:f9:57:08:a3:64:
                    85:15:27:f5:f1:ad:c8:31:89:5d:22:e8:2a:aa:a6:42:
                    b3:8f:f8:b9:55:b7:b1:b7:4b:b3:fe:8f:7e:07:57:ec:
                    ef:43:db:66:62:15:61:cf:60:0d:a4:d8:de:f8:e0:c3:
                    62:08:3d:54:13:eb:49:ca:59:54:85:26:e5:2b:8f:1b:
                    9f:eb:f5:a1:91:c2:33:49:d8:43:63:6a:52:4b:d2:8f:
                    e8:70:51:4d:d1:89:69:7b:c7:70:f6:b3:dc:12:74:db:
                    7b:5d:4b:56:d3:96:bf:15:77:a1:b0:f4:a2:25:f2:af:
                    1c:92:67:18:e5:f4:06:04:ef:90:b9:e4:00:e4:dd:3a:
                    b5:19:ff:02:ba:f4:3c:ee:e0:8b:eb:37:8b:ec:f4:d7:
                    ac:f2:f6:f0:3d:af:dd:75:91:33:19:1d:1c:40:cb:74:
                    24:19:21:93:d9:14:fe:ac:2a:52:c7:8f:d5:04:49:e4:
                    8d:63:47:88:3c:69:83:cb:fe:47:bd:2b:7e:4f:c5:95:
                    ae:0e:9d:d4:d1:43:c0:67:73:e3:14:08:7e:e5:3f:9f:
                    73:b8:33:0a:cf:5d:3f:34:87:96:8a:ee:53:e8:25:15
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: CRL Distribution Points
            Distribution point:
                URI: "http://crl.verisign.com/pca3.crl"

            Name: Certificate Key Usage
            Critical: True
            Usages: Certificate Signing
                    CRL Signing

            Name: OID.1.3.6.1.5.5.7.1.12
            Data: Sequence {
                [1]: {
                    [0]: {
                        Sequence {
                            Sequence {
                                Sequence {
                                    "image/gif"
                                    Sequence {
                                        Sequence {
                                            Sequence {
                                                SHA-1
                                            }
                                            8f:e5:d3:1a:86:ac:8d:8e:6b:c3:cf:
                                            80:6a:d4:48:18:2c:7b:19:2e
                                        }
                                    }
                                    Sequence {
                                        "http://logo.verisign.com/vslogo.gif"
                                    }
                                }
                            }
                        }
                    }
                }
            }

            Name: Certificate Policies
            Data: 
                Policy Name: Certificate Policies AnyPolicy
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                    Policy Qualifier Data: "https://www.verisign.com/cps"

            Name: Certificate Subject Key ID
            Data:
                7f:d3:65:a7:c2:dd:ec:bb:f0:30:09:f3:43:39:fa:02:
                af:33:31:33

            Name: Certificate Authority Key Identifier
            Issuer: 
                Directory Name: "OU=Class 3 Public Primary Certification Auth
                    ority,O="VeriSign, Inc.",C=US"
            Serial Number:
                70:ba:e4:1d:10:d9:29:34:b6:38:ca:7b:03:cc:ba:bf

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:15:49:5e:6b:26:ce:ee:98:e7:4d:a5:92:3f:75:6a:
        f0:33:0b:fa:09:dc:28:92:ab:8d:6a:31:41:d9:47:31:
        47:46:09:a1:39:05:3e:66:65:19:8b:32:bf:61:2c:1c:
        d5:6a:03:6f:44:dc:3b:af:ef:1b:93:58:d6:bd:ce:d0:
        ed:b6:89:77:51:15:59:32:28:c5:7a:89:8c:da:3e:6d:
        5c:75:ac:86:d4:c7:9e:fd:38:3e:96:73:40:87:34:6a:
        84:4e:31:a8:d2:a2:b9:3c:4e:06:dd:cb:b2:7c:ae:e1:
        d5:9f:1e:74:e5:24:f0:cf:e4:9b:ec:25:ea:cd:ec:f6
    Fingerprint (MD5):
        C8:DE:26:6F:0A:C4:1C:6D:46:9C:CC:AD:0A:C4:D5:1C
    Fingerprint (SHA1):
        87:50:7F:E5:19:BD:E7:A1:19:AE:A3:2F:77:9D:76:30:5D:7A:69:13

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=www.paypal.com,OU=PayPal Production,O="PayPal, Inc
    .",STREET=2211 N 1st St,L=San Jose,ST=California,postalCode=95131-2021,C=
    US,serialNumber=3014267,businessCategory=Private Organization,incorporati
    onState=Delaware,incorporationCountry=US"
Certificate 2 Subject: "CN=VeriSign Class 3 Extended Validation SSL CA,OU=Ter
    ms of use at https://www.verisign.com/rpa (c)06,OU=VeriSign Trust Network
    ,O="VeriSign, Inc.",C=US"
Returned value is 0, expected result is pass
chains.sh: #3826: RealCerts: Verifying certificate(s)  PayPalEE.cert with flags  -d AllDB    -o OID.2.16.840.1.113733.1.7.23.6  - PASSED
chains.sh: Verifying certificate(s)  BrAirWaysBadSig.cert with flags  -d AllDB    
vfychain -d AllDB -pp -vv      /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/BrAirWaysBadSig.cert 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. BrAirWaysBadSig :
  ERROR -8181: Peer's Certificate has expired.
Returned value is 1, expected result is fail
chains.sh: #3827: RealCerts: Verifying certificate(s)  BrAirWaysBadSig.cert with flags  -d AllDB     - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #3828: DSA: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1128110577 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3829: DSA: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #3830: DSA: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #3831: DSA: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3832: DSA: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1128110578   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3833: DSA: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
chains.sh: #3834: DSA: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #3835: DSA: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R  -d EE1DB -f EE1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3836: DSA: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1128110579   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3837: DSA: Creating certficate EE1CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE1CA1.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der
chains.sh: #3838: DSA: Importing certificate EE1CA1.der to EE1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #3839: DSA: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3840: DSA: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 1128110580   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3841: DSA: Creating certficate CA2Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA2Root.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der
chains.sh: #3842: DSA: Importing certificate CA2Root.der to CA2DB database  - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #3843: DSA: Creating DB EE2DB  - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R  -d EE2DB -f EE2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3844: DSA: Creating EE certifiate request EE2Req.der  - PASSED
chains.sh: Creating certficate EE2CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1128110581   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3845: DSA: Creating certficate EE2CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate EE2CA2.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der
chains.sh: #3846: DSA: Importing certificate EE2CA2.der to EE2DB database  - PASSED
chains.sh: Creating DB CA3DB
certutil -N -d CA3DB -f CA3DB/dbpasswd
chains.sh: #3847: DSA: Creating DB CA3DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA3Req.der
certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA3Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3848: DSA: Creating Intermediate certifiate request CA3Req.der  - PASSED
chains.sh: Creating certficate CA3Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 1128110582   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3849: DSA: Creating certficate CA3Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA3Root.der to CA3DB database
certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der
chains.sh: #3850: DSA: Importing certificate CA3Root.der to CA3DB database  - PASSED
chains.sh: Creating DB EE3DB
certutil -N -d EE3DB -f EE3DB/dbpasswd
chains.sh: #3851: DSA: Creating DB EE3DB  - PASSED
chains.sh: Creating EE certifiate request EE3Req.der
certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R  -d EE3DB -f EE3DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE3Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3852: DSA: Creating EE certifiate request EE3Req.der  - PASSED
chains.sh: Creating certficate EE3CA3.der signed by CA3
certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 1128110583   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3853: DSA: Creating certficate EE3CA3.der signed by CA3  - PASSED
chains.sh: Importing certificate EE3CA3.der to EE3DB database
certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der
chains.sh: #3854: DSA: Importing certificate EE3CA3.der to EE3DB database  - PASSED
chains.sh: Creating DB CA4DB
certutil -N -d CA4DB -f CA4DB/dbpasswd
chains.sh: #3855: DSA: Creating DB CA4DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA4Req.der
certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA4Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3856: DSA: Creating Intermediate certifiate request CA4Req.der  - PASSED
chains.sh: Creating certficate CA4Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 1128110584   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3857: DSA: Creating certficate CA4Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA4Root.der to CA4DB database
certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der
chains.sh: #3858: DSA: Importing certificate CA4Root.der to CA4DB database  - PASSED
chains.sh: Creating DB EE4DB
certutil -N -d EE4DB -f EE4DB/dbpasswd
chains.sh: #3859: DSA: Creating DB EE4DB  - PASSED
chains.sh: Creating EE certifiate request EE4Req.der
certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R  -d EE4DB -f EE4DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE4Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3860: DSA: Creating EE certifiate request EE4Req.der  - PASSED
chains.sh: Creating certficate EE4CA4.der signed by CA4
certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 1128110585   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3861: DSA: Creating certficate EE4CA4.der signed by CA4  - PASSED
chains.sh: Importing certificate EE4CA4.der to EE4DB database
certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der
chains.sh: #3862: DSA: Importing certificate EE4CA4.der to EE4DB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #3863: DSA: Creating DB AllDB  - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Root.der with flags  -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv      EE1CA1.der CA1Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128110577 (0x433d99f1)
        Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:05:52 2012
            Not After : Tue Nov 28 16:05:52 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: ANSI X9.57 DSA Signature
                Args:
                    30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44:
                    db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb:
                    c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f:
                    41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69:
                    fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8:
                    89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3:
                    c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52:
                    29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db:
                    ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44:
                    29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02:
                    81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:
                    00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:
                    f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:
                    31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:
                    da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:
                    54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:
                    83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:
                    f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:
                    a5:10
            DSA Public Key:
                Prime:
                    98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c:
                    b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04:
                    82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f:
                    af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a:
                    4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad:
                    af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65:
                    c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe:
                    18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d
                Subprime:
                    b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1:
                    76:27:03:81
                Base:
                    04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04:
                    4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c:
                    f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50:
                    82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e:
                    57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b:
                    5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87:
                    60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb:
                    35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10
                PublicValue:
                    89:e3:bb:68:d1:15:d7:8b:43:ea:87:a5:93:1f:f2:67:
                    7f:86:c9:04:55:93:9f:1c:5a:e2:78:74:64:6b:40:6b:
                    94:86:39:61:a9:80:e0:3a:a3:09:97:27:aa:84:8d:6c:
                    ee:64:c6:8f:80:4e:48:a6:aa:b5:e3:3e:9f:2a:37:98:
                    bc:ab:54:47:02:aa:c9:1d:93:5b:e8:25:65:b1:ba:8c:
                    35:69:c0:7e:86:28:a5:f2:bd:41:b6:43:b7:9a:8c:f6:
                    f4:e3:95:73:52:4b:3a:74:08:61:67:dc:b6:0a:84:0a:
                    e4:e6:da:48:ef:63:d6:97:d9:03:87:6c:39:2b:d7:59
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
    Signature:
        30:2c:02:14:2d:e7:87:05:5e:53:0f:8b:74:37:8c:67:
        61:aa:da:c8:dc:4f:bc:84:02:14:2f:5d:03:fe:bc:91:
        62:e3:76:32:cc:04:b7:06:ac:f0:b2:7e:24:99
    Fingerprint (MD5):
        16:C4:EF:BC:78:73:8B:D7:56:76:02:20:6B:07:E8:54
    Fingerprint (SHA1):
        DD:3E:B0:2F:40:72:82:65:3E:D3:37:4B:49:81:F3:FB:DD:C6:85:2C


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3864: DSA: Verifying certificate(s)  EE1CA1.der CA1Root.der with flags  -d AllDB     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Root.der with flags  -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv      EE2CA2.der CA2Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128110577 (0x433d99f1)
        Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:05:52 2012
            Not After : Tue Nov 28 16:05:52 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: ANSI X9.57 DSA Signature
                Args:
                    30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44:
                    db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb:
                    c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f:
                    41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69:
                    fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8:
                    89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3:
                    c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52:
                    29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db:
                    ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44:
                    29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02:
                    81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:
                    00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:
                    f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:
                    31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:
                    da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:
                    54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:
                    83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:
                    f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:
                    a5:10
            DSA Public Key:
                Prime:
                    98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c:
                    b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04:
                    82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f:
                    af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a:
                    4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad:
                    af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65:
                    c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe:
                    18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d
                Subprime:
                    b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1:
                    76:27:03:81
                Base:
                    04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04:
                    4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c:
                    f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50:
                    82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e:
                    57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b:
                    5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87:
                    60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb:
                    35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10
                PublicValue:
                    89:e3:bb:68:d1:15:d7:8b:43:ea:87:a5:93:1f:f2:67:
                    7f:86:c9:04:55:93:9f:1c:5a:e2:78:74:64:6b:40:6b:
                    94:86:39:61:a9:80:e0:3a:a3:09:97:27:aa:84:8d:6c:
                    ee:64:c6:8f:80:4e:48:a6:aa:b5:e3:3e:9f:2a:37:98:
                    bc:ab:54:47:02:aa:c9:1d:93:5b:e8:25:65:b1:ba:8c:
                    35:69:c0:7e:86:28:a5:f2:bd:41:b6:43:b7:9a:8c:f6:
                    f4:e3:95:73:52:4b:3a:74:08:61:67:dc:b6:0a:84:0a:
                    e4:e6:da:48:ef:63:d6:97:d9:03:87:6c:39:2b:d7:59
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
    Signature:
        30:2c:02:14:2d:e7:87:05:5e:53:0f:8b:74:37:8c:67:
        61:aa:da:c8:dc:4f:bc:84:02:14:2f:5d:03:fe:bc:91:
        62:e3:76:32:cc:04:b7:06:ac:f0:b2:7e:24:99
    Fingerprint (MD5):
        16:C4:EF:BC:78:73:8B:D7:56:76:02:20:6B:07:E8:54
    Fingerprint (SHA1):
        DD:3E:B0:2F:40:72:82:65:3E:D3:37:4B:49:81:F3:FB:DD:C6:85:2C


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #3865: DSA: Verifying certificate(s)  EE2CA2.der CA2Root.der with flags  -d AllDB     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE3CA3.der CA3Root.der with flags  -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv      EE3CA3.der CA3Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128110577 (0x433d99f1)
        Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:05:52 2012
            Not After : Tue Nov 28 16:05:52 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: ANSI X9.57 DSA Signature
                Args:
                    30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44:
                    db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb:
                    c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f:
                    41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69:
                    fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8:
                    89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3:
                    c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52:
                    29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db:
                    ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44:
                    29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02:
                    81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:
                    00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:
                    f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:
                    31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:
                    da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:
                    54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:
                    83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:
                    f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:
                    a5:10
            DSA Public Key:
                Prime:
                    98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c:
                    b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04:
                    82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f:
                    af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a:
                    4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad:
                    af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65:
                    c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe:
                    18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d
                Subprime:
                    b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1:
                    76:27:03:81
                Base:
                    04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04:
                    4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c:
                    f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50:
                    82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e:
                    57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b:
                    5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87:
                    60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb:
                    35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10
                PublicValue:
                    89:e3:bb:68:d1:15:d7:8b:43:ea:87:a5:93:1f:f2:67:
                    7f:86:c9:04:55:93:9f:1c:5a:e2:78:74:64:6b:40:6b:
                    94:86:39:61:a9:80:e0:3a:a3:09:97:27:aa:84:8d:6c:
                    ee:64:c6:8f:80:4e:48:a6:aa:b5:e3:3e:9f:2a:37:98:
                    bc:ab:54:47:02:aa:c9:1d:93:5b:e8:25:65:b1:ba:8c:
                    35:69:c0:7e:86:28:a5:f2:bd:41:b6:43:b7:9a:8c:f6:
                    f4:e3:95:73:52:4b:3a:74:08:61:67:dc:b6:0a:84:0a:
                    e4:e6:da:48:ef:63:d6:97:d9:03:87:6c:39:2b:d7:59
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
    Signature:
        30:2c:02:14:2d:e7:87:05:5e:53:0f:8b:74:37:8c:67:
        61:aa:da:c8:dc:4f:bc:84:02:14:2f:5d:03:fe:bc:91:
        62:e3:76:32:cc:04:b7:06:ac:f0:b2:7e:24:99
    Fingerprint (MD5):
        16:C4:EF:BC:78:73:8B:D7:56:76:02:20:6B:07:E8:54
    Fingerprint (SHA1):
        DD:3E:B0:2F:40:72:82:65:3E:D3:37:4B:49:81:F3:FB:DD:C6:85:2C


Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US"
Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US"
Returned value is 0, expected result is pass
chains.sh: #3866: DSA: Verifying certificate(s)  EE3CA3.der CA3Root.der with flags  -d AllDB     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE4CA4.der CA4Root.der with flags  -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv      EE4CA4.der CA4Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128110577 (0x433d99f1)
        Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:05:52 2012
            Not After : Tue Nov 28 16:05:52 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: ANSI X9.57 DSA Signature
                Args:
                    30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44:
                    db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb:
                    c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f:
                    41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69:
                    fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8:
                    89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3:
                    c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52:
                    29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db:
                    ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44:
                    29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02:
                    81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:
                    00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:
                    f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:
                    31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:
                    da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:
                    54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:
                    83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:
                    f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:
                    a5:10
            DSA Public Key:
                Prime:
                    98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c:
                    b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04:
                    82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f:
                    af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a:
                    4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad:
                    af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65:
                    c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe:
                    18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d
                Subprime:
                    b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1:
                    76:27:03:81
                Base:
                    04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04:
                    4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c:
                    f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50:
                    82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e:
                    57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b:
                    5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87:
                    60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb:
                    35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10
                PublicValue:
                    89:e3:bb:68:d1:15:d7:8b:43:ea:87:a5:93:1f:f2:67:
                    7f:86:c9:04:55:93:9f:1c:5a:e2:78:74:64:6b:40:6b:
                    94:86:39:61:a9:80:e0:3a:a3:09:97:27:aa:84:8d:6c:
                    ee:64:c6:8f:80:4e:48:a6:aa:b5:e3:3e:9f:2a:37:98:
                    bc:ab:54:47:02:aa:c9:1d:93:5b:e8:25:65:b1:ba:8c:
                    35:69:c0:7e:86:28:a5:f2:bd:41:b6:43:b7:9a:8c:f6:
                    f4:e3:95:73:52:4b:3a:74:08:61:67:dc:b6:0a:84:0a:
                    e4:e6:da:48:ef:63:d6:97:d9:03:87:6c:39:2b:d7:59
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
    Signature:
        30:2c:02:14:2d:e7:87:05:5e:53:0f:8b:74:37:8c:67:
        61:aa:da:c8:dc:4f:bc:84:02:14:2f:5d:03:fe:bc:91:
        62:e3:76:32:cc:04:b7:06:ac:f0:b2:7e:24:99
    Fingerprint (MD5):
        16:C4:EF:BC:78:73:8B:D7:56:76:02:20:6B:07:E8:54
    Fingerprint (SHA1):
        DD:3E:B0:2F:40:72:82:65:3E:D3:37:4B:49:81:F3:FB:DD:C6:85:2C


Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US"
Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US"
Returned value is 0, expected result is pass
chains.sh: #3867: DSA: Verifying certificate(s)  EE4CA4.der CA4Root.der with flags  -d AllDB     -t Root.der - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #3868: Revocation: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -m 10 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3869: Revocation: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #3870: Revocation: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA0DB
certutil -N -d CA0DB -f CA0DB/dbpasswd
chains.sh: #3871: Revocation: Creating DB CA0DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA0Req.der
certutil -s "CN=CA0 Intermediate, O=CA0, C=US"  -R -2 -d CA0DB -f CA0DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA0Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3872: Revocation: Creating Intermediate certifiate request CA0Req.der  - PASSED
chains.sh: Creating certficate CA0Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3873: Revocation: Creating certficate CA0Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA0Root.der to CA0DB database
certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der
chains.sh: #3874: Revocation: Importing certificate CA0Root.der to CA0DB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #3875: Revocation: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3876: Revocation: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3877: Revocation: Creating certficate CA1CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate CA1CA0.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der
chains.sh: #3878: Revocation: Importing certificate CA1CA0.der to CA1DB database  - PASSED
chains.sh: Creating DB EE11DB
certutil -N -d EE11DB -f EE11DB/dbpasswd
chains.sh: #3879: Revocation: Creating DB EE11DB  - PASSED
chains.sh: Creating EE certifiate request EE11Req.der
certutil -s "CN=EE11 EE, O=EE11, C=US"  -R  -d EE11DB -f EE11DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE11Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3880: Revocation: Creating EE certifiate request EE11Req.der  - PASSED
chains.sh: Creating certficate EE11CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3881: Revocation: Creating certficate EE11CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE11CA1.der to EE11DB database
certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der
chains.sh: #3882: Revocation: Importing certificate EE11CA1.der to EE11DB database  - PASSED
chains.sh: Creating DB EE12DB
certutil -N -d EE12DB -f EE12DB/dbpasswd
chains.sh: #3883: Revocation: Creating DB EE12DB  - PASSED
chains.sh: Creating EE certifiate request EE12Req.der
certutil -s "CN=EE12 EE, O=EE12, C=US"  -R  -d EE12DB -f EE12DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE12Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3884: Revocation: Creating EE certifiate request EE12Req.der  - PASSED
chains.sh: Creating certficate EE12CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3885: Revocation: Creating certficate EE12CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE12CA1.der to EE12DB database
certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der
chains.sh: #3886: Revocation: Importing certificate EE12CA1.der to EE12DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #3887: Revocation: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3888: Revocation: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3889: Revocation: Creating certficate CA2CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate CA2CA0.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der
chains.sh: #3890: Revocation: Importing certificate CA2CA0.der to CA2DB database  - PASSED
chains.sh: Creating DB EE21DB
certutil -N -d EE21DB -f EE21DB/dbpasswd
chains.sh: #3891: Revocation: Creating DB EE21DB  - PASSED
chains.sh: Creating EE certifiate request EE21Req.der
certutil -s "CN=EE21 EE, O=EE21, C=US"  -R  -d EE21DB -f EE21DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE21Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3892: Revocation: Creating EE certifiate request EE21Req.der  - PASSED
chains.sh: Creating certficate EE21CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3893: Revocation: Creating certficate EE21CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate EE21CA2.der to EE21DB database
certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der
chains.sh: #3894: Revocation: Importing certificate EE21CA2.der to EE21DB database  - PASSED
chains.sh: Create CRL for RootDB
crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl
=== Crlutil input data ===
update=20121128160557Z
nextupdate=20131128160557Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=Root ROOT CA,O=Root,C=US"
    This Update: Wed Nov 28 16:05:57 2012
    Next Update: Thu Nov 28 16:05:57 2013
    CRL Extensions:
chains.sh: #3895: Revocation: Create CRL for RootDB  - PASSED
chains.sh: Create CRL for CA0DB
crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl
=== Crlutil input data ===
update=20121128160557Z
nextupdate=20131128160557Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA0 Intermediate,O=CA0,C=US"
    This Update: Wed Nov 28 16:05:57 2012
    Next Update: Thu Nov 28 16:05:57 2013
    CRL Extensions:
chains.sh: #3896: Revocation: Create CRL for CA0DB  - PASSED
chains.sh: Create CRL for CA1DB
crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl
=== Crlutil input data ===
update=20121128160557Z
nextupdate=20131128160557Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
    This Update: Wed Nov 28 16:05:57 2012
    Next Update: Thu Nov 28 16:05:57 2013
    CRL Extensions:
chains.sh: #3897: Revocation: Create CRL for CA1DB  - PASSED
chains.sh: Create CRL for CA2DB
crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl
=== Crlutil input data ===
update=20121128160557Z
nextupdate=20131128160557Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA2 Intermediate,O=CA2,C=US"
    This Update: Wed Nov 28 16:05:57 2012
    Next Update: Thu Nov 28 16:05:57 2013
    CRL Extensions:
chains.sh: #3898: Revocation: Create CRL for CA2DB  - PASSED
chains.sh: Revoking certificate with SN 14 issued by CA1
crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl
=== Crlutil input data ===
update=20121128160558Z
addcert 14 20121128160558Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
    This Update: Wed Nov 28 16:05:58 2012
    Next Update: Thu Nov 28 16:05:57 2013
    Entry 1 (0x1):
        Serial Number: 14 (0xe)
        Revocation Date: Wed Nov 28 16:05:58 2012
    CRL Extensions:
chains.sh: #3899: Revocation: Revoking certificate with SN 14 issued by CA1  - PASSED
chains.sh: Revoking certificate with SN 15 issued by CA0
crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl
=== Crlutil input data ===
update=20121128160559Z
addcert 15 20121128160559Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA0 Intermediate,O=CA0,C=US"
    This Update: Wed Nov 28 16:05:59 2012
    Next Update: Thu Nov 28 16:05:57 2013
    Entry 1 (0x1):
        Serial Number: 15 (0xf)
        Revocation Date: Wed Nov 28 16:05:59 2012
    CRL Extensions:
chains.sh: #3900: Revocation: Revoking certificate with SN 15 issued by CA0  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #3901: Revocation: Creating DB AllDB  - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #3902: Revocation: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing CRL Root.crl to AllDB database
crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl
chains.sh: #3903: Revocation: Importing CRL Root.crl to AllDB database  - PASSED
chains.sh: Importing certificate CA0Root.der to AllDB database
certutil -A -n CA0  -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der
chains.sh: #3904: Revocation: Importing certificate CA0Root.der to AllDB database  - PASSED
chains.sh: Importing CRL CA0.crl to AllDB database
crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl
chains.sh: #3905: Revocation: Importing CRL CA0.crl to AllDB database  - PASSED
chains.sh: Importing certificate CA1CA0.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der
chains.sh: #3906: Revocation: Importing certificate CA1CA0.der to AllDB database  - PASSED
chains.sh: Importing CRL CA1.crl to AllDB database
crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl
chains.sh: #3907: Revocation: Importing CRL CA1.crl to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA0.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der
chains.sh: #3908: Revocation: Importing certificate CA2CA0.der to AllDB database  - PASSED
chains.sh: Importing CRL CA2.crl to AllDB database
crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl
chains.sh: #3909: Revocation: Importing CRL CA2.crl to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  EE11CA1.der with flags  -g leaf -m crl -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv  -g leaf -m crl     EE11CA1.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 10 (0xa)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:05:55 2012
            Not After : Tue Nov 28 16:05:55 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c7:3a:3c:9b:6c:92:e3:2c:c2:a7:32:ce:69:be:49:04:
                    fd:d3:94:c2:e2:92:c9:5a:87:4f:8c:e9:fc:ac:99:7c:
                    43:03:1c:f2:5e:2c:0a:98:4c:13:0b:95:b8:49:a9:70:
                    ff:cc:18:87:4f:6d:ae:38:c5:42:6b:0f:7f:8b:7c:d4:
                    0e:aa:e2:c3:48:75:00:8e:80:52:15:8c:7f:8b:3b:f1:
                    bd:1f:f1:82:b1:98:de:ad:be:cc:8d:a5:70:27:7d:72:
                    5b:3a:e7:77:3f:44:d7:b9:91:6e:24:08:64:b8:38:9c:
                    cb:61:0c:5d:be:a3:c3:71:2a:f3:75:a3:79:52:1e:5f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        0d:e4:e0:d3:b2:e2:a0:fc:b7:f6:02:b0:c2:2c:ac:d7:
        cd:cb:16:0b:6a:7c:ae:77:8e:f0:40:65:12:40:17:1f:
        41:d7:ff:4c:ac:80:f7:61:67:57:bc:59:7d:6b:dd:08:
        f1:85:2e:e1:07:48:bf:ee:fa:c7:31:0b:10:4f:b9:28:
        23:62:36:ec:5e:3b:15:f2:ab:f7:31:c9:0b:9e:4b:4d:
        36:35:51:5f:93:a3:f2:26:86:e6:c4:dc:0f:c9:ea:19:
        cb:8d:d9:37:a8:7c:c2:b6:34:64:79:e7:f0:65:d8:da:
        aa:44:00:93:b5:2e:0e:4a:a9:5f:5c:0a:cc:0e:fa:c7
    Fingerprint (MD5):
        67:9D:C2:EB:6E:87:6C:FE:6B:3C:E9:99:88:25:19:8E
    Fingerprint (SHA1):
        D5:A9:C6:97:6E:5E:92:A4:0C:28:6F:48:F4:66:12:96:01:A8:FC:74

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US"
Returned value is 0, expected result is pass
chains.sh: #3910: Revocation: Verifying certificate(s)  EE11CA1.der with flags  -g leaf -m crl -d AllDB     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE12CA1.der with flags  -g leaf -m crl -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv  -g leaf -m crl     EE12CA1.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #3911: Revocation: Verifying certificate(s)  EE12CA1.der with flags  -g leaf -m crl -d AllDB     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE11CA1.der with flags  -g chain -m crl -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv  -g chain -m crl     EE11CA1.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 10 (0xa)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:05:55 2012
            Not After : Tue Nov 28 16:05:55 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c7:3a:3c:9b:6c:92:e3:2c:c2:a7:32:ce:69:be:49:04:
                    fd:d3:94:c2:e2:92:c9:5a:87:4f:8c:e9:fc:ac:99:7c:
                    43:03:1c:f2:5e:2c:0a:98:4c:13:0b:95:b8:49:a9:70:
                    ff:cc:18:87:4f:6d:ae:38:c5:42:6b:0f:7f:8b:7c:d4:
                    0e:aa:e2:c3:48:75:00:8e:80:52:15:8c:7f:8b:3b:f1:
                    bd:1f:f1:82:b1:98:de:ad:be:cc:8d:a5:70:27:7d:72:
                    5b:3a:e7:77:3f:44:d7:b9:91:6e:24:08:64:b8:38:9c:
                    cb:61:0c:5d:be:a3:c3:71:2a:f3:75:a3:79:52:1e:5f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        0d:e4:e0:d3:b2:e2:a0:fc:b7:f6:02:b0:c2:2c:ac:d7:
        cd:cb:16:0b:6a:7c:ae:77:8e:f0:40:65:12:40:17:1f:
        41:d7:ff:4c:ac:80:f7:61:67:57:bc:59:7d:6b:dd:08:
        f1:85:2e:e1:07:48:bf:ee:fa:c7:31:0b:10:4f:b9:28:
        23:62:36:ec:5e:3b:15:f2:ab:f7:31:c9:0b:9e:4b:4d:
        36:35:51:5f:93:a3:f2:26:86:e6:c4:dc:0f:c9:ea:19:
        cb:8d:d9:37:a8:7c:c2:b6:34:64:79:e7:f0:65:d8:da:
        aa:44:00:93:b5:2e:0e:4a:a9:5f:5c:0a:cc:0e:fa:c7
    Fingerprint (MD5):
        67:9D:C2:EB:6E:87:6C:FE:6B:3C:E9:99:88:25:19:8E
    Fingerprint (SHA1):
        D5:A9:C6:97:6E:5E:92:A4:0C:28:6F:48:F4:66:12:96:01:A8:FC:74

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US"
Returned value is 0, expected result is pass
chains.sh: #3912: Revocation: Verifying certificate(s)  EE11CA1.der with flags  -g chain -m crl -d AllDB     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE21CA2.der with flags  -g chain -m crl -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv  -g chain -m crl     EE21CA2.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #3913: Revocation: Verifying certificate(s)  EE21CA2.der with flags  -g chain -m crl -d AllDB     -t Root.der - PASSED
chains.sh: #3914: Test that OCSP server is reachable - PASSED
chains.sh: Creating DB OCSPRootDB
certutil -N -d OCSPRootDB -f OCSPRootDB/dbpasswd
chains.sh: #3915: OCSP: Creating DB OCSPRootDB  - PASSED
chains.sh: Importing certificate OCSPRoot.cert to OCSPRootDB database
certutil -A -n OCSPRoot  -t "CT,C,C" -d OCSPRootDB -f OCSPRootDB/dbpasswd -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPRoot.cert
chains.sh: #3916: OCSP: Importing certificate OCSPRoot.cert to OCSPRootDB database  - PASSED
chains.sh: Creating DB OCSPCA1DB
certutil -N -d OCSPCA1DB -f OCSPCA1DB/dbpasswd
chains.sh: #3917: OCSP: Creating DB OCSPCA1DB  - PASSED
chains.sh: Importing p12 key OCSPCA1.p12 to OCSPCA1DB database
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPCA1DB -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.p12 -k OCSPCA1DB/dbpasswd -W nssnss
pk12util: PKCS12 IMPORT SUCCESSFUL
chains.sh: #3918: OCSP: Importing p12 key OCSPCA1.p12 to OCSPCA1DB database  - PASSED
chains.sh: Create CRL for OCSPCA1DB
crlutil -G -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl
=== Crlutil input data ===
update=20121128160601Z
nextupdate=20131128160601Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
    This Update: Wed Nov 28 16:06:01 2012
    Next Update: Thu Nov 28 16:06:01 2013
    CRL Extensions:
chains.sh: #3919: OCSP: Create CRL for OCSPCA1DB  - PASSED
chains.sh: Revoking certificate with SN 3 issued by OCSPCA1
crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl
=== Crlutil input data ===
update=20121128160602Z
addcert 3 20121128160602Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
    This Update: Wed Nov 28 16:06:02 2012
    Next Update: Thu Nov 28 16:06:01 2013
    Entry 1 (0x1):
        Serial Number: 3 (0x3)
        Revocation Date: Wed Nov 28 16:06:02 2012
    CRL Extensions:
chains.sh: #3920: OCSP: Revoking certificate with SN 3 issued by OCSPCA1  - PASSED
chains.sh: Revoking certificate with SN 4 issued by OCSPCA1
crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl
=== Crlutil input data ===
update=20121128160603Z
addcert 4 20121128160603Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
    This Update: Wed Nov 28 16:06:03 2012
    Next Update: Thu Nov 28 16:06:01 2013
    Entry 1 (0x1):
        Serial Number: 4 (0x4)
        Revocation Date: Wed Nov 28 16:06:03 2012
    Entry 2 (0x2):
        Serial Number: 3 (0x3)
        Revocation Date: Wed Nov 28 16:06:02 2012
    CRL Extensions:
chains.sh: #3921: OCSP: Revoking certificate with SN 4 issued by OCSPCA1  - PASSED
chains.sh: Verifying certificate(s)  OCSPEE11.cert OCSPCA1.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -h requireFreshInfo -m ocsp     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE11.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.cert  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 403173846 (0x1807f1d6)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Tue Apr 03 15:38:45 2012
            Not After : Mon Apr 03 15:38:45 2062
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a3:ba:e2:4a:07:35:35:5b:82:33:f6:c4:a2:55:4d:f2:
                    45:9f:04:79:0d:a1:9a:03:14:7c:16:4f:65:27:ef:f5:
                    54:77:b2:f6:34:2b:a6:2b:81:dc:d1:59:12:99:c8:ab:
                    f1:20:ee:4b:07:da:e7:c5:e4:fe:1a:a9:f8:6c:0f:86:
                    e8:03:59:e6:7c:83:47:eb:97:e2:12:4f:88:29:44:b5:
                    fa:2b:2c:df:2c:ca:c6:06:70:af:8f:94:d3:b7:50:6b:
                    87:1a:dc:83:ac:f3:3c:b8:48:69:3c:10:37:a9:06:8c:
                    18:e4:d6:03:3b:c1:5d:5f:3b:eb:e6:4d:a9:24:89:7d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        21:b9:29:4b:3a:1c:cc:5b:86:87:ca:8f:a0:b8:72:98:
        a3:03:49:fb:dd:2f:36:8f:5f:ee:c9:e4:f8:e6:65:3d:
        aa:89:7d:f0:ac:1b:a4:1f:db:b3:9d:f9:1b:ed:7d:1b:
        3d:ec:d7:eb:76:99:4d:fd:4d:28:d1:12:9b:16:7a:35:
        fd:86:1f:36:1d:bd:5e:df:f7:7f:3c:27:28:a4:a1:00:
        30:60:78:f3:fb:5c:74:c8:1d:68:cf:5c:7f:28:eb:61:
        44:1d:2e:9c:be:8d:b9:82:95:19:55:e8:93:9c:f5:ed:
        8d:29:7d:72:74:bf:c0:b9:a8:da:9d:ed:2b:a1:ec:40
    Fingerprint (MD5):
        B6:F2:BD:B0:9A:5A:44:F8:0A:F4:1B:7E:95:31:F6:4D
    Fingerprint (SHA1):
        35:38:60:77:26:C7:1F:A5:AE:AE:16:E2:A5:C4:DD:26:BD:71:EB:99

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE11 EE,O=OCSPEE11,C=US"
Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3922: OCSP: Verifying certificate(s)  OCSPEE11.cert OCSPCA1.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE12.cert OCSPCA1.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -h requireFreshInfo -m ocsp     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE12.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.cert  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #3923: OCSP: Verifying certificate(s)  OCSPEE12.cert OCSPCA1.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE15.cert OCSPCA1.cert with flags  -g leaf -m ocsp -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -m ocsp     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE15.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.cert  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 403173846 (0x1807f1d6)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Tue Apr 03 15:38:45 2012
            Not After : Mon Apr 03 15:38:45 2062
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a3:ba:e2:4a:07:35:35:5b:82:33:f6:c4:a2:55:4d:f2:
                    45:9f:04:79:0d:a1:9a:03:14:7c:16:4f:65:27:ef:f5:
                    54:77:b2:f6:34:2b:a6:2b:81:dc:d1:59:12:99:c8:ab:
                    f1:20:ee:4b:07:da:e7:c5:e4:fe:1a:a9:f8:6c:0f:86:
                    e8:03:59:e6:7c:83:47:eb:97:e2:12:4f:88:29:44:b5:
                    fa:2b:2c:df:2c:ca:c6:06:70:af:8f:94:d3:b7:50:6b:
                    87:1a:dc:83:ac:f3:3c:b8:48:69:3c:10:37:a9:06:8c:
                    18:e4:d6:03:3b:c1:5d:5f:3b:eb:e6:4d:a9:24:89:7d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        21:b9:29:4b:3a:1c:cc:5b:86:87:ca:8f:a0:b8:72:98:
        a3:03:49:fb:dd:2f:36:8f:5f:ee:c9:e4:f8:e6:65:3d:
        aa:89:7d:f0:ac:1b:a4:1f:db:b3:9d:f9:1b:ed:7d:1b:
        3d:ec:d7:eb:76:99:4d:fd:4d:28:d1:12:9b:16:7a:35:
        fd:86:1f:36:1d:bd:5e:df:f7:7f:3c:27:28:a4:a1:00:
        30:60:78:f3:fb:5c:74:c8:1d:68:cf:5c:7f:28:eb:61:
        44:1d:2e:9c:be:8d:b9:82:95:19:55:e8:93:9c:f5:ed:
        8d:29:7d:72:74:bf:c0:b9:a8:da:9d:ed:2b:a1:ec:40
    Fingerprint (MD5):
        B6:F2:BD:B0:9A:5A:44:F8:0A:F4:1B:7E:95:31:F6:4D
    Fingerprint (SHA1):
        35:38:60:77:26:C7:1F:A5:AE:AE:16:E2:A5:C4:DD:26:BD:71:EB:99

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE15 EE,O=OCSPEE15,C=US"
Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3924: OCSP: Verifying certificate(s)  OCSPEE15.cert OCSPCA1.cert with flags  -g leaf -m ocsp -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE15.cert OCSPCA1.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -h requireFreshInfo -m ocsp     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE15.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.cert  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #3925: OCSP: Verifying certificate(s)  OCSPEE15.cert OCSPCA1.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE21.cert OCSPCA2.cert with flags  -g leaf -m ocsp -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -m ocsp     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE21.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA2.cert  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 403173846 (0x1807f1d6)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Tue Apr 03 15:38:45 2012
            Not After : Mon Apr 03 15:38:45 2062
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a3:ba:e2:4a:07:35:35:5b:82:33:f6:c4:a2:55:4d:f2:
                    45:9f:04:79:0d:a1:9a:03:14:7c:16:4f:65:27:ef:f5:
                    54:77:b2:f6:34:2b:a6:2b:81:dc:d1:59:12:99:c8:ab:
                    f1:20:ee:4b:07:da:e7:c5:e4:fe:1a:a9:f8:6c:0f:86:
                    e8:03:59:e6:7c:83:47:eb:97:e2:12:4f:88:29:44:b5:
                    fa:2b:2c:df:2c:ca:c6:06:70:af:8f:94:d3:b7:50:6b:
                    87:1a:dc:83:ac:f3:3c:b8:48:69:3c:10:37:a9:06:8c:
                    18:e4:d6:03:3b:c1:5d:5f:3b:eb:e6:4d:a9:24:89:7d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        21:b9:29:4b:3a:1c:cc:5b:86:87:ca:8f:a0:b8:72:98:
        a3:03:49:fb:dd:2f:36:8f:5f:ee:c9:e4:f8:e6:65:3d:
        aa:89:7d:f0:ac:1b:a4:1f:db:b3:9d:f9:1b:ed:7d:1b:
        3d:ec:d7:eb:76:99:4d:fd:4d:28:d1:12:9b:16:7a:35:
        fd:86:1f:36:1d:bd:5e:df:f7:7f:3c:27:28:a4:a1:00:
        30:60:78:f3:fb:5c:74:c8:1d:68:cf:5c:7f:28:eb:61:
        44:1d:2e:9c:be:8d:b9:82:95:19:55:e8:93:9c:f5:ed:
        8d:29:7d:72:74:bf:c0:b9:a8:da:9d:ed:2b:a1:ec:40
    Fingerprint (MD5):
        B6:F2:BD:B0:9A:5A:44:F8:0A:F4:1B:7E:95:31:F6:4D
    Fingerprint (SHA1):
        35:38:60:77:26:C7:1F:A5:AE:AE:16:E2:A5:C4:DD:26:BD:71:EB:99

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE21 EE,O=OCSPEE21,C=US"
Certificate 2 Subject: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #3926: OCSP: Verifying certificate(s)  OCSPEE21.cert OCSPCA2.cert with flags  -g leaf -m ocsp -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE21.cert OCSPCA2.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -h requireFreshInfo -m ocsp     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE21.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA2.cert  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #3927: OCSP: Verifying certificate(s)  OCSPEE21.cert OCSPCA2.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE21.cert OCSPCA2.cert with flags  -g chain -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g chain -h requireFreshInfo -m ocsp     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE21.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA2.cert  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #3928: OCSP: Verifying certificate(s)  OCSPEE21.cert OCSPCA2.cert with flags  -g chain -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE31.cert OCSPCA3.cert with flags  -g leaf -m ocsp -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -m ocsp     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE31.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA3.cert  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 403173846 (0x1807f1d6)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Tue Apr 03 15:38:45 2012
            Not After : Mon Apr 03 15:38:45 2062
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a3:ba:e2:4a:07:35:35:5b:82:33:f6:c4:a2:55:4d:f2:
                    45:9f:04:79:0d:a1:9a:03:14:7c:16:4f:65:27:ef:f5:
                    54:77:b2:f6:34:2b:a6:2b:81:dc:d1:59:12:99:c8:ab:
                    f1:20:ee:4b:07:da:e7:c5:e4:fe:1a:a9:f8:6c:0f:86:
                    e8:03:59:e6:7c:83:47:eb:97:e2:12:4f:88:29:44:b5:
                    fa:2b:2c:df:2c:ca:c6:06:70:af:8f:94:d3:b7:50:6b:
                    87:1a:dc:83:ac:f3:3c:b8:48:69:3c:10:37:a9:06:8c:
                    18:e4:d6:03:3b:c1:5d:5f:3b:eb:e6:4d:a9:24:89:7d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        21:b9:29:4b:3a:1c:cc:5b:86:87:ca:8f:a0:b8:72:98:
        a3:03:49:fb:dd:2f:36:8f:5f:ee:c9:e4:f8:e6:65:3d:
        aa:89:7d:f0:ac:1b:a4:1f:db:b3:9d:f9:1b:ed:7d:1b:
        3d:ec:d7:eb:76:99:4d:fd:4d:28:d1:12:9b:16:7a:35:
        fd:86:1f:36:1d:bd:5e:df:f7:7f:3c:27:28:a4:a1:00:
        30:60:78:f3:fb:5c:74:c8:1d:68:cf:5c:7f:28:eb:61:
        44:1d:2e:9c:be:8d:b9:82:95:19:55:e8:93:9c:f5:ed:
        8d:29:7d:72:74:bf:c0:b9:a8:da:9d:ed:2b:a1:ec:40
    Fingerprint (MD5):
        B6:F2:BD:B0:9A:5A:44:F8:0A:F4:1B:7E:95:31:F6:4D
    Fingerprint (SHA1):
        35:38:60:77:26:C7:1F:A5:AE:AE:16:E2:A5:C4:DD:26:BD:71:EB:99

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE31 EE,O=OCSPEE31,C=US"
Certificate 2 Subject: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US"
Returned value is 0, expected result is pass
chains.sh: #3929: OCSP: Verifying certificate(s)  OCSPEE31.cert OCSPCA3.cert with flags  -g leaf -m ocsp -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE31.cert OCSPCA3.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -h requireFreshInfo -m ocsp     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE31.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA3.cert  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #3930: OCSP: Verifying certificate(s)  OCSPEE31.cert OCSPCA3.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE12.cert OCSPCA1.cert with flags  -g leaf -m ocsp -s doNotUse -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -m ocsp -s doNotUse     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE12.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.cert  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 403173846 (0x1807f1d6)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Tue Apr 03 15:38:45 2012
            Not After : Mon Apr 03 15:38:45 2062
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a3:ba:e2:4a:07:35:35:5b:82:33:f6:c4:a2:55:4d:f2:
                    45:9f:04:79:0d:a1:9a:03:14:7c:16:4f:65:27:ef:f5:
                    54:77:b2:f6:34:2b:a6:2b:81:dc:d1:59:12:99:c8:ab:
                    f1:20:ee:4b:07:da:e7:c5:e4:fe:1a:a9:f8:6c:0f:86:
                    e8:03:59:e6:7c:83:47:eb:97:e2:12:4f:88:29:44:b5:
                    fa:2b:2c:df:2c:ca:c6:06:70:af:8f:94:d3:b7:50:6b:
                    87:1a:dc:83:ac:f3:3c:b8:48:69:3c:10:37:a9:06:8c:
                    18:e4:d6:03:3b:c1:5d:5f:3b:eb:e6:4d:a9:24:89:7d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        21:b9:29:4b:3a:1c:cc:5b:86:87:ca:8f:a0:b8:72:98:
        a3:03:49:fb:dd:2f:36:8f:5f:ee:c9:e4:f8:e6:65:3d:
        aa:89:7d:f0:ac:1b:a4:1f:db:b3:9d:f9:1b:ed:7d:1b:
        3d:ec:d7:eb:76:99:4d:fd:4d:28:d1:12:9b:16:7a:35:
        fd:86:1f:36:1d:bd:5e:df:f7:7f:3c:27:28:a4:a1:00:
        30:60:78:f3:fb:5c:74:c8:1d:68:cf:5c:7f:28:eb:61:
        44:1d:2e:9c:be:8d:b9:82:95:19:55:e8:93:9c:f5:ed:
        8d:29:7d:72:74:bf:c0:b9:a8:da:9d:ed:2b:a1:ec:40
    Fingerprint (MD5):
        B6:F2:BD:B0:9A:5A:44:F8:0A:F4:1B:7E:95:31:F6:4D
    Fingerprint (SHA1):
        35:38:60:77:26:C7:1F:A5:AE:AE:16:E2:A5:C4:DD:26:BD:71:EB:99

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE12 EE,O=OCSPEE12,C=US"
Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3931: OCSP: Verifying certificate(s)  OCSPEE12.cert OCSPCA1.cert with flags  -g leaf -m ocsp -s doNotUse -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE12.cert OCSPCA1.cert with flags  -g leaf -m ocsp -s forbidFetching -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -m ocsp -s forbidFetching     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE12.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.cert  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 403173846 (0x1807f1d6)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Tue Apr 03 15:38:45 2012
            Not After : Mon Apr 03 15:38:45 2062
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a3:ba:e2:4a:07:35:35:5b:82:33:f6:c4:a2:55:4d:f2:
                    45:9f:04:79:0d:a1:9a:03:14:7c:16:4f:65:27:ef:f5:
                    54:77:b2:f6:34:2b:a6:2b:81:dc:d1:59:12:99:c8:ab:
                    f1:20:ee:4b:07:da:e7:c5:e4:fe:1a:a9:f8:6c:0f:86:
                    e8:03:59:e6:7c:83:47:eb:97:e2:12:4f:88:29:44:b5:
                    fa:2b:2c:df:2c:ca:c6:06:70:af:8f:94:d3:b7:50:6b:
                    87:1a:dc:83:ac:f3:3c:b8:48:69:3c:10:37:a9:06:8c:
                    18:e4:d6:03:3b:c1:5d:5f:3b:eb:e6:4d:a9:24:89:7d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        21:b9:29:4b:3a:1c:cc:5b:86:87:ca:8f:a0:b8:72:98:
        a3:03:49:fb:dd:2f:36:8f:5f:ee:c9:e4:f8:e6:65:3d:
        aa:89:7d:f0:ac:1b:a4:1f:db:b3:9d:f9:1b:ed:7d:1b:
        3d:ec:d7:eb:76:99:4d:fd:4d:28:d1:12:9b:16:7a:35:
        fd:86:1f:36:1d:bd:5e:df:f7:7f:3c:27:28:a4:a1:00:
        30:60:78:f3:fb:5c:74:c8:1d:68:cf:5c:7f:28:eb:61:
        44:1d:2e:9c:be:8d:b9:82:95:19:55:e8:93:9c:f5:ed:
        8d:29:7d:72:74:bf:c0:b9:a8:da:9d:ed:2b:a1:ec:40
    Fingerprint (MD5):
        B6:F2:BD:B0:9A:5A:44:F8:0A:F4:1B:7E:95:31:F6:4D
    Fingerprint (SHA1):
        35:38:60:77:26:C7:1F:A5:AE:AE:16:E2:A5:C4:DD:26:BD:71:EB:99

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE12 EE,O=OCSPEE12,C=US"
Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3932: OCSP: Verifying certificate(s)  OCSPEE12.cert OCSPCA1.cert with flags  -g leaf -m ocsp -s forbidFetching -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE15.cert OCSPCA1.cert with flags  -g leaf -m ocsp -s failIfNoInfo -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -m ocsp -s failIfNoInfo     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE15.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.cert  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8071: The OCSP server experienced an internal error.
Returned value is 1, expected result is fail
chains.sh: #3933: OCSP: Verifying certificate(s)  OCSPEE15.cert OCSPCA1.cert with flags  -g leaf -m ocsp -s failIfNoInfo -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE21.cert OCSPCA2.cert with flags  -g leaf -m ocsp -s failIfNoInfo -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -m ocsp -s failIfNoInfo     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE21.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA2.cert  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #3934: OCSP: Verifying certificate(s)  OCSPEE21.cert OCSPCA2.cert with flags  -g leaf -m ocsp -s failIfNoInfo -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE13.cert OCSPCA1.cert with flags  -g leaf -h testLocalInfoFirst -m ocsp -d OCSPCA1DB     -t OCSPCA1
vfychain -d OCSPCA1DB -pp -vv  -g leaf -h testLocalInfoFirst -m ocsp     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE13.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.cert  -t OCSPCA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Tue Apr 03 15:38:46 2012
            Not After : Mon Apr 03 15:38:46 2017
        Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c1:b0:47:12:51:37:68:7d:39:cb:ee:e3:32:2c:ad:b5:
                    44:2c:72:7f:c8:e9:32:79:d9:7d:b9:69:94:bc:5a:9e:
                    5a:3b:0f:e2:07:e5:b2:76:04:73:32:ee:92:8d:a1:2f:
                    ed:e4:e0:5a:92:28:ca:bb:48:fc:5c:44:dc:9a:c0:3b:
                    88:84:0a:bd:6b:4a:c9:18:37:51:e3:a3:3a:e0:40:5c:
                    53:0d:04:ed:c7:18:34:25:5a:5e:00:f5:0d:29:ef:fa:
                    69:e3:6d:96:e3:1e:5b:8a:4e:3e:77:e7:45:16:81:6f:
                    21:01:2c:8d:b1:fa:57:06:f0:9b:95:1a:c3:0d:25:25
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Authority Information Access
            Method: PKIX Online Certificate Status Protocol
            Location: 
                URI: "http://ocsp.kuix.de:2600"

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        88:c4:da:b7:3d:84:1d:1c:ca:f8:c1:2e:46:59:c2:33:
        93:64:38:f9:2a:87:32:ca:ec:e0:ef:ff:cc:1f:9d:96:
        a6:42:b0:cd:8f:b3:85:3a:59:64:34:c1:0d:bb:24:c5:
        36:f6:28:93:a0:3b:58:b8:93:87:c5:6e:f2:64:23:b9:
        c4:a9:53:82:bd:0a:12:92:58:90:01:b1:11:a6:65:aa:
        a9:72:94:60:96:38:fd:e3:9e:14:5b:4e:ed:0d:99:e2:
        94:6a:50:84:88:00:1e:14:a7:ed:20:69:95:9b:cb:b7:
        61:11:b8:14:7a:1e:19:3c:bb:38:5b:97:e0:ad:9f:2e
    Fingerprint (MD5):
        6E:22:37:7A:94:F2:07:60:87:6B:9D:CF:64:C9:D9:37
    Fingerprint (SHA1):
        92:63:FD:E1:AA:A4:45:54:F7:E8:B7:5F:92:8F:74:06:3E:96:BA:47

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User

Certificate 1 Subject: "CN=OCSPEE13 EE,O=OCSPEE13,C=US"
Returned value is 0, expected result is pass
chains.sh: #3935: OCSP: Verifying certificate(s)  OCSPEE13.cert OCSPCA1.cert with flags  -g leaf -h testLocalInfoFirst -m ocsp -d OCSPCA1DB     -t OCSPCA1 - PASSED
chains.sh: Creating DB OCSPRoot1DB
certutil -N -d OCSPRoot1DB -f OCSPRoot1DB/dbpasswd
chains.sh: #3936: OCSP: Creating DB OCSPRoot1DB  - PASSED
chains.sh: Importing certificate OCSPRoot.cert to OCSPRoot1DB database
certutil -A -n OCSPRoot  -t "CT,C,C" -d OCSPRoot1DB -f OCSPRoot1DB/dbpasswd -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPRoot.cert
chains.sh: #3937: OCSP: Importing certificate OCSPRoot.cert to OCSPRoot1DB database  - PASSED
chains.sh: Verifying certificate(s)  OCSPEE23.cert OCSPCA2.cert with flags  -g chain -m ocsp -g leaf -m ocsp -d OCSPRoot1DB     -t OCSPRoot
vfychain -d OCSPRoot1DB -pp -vv  -g chain -m ocsp -g leaf -m ocsp     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE23.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA2.cert  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #3938: OCSP: Verifying certificate(s)  OCSPEE23.cert OCSPCA2.cert with flags  -g chain -m ocsp -g leaf -m ocsp -d OCSPRoot1DB     -t OCSPRoot - PASSED
chains.sh: Creating DB OCSPRoot2DB
certutil -N -d OCSPRoot2DB -f OCSPRoot2DB/dbpasswd
chains.sh: #3939: OCSP: Creating DB OCSPRoot2DB  - PASSED
chains.sh: Importing certificate OCSPRoot.cert to OCSPRoot2DB database
certutil -A -n OCSPRoot  -t "T,," -d OCSPRoot2DB -f OCSPRoot2DB/dbpasswd -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPRoot.cert
chains.sh: #3940: OCSP: Importing certificate OCSPRoot.cert to OCSPRoot2DB database  - PASSED
chains.sh: Verifying certificate(s)  OCSPEE23.cert OCSPCA2.cert with flags  -g chain -m ocsp -g leaf -m ocsp -d OCSPRoot2DB     -t OCSPRoot
vfychain -d OCSPRoot2DB -pp -vv  -g chain -m ocsp -g leaf -m ocsp     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE23.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA2.cert  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 403173846 (0x1807f1d6)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Tue Apr 03 15:38:45 2012
            Not After : Mon Apr 03 15:38:45 2062
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a3:ba:e2:4a:07:35:35:5b:82:33:f6:c4:a2:55:4d:f2:
                    45:9f:04:79:0d:a1:9a:03:14:7c:16:4f:65:27:ef:f5:
                    54:77:b2:f6:34:2b:a6:2b:81:dc:d1:59:12:99:c8:ab:
                    f1:20:ee:4b:07:da:e7:c5:e4:fe:1a:a9:f8:6c:0f:86:
                    e8:03:59:e6:7c:83:47:eb:97:e2:12:4f:88:29:44:b5:
                    fa:2b:2c:df:2c:ca:c6:06:70:af:8f:94:d3:b7:50:6b:
                    87:1a:dc:83:ac:f3:3c:b8:48:69:3c:10:37:a9:06:8c:
                    18:e4:d6:03:3b:c1:5d:5f:3b:eb:e6:4d:a9:24:89:7d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        21:b9:29:4b:3a:1c:cc:5b:86:87:ca:8f:a0:b8:72:98:
        a3:03:49:fb:dd:2f:36:8f:5f:ee:c9:e4:f8:e6:65:3d:
        aa:89:7d:f0:ac:1b:a4:1f:db:b3:9d:f9:1b:ed:7d:1b:
        3d:ec:d7:eb:76:99:4d:fd:4d:28:d1:12:9b:16:7a:35:
        fd:86:1f:36:1d:bd:5e:df:f7:7f:3c:27:28:a4:a1:00:
        30:60:78:f3:fb:5c:74:c8:1d:68:cf:5c:7f:28:eb:61:
        44:1d:2e:9c:be:8d:b9:82:95:19:55:e8:93:9c:f5:ed:
        8d:29:7d:72:74:bf:c0:b9:a8:da:9d:ed:2b:a1:ec:40
    Fingerprint (MD5):
        B6:F2:BD:B0:9A:5A:44:F8:0A:F4:1B:7E:95:31:F6:4D
    Fingerprint (SHA1):
        35:38:60:77:26:C7:1F:A5:AE:AE:16:E2:A5:C4:DD:26:BD:71:EB:99

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted Client CA
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=OCSPEE23 EE,O=OCSPEE23,C=US"
Certificate 2 Subject: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #3941: OCSP: Verifying certificate(s)  OCSPEE23.cert OCSPCA2.cert with flags  -g chain -m ocsp -g leaf -m ocsp -d OCSPRoot2DB     -t OCSPRoot - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #3942: CRLDP: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1128110586 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3943: CRLDP: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #3944: CRLDP: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA0DB
certutil -N -d CA0DB -f CA0DB/dbpasswd
chains.sh: #3945: CRLDP: Creating DB CA0DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA0Req.der
certutil -s "CN=CA0 Intermediate, O=CA0, C=US"  -R -2 -d CA0DB -f CA0DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA0Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3946: CRLDP: Creating Intermediate certifiate request CA0Req.der  - PASSED
chains.sh: Creating certficate CA0Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 1128110587   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3947: CRLDP: Creating certficate CA0Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA0Root.der to CA0DB database
certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der
chains.sh: #3948: CRLDP: Importing certificate CA0Root.der to CA0DB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #3949: CRLDP: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA1Req.der  -4 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y
1
7
http://buildnss02.usersys.redhat.com:8556/buildnss02-10869-CA0-1128110476.crl
-1
-1
-1
n
n

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
Enter the type of the distribution point name:
1 - Full Name
2 - Relative Name
Any other number to finish
Choice:  > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Select one of the following for the reason flags
0 - unused
1 - keyCompromise
2 - caCompromise
3 - affiliationChanged
4 - superseded
5 - cessationOfOperation
6 - certificateHold
Any other number to finishChoice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3950: CRLDP: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10   --extAIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8556/buildnss02-10869-CA0Root-1128110463.der
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #3951: CRLDP: Creating certficate CA1CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate CA1CA0.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der
chains.sh: #3952: CRLDP: Importing certificate CA1CA0.der to CA1DB database  - PASSED
chains.sh: Creating DB EE11DB
certutil -N -d EE11DB -f EE11DB/dbpasswd
chains.sh: #3953: CRLDP: Creating DB EE11DB  - PASSED
chains.sh: Creating EE certifiate request EE11Req.der
certutil -s "CN=EE11 EE, O=EE11, C=US"  -R  -d EE11DB -f EE11DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE11Req.der  -4 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8556/buildnss02-10869-CA0-1128110476.crl
-1
-1
-1
n
n

===


Generating key.  This may take a few moments...

Enter the type of the distribution point name:
1 - Full Name
2 - Relative Name
Any other number to finish
Choice:  > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Select one of the following for the reason flags
0 - unused
1 - keyCompromise
2 - caCompromise
3 - affiliationChanged
4 - superseded
5 - cessationOfOperation
6 - certificateHold
Any other number to finishChoice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3954: CRLDP: Creating EE certifiate request EE11Req.der  - PASSED
chains.sh: Creating certficate EE11CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 1128110588   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3955: CRLDP: Creating certficate EE11CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE11CA1.der to EE11DB database
certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der
chains.sh: #3956: CRLDP: Importing certificate EE11CA1.der to EE11DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #3957: CRLDP: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA2Req.der  -4 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y
1
7
http://buildnss02.usersys.redhat.com:8556/buildnss02-10869-CA0-1128110476.crl
-1
-1
-1
n
n

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
Enter the type of the distribution point name:
1 - Full Name
2 - Relative Name
Any other number to finish
Choice:  > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Select one of the following for the reason flags
0 - unused
1 - keyCompromise
2 - caCompromise
3 - affiliationChanged
4 - superseded
5 - cessationOfOperation
6 - certificateHold
Any other number to finishChoice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3958: CRLDP: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20   --extAIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8556/buildnss02-10869-CA0Root-1128110464.der
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #3959: CRLDP: Creating certficate CA2CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate CA2CA0.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der
chains.sh: #3960: CRLDP: Importing certificate CA2CA0.der to CA2DB database  - PASSED
chains.sh: Creating DB EE21DB
certutil -N -d EE21DB -f EE21DB/dbpasswd
chains.sh: #3961: CRLDP: Creating DB EE21DB  - PASSED
chains.sh: Creating EE certifiate request EE21Req.der
certutil -s "CN=EE21 EE, O=EE21, C=US"  -R  -d EE21DB -f EE21DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE21Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3962: CRLDP: Creating EE certifiate request EE21Req.der  - PASSED
chains.sh: Creating certficate EE21CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 1128110589   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3963: CRLDP: Creating certficate EE21CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate EE21CA2.der to EE21DB database
certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der
chains.sh: #3964: CRLDP: Importing certificate EE21CA2.der to EE21DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #3965: CRLDP: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE1Req.der  -4 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8556/buildnss02-10869-CA0-1128110476.crl
-1
-1
-1
n
n

===


Generating key.  This may take a few moments...

Enter the type of the distribution point name:
1 - Full Name
2 - Relative Name
Any other number to finish
Choice:  > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Select one of the following for the reason flags
0 - unused
1 - keyCompromise
2 - caCompromise
3 - affiliationChanged
4 - superseded
5 - cessationOfOperation
6 - certificateHold
Any other number to finishChoice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3966: CRLDP: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30   --extAIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8556/buildnss02-10869-CA0Root-1128110465.der
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #3967: CRLDP: Creating certficate EE1CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate EE1CA0.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der
chains.sh: #3968: CRLDP: Importing certificate EE1CA0.der to EE1DB database  - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #3969: CRLDP: Creating DB EE2DB  - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US"  -R  -d EE2DB -f EE2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE2Req.der  -4 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8556/buildnss02-10869-CA0-1128110476.crl
-1
-1
-1
n
n

===


Generating key.  This may take a few moments...

Enter the type of the distribution point name:
1 - Full Name
2 - Relative Name
Any other number to finish
Choice:  > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Select one of the following for the reason flags
0 - unused
1 - keyCompromise
2 - caCompromise
3 - affiliationChanged
4 - superseded
5 - cessationOfOperation
6 - certificateHold
Any other number to finishChoice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3970: CRLDP: Creating EE certifiate request EE2Req.der  - PASSED
chains.sh: Creating certficate EE2CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40   --extAIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8556/buildnss02-10869-CA0Root-1128110466.der
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #3971: CRLDP: Creating certficate EE2CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate EE2CA0.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der
chains.sh: #3972: CRLDP: Importing certificate EE2CA0.der to EE2DB database  - PASSED
chains.sh: Create CRL for RootDB
crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl
=== Crlutil input data ===
update=20121128160615Z
nextupdate=20131128160615Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=Root ROOT CA,O=Root,C=US"
    This Update: Wed Nov 28 16:06:15 2012
    Next Update: Thu Nov 28 16:06:15 2013
    CRL Extensions:
chains.sh: #3973: CRLDP: Create CRL for RootDB  - PASSED
chains.sh: Create CRL for CA0DB
crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl
=== Crlutil input data ===
update=20121128160615Z
nextupdate=20131128160615Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA0 Intermediate,O=CA0,C=US"
    This Update: Wed Nov 28 16:06:15 2012
    Next Update: Thu Nov 28 16:06:15 2013
    CRL Extensions:
chains.sh: #3974: CRLDP: Create CRL for CA0DB  - PASSED
chains.sh: Create CRL for CA1DB
crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl
=== Crlutil input data ===
update=20121128160615Z
nextupdate=20131128160615Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
    This Update: Wed Nov 28 16:06:15 2012
    Next Update: Thu Nov 28 16:06:15 2013
    CRL Extensions:
chains.sh: #3975: CRLDP: Create CRL for CA1DB  - PASSED
chains.sh: Create CRL for CA2DB
crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl
=== Crlutil input data ===
update=20121128160616Z
nextupdate=20131128160616Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA2 Intermediate,O=CA2,C=US"
    This Update: Wed Nov 28 16:06:16 2012
    Next Update: Thu Nov 28 16:06:16 2013
    CRL Extensions:
chains.sh: #3976: CRLDP: Create CRL for CA2DB  - PASSED
chains.sh: Revoking certificate with SN 20 issued by CA0
crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl
=== Crlutil input data ===
update=20121128160617Z
addcert 20 20121128160617Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA0 Intermediate,O=CA0,C=US"
    This Update: Wed Nov 28 16:06:17 2012
    Next Update: Thu Nov 28 16:06:15 2013
    Entry 1 (0x1):
        Serial Number: 20 (0x14)
        Revocation Date: Wed Nov 28 16:06:17 2012
    CRL Extensions:
chains.sh: #3977: CRLDP: Revoking certificate with SN 20 issued by CA0  - PASSED
chains.sh: Revoking certificate with SN 40 issued by CA0
crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl
=== Crlutil input data ===
update=20121128160618Z
addcert 40 20121128160618Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA0 Intermediate,O=CA0,C=US"
    This Update: Wed Nov 28 16:06:18 2012
    Next Update: Thu Nov 28 16:06:15 2013
    Entry 1 (0x1):
        Serial Number: 20 (0x14)
        Revocation Date: Wed Nov 28 16:06:17 2012
    Entry 2 (0x2):
        Serial Number: 40 (0x28)
        Revocation Date: Wed Nov 28 16:06:18 2012
    CRL Extensions:
chains.sh: #3978: CRLDP: Revoking certificate with SN 40 issued by CA0  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #3979: CRLDP: Creating DB AllDB  - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #3980: CRLDP: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing CRL Root.crl to AllDB database
crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl
chains.sh: #3981: CRLDP: Importing CRL Root.crl to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  EE11CA1.der CA1CA0.der with flags  -g chain -h requireFreshInfo -m crl -d AllDB -f    -t Root.der
vfychain -d AllDB -pp -vv  -g chain -h requireFreshInfo -m crl -f    EE11CA1.der CA1CA0.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128110586 (0x433d99fa)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:06:13 2012
            Not After : Tue Nov 28 16:06:13 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cc:a9:b3:66:51:67:fb:1e:49:9c:a9:55:3b:46:a3:73:
                    41:b1:b8:c5:d8:59:f1:b6:81:03:bf:66:ca:92:b4:2c:
                    4a:35:c8:5e:39:55:06:29:ce:53:05:18:60:b7:a1:a3:
                    69:b2:4e:5c:ab:fe:44:58:d6:89:76:78:2c:df:48:c7:
                    c9:db:a1:f3:58:e8:1f:72:53:ff:3b:16:1b:11:6b:29:
                    53:63:50:05:de:e3:5c:1f:4f:c5:4d:f6:b4:82:a8:28:
                    59:ca:4c:c0:66:0d:d9:9e:ff:92:a4:d0:36:a8:27:07:
                    69:e6:5a:be:3f:62:89:d6:d6:1b:c0:3a:33:f7:14:c1
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        52:65:7c:07:81:f5:7f:b0:0f:c9:47:1b:4a:2c:bf:6a:
        89:7e:b2:d5:0d:2f:ef:52:cb:82:7c:10:98:08:b4:83:
        d7:27:80:14:a7:f0:e8:52:ac:f8:6b:35:1c:3e:62:69:
        93:c3:7b:26:12:e5:4b:62:37:dd:b2:12:9a:9e:a5:0e:
        8c:57:b9:c8:3f:a9:7d:47:52:57:69:05:81:20:d3:ac:
        dc:e4:6c:6a:37:d2:91:bf:47:15:b1:2c:ce:21:95:89:
        0e:76:34:25:17:ca:e5:01:e3:2f:0c:6b:15:5d:47:fb:
        c4:e3:a4:81:2a:2d:fb:34:1a:98:d7:ee:5a:a2:0c:eb
    Fingerprint (MD5):
        7E:64:16:B5:AF:3F:0E:48:3A:A6:52:72:FF:B4:3A:88
    Fingerprint (SHA1):
        31:7C:B8:C0:5C:29:0B:B5:79:F3:32:C8:CF:34:E3:A9:18:9F:E3:C2

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US"
Returned value is 0, expected result is pass
chains.sh: #3982: CRLDP: Verifying certificate(s)  EE11CA1.der CA1CA0.der with flags  -g chain -h requireFreshInfo -m crl -d AllDB -f    -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE21CA2.der CA2CA0.der with flags  -g chain -h requireFreshInfo -m crl -d AllDB -f    -t Root.der
vfychain -d AllDB -pp -vv  -g chain -h requireFreshInfo -m crl -f    EE21CA2.der CA2CA0.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #3983: CRLDP: Verifying certificate(s)  EE21CA2.der CA2CA0.der with flags  -g chain -h requireFreshInfo -m crl -d AllDB -f    -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA0.der with flags  -g leaf -h requireFreshInfo -m crl -d AllDB -f    -t Root.der
vfychain -d AllDB -pp -vv  -g leaf -h requireFreshInfo -m crl -f    EE1CA0.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128110586 (0x433d99fa)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:06:13 2012
            Not After : Tue Nov 28 16:06:13 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cc:a9:b3:66:51:67:fb:1e:49:9c:a9:55:3b:46:a3:73:
                    41:b1:b8:c5:d8:59:f1:b6:81:03:bf:66:ca:92:b4:2c:
                    4a:35:c8:5e:39:55:06:29:ce:53:05:18:60:b7:a1:a3:
                    69:b2:4e:5c:ab:fe:44:58:d6:89:76:78:2c:df:48:c7:
                    c9:db:a1:f3:58:e8:1f:72:53:ff:3b:16:1b:11:6b:29:
                    53:63:50:05:de:e3:5c:1f:4f:c5:4d:f6:b4:82:a8:28:
                    59:ca:4c:c0:66:0d:d9:9e:ff:92:a4:d0:36:a8:27:07:
                    69:e6:5a:be:3f:62:89:d6:d6:1b:c0:3a:33:f7:14:c1
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        52:65:7c:07:81:f5:7f:b0:0f:c9:47:1b:4a:2c:bf:6a:
        89:7e:b2:d5:0d:2f:ef:52:cb:82:7c:10:98:08:b4:83:
        d7:27:80:14:a7:f0:e8:52:ac:f8:6b:35:1c:3e:62:69:
        93:c3:7b:26:12:e5:4b:62:37:dd:b2:12:9a:9e:a5:0e:
        8c:57:b9:c8:3f:a9:7d:47:52:57:69:05:81:20:d3:ac:
        dc:e4:6c:6a:37:d2:91:bf:47:15:b1:2c:ce:21:95:89:
        0e:76:34:25:17:ca:e5:01:e3:2f:0c:6b:15:5d:47:fb:
        c4:e3:a4:81:2a:2d:fb:34:1a:98:d7:ee:5a:a2:0c:eb
    Fingerprint (MD5):
        7E:64:16:B5:AF:3F:0E:48:3A:A6:52:72:FF:B4:3A:88
    Fingerprint (SHA1):
        31:7C:B8:C0:5C:29:0B:B5:79:F3:32:C8:CF:34:E3:A9:18:9F:E3:C2

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US"
Returned value is 0, expected result is pass
chains.sh: #3984: CRLDP: Verifying certificate(s)  EE1CA0.der with flags  -g leaf -h requireFreshInfo -m crl -d AllDB -f    -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA0.der with flags  -g leaf -h requireFreshInfo -m crl -d AllDB -f    -t Root.der
vfychain -d AllDB -pp -vv  -g leaf -h requireFreshInfo -m crl -f    EE2CA0.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. Root [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #3985: CRLDP: Verifying certificate(s)  EE2CA0.der with flags  -g leaf -h requireFreshInfo -m crl -d AllDB -f    -t Root.der - PASSED
trying to kill httpserv with PID 27588 at Wed Nov 28 11:06:18 EST 2012
kill -USR1 27588
selfserv: normal termination
httpserv -b -p 8556 2>/dev/null;
httpserv with PID 27588 killed at Wed Nov 28 11:06:18 EST 2012
TIMESTAMP chains END: Wed Nov 28 11:06:18 EST 2012
chains.sh: Testing with PKIX ===============================
Running tests for lowhash
TIMESTAMP lowhash BEGIN: Wed Nov 28 11:06:18 EST 2012
lowhash.sh: Lowhash Tests ===============================
lowhashtest with fips mode=
lowhashtest MD5
lowhash.sh: #3986: lowhashtest with fips mode= for MD5  - PASSED
lowhashtest SHA1
lowhash.sh: #3987: lowhashtest with fips mode= for SHA1  - PASSED
lowhashtest SHA224
lowhash.sh: #3988: lowhashtest with fips mode= for SHA224  - PASSED
lowhashtest SHA256
lowhash.sh: #3989: lowhashtest with fips mode= for SHA256  - PASSED
lowhashtest SHA384
lowhash.sh: #3990: lowhashtest with fips mode= for SHA384  - PASSED
lowhashtest SHA512
lowhash.sh: #3991: lowhashtest with fips mode= for SHA512  - PASSED
lowhashtest with fips mode=
lowhashtest MD5
lowhash.sh: #3992: lowhashtest with fips mode= for MD5  - PASSED
lowhashtest SHA1
lowhash.sh: #3993: lowhashtest with fips mode= for SHA1  - PASSED
lowhashtest SHA224
lowhash.sh: #3994: lowhashtest with fips mode= for SHA224  - PASSED
lowhashtest SHA256
lowhash.sh: #3995: lowhashtest with fips mode= for SHA256  - PASSED
lowhashtest SHA384
lowhash.sh: #3996: lowhashtest with fips mode= for SHA384  - PASSED
lowhashtest SHA512
lowhash.sh: #3997: lowhashtest with fips mode= for SHA512  - PASSED
lowhash.sh done
TIMESTAMP lowhash END: Wed Nov 28 11:06:19 EST 2012
Running tests for libpkix
TIMESTAMP libpkix BEGIN: Wed Nov 28 11:06:19 EST 2012
TIMESTAMP libpkix END: Wed Nov 28 11:06:19 EST 2012
Running tests for cert
TIMESTAMP cert BEGIN: Wed Nov 28 11:06:19 EST 2012
cert.sh: Certutil and Crlutil Tests with ECC ===============================
cert.sh: #3998: Looking for root certs module. - PASSED
cert.sh: Creating a CA Certificate TestCA ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/CA
cert.sh: Creating CA Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/CA -f ../tests.pw
cert.sh: #3999: Creating CA Cert DB - PASSED
cert.sh: Loading root cert module to CA Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/CA

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #4000: Loading root cert module to CA Cert DB - PASSED
cert.sh: Certificate initialized ----------
cert.sh: Creating CA Cert TestCA  --------------------------
certutil -s "CN=NSS Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA -t CTu,CTu,CTu -v 600 -x -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #4001: Creating CA Cert TestCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n TestCA -r -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/CA -o root.cert
cert.sh: #4002: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate serverCA ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/serverCA
cert.sh: Creating CA Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/serverCA -f ../tests.pw
cert.sh: #4003: Creating CA Cert DB - PASSED
cert.sh: Loading root cert module to CA Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/serverCA

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #4004: Loading root cert module to CA Cert DB - PASSED
cert.sh: Certificate initialized ----------
cert.sh: Creating CA Cert serverCA  --------------------------
certutil -s "CN=NSS Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA -t Cu,Cu,Cu -v 600 -x -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #4005: Creating CA Cert serverCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n serverCA -r -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/serverCA -o root.cert
cert.sh: #4006: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate chain-1-serverCA ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/serverCA
cert.sh: Creating CA Cert chain-1-serverCA  --------------------------
certutil -s "CN=NSS Chain1 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA -t u,u,u -v 600 -c serverCA -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #4007: Creating CA Cert chain-1-serverCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n chain-1-serverCA -r -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/serverCA -o root.cert
cert.sh: #4008: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate chain-2-serverCA ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/serverCA
cert.sh: Creating CA Cert chain-2-serverCA  --------------------------
certutil -s "CN=NSS Chain2 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA -t u,u,u -v 600 -c chain-1-serverCA -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #4009: Creating CA Cert chain-2-serverCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n chain-2-serverCA -r -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/serverCA -o root.cert
cert.sh: #4010: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate clientCA ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/clientCA
cert.sh: Creating CA Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/clientCA -f ../tests.pw
cert.sh: #4011: Creating CA Cert DB - PASSED
cert.sh: Loading root cert module to CA Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/clientCA

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #4012: Loading root cert module to CA Cert DB - PASSED
cert.sh: Certificate initialized ----------
cert.sh: Creating CA Cert clientCA  --------------------------
certutil -s "CN=NSS Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA -t Tu,Cu,Cu -v 600 -x -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #4013: Creating CA Cert clientCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n clientCA -r -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/clientCA -o root.cert
cert.sh: #4014: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate chain-1-clientCA ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/clientCA
cert.sh: Creating CA Cert chain-1-clientCA  --------------------------
certutil -s "CN=NSS Chain1 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA -t u,u,u -v 600 -c clientCA -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #4015: Creating CA Cert chain-1-clientCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n chain-1-clientCA -r -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/clientCA -o root.cert
cert.sh: #4016: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate chain-2-clientCA ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/clientCA
cert.sh: Creating CA Cert chain-2-clientCA  --------------------------
certutil -s "CN=NSS Chain2 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA -t u,u,u -v 600 -c chain-1-clientCA -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #4017: Creating CA Cert chain-2-clientCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n chain-2-clientCA -r -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/clientCA -o root.cert
cert.sh: #4018: Exporting Root Cert - PASSED
cert.sh: Creating an EC CA Certificate TestCA-ec ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/CA
cert.sh: Creating EC CA Cert TestCA-ec  --------------------------
certutil -s "CN=NSS Test CA (ECC), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-ec -k ec -q secp521r1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #4019: Creating EC CA Cert TestCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n TestCA-ec -r -d . -o ecroot.cert
cert.sh: #4020: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate serverCA-ec ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/serverCA
cert.sh: Creating EC CA Cert serverCA-ec  --------------------------
certutil -s "CN=NSS Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-ec -k ec -q secp521r1 -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #4021: Creating EC CA Cert serverCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n serverCA-ec -r -d . -o ecroot.cert
cert.sh: #4022: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate chain-1-serverCA-ec ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/serverCA
cert.sh: Creating EC CA Cert chain-1-serverCA-ec  --------------------------
certutil -s "CN=NSS Chain1 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #4023: Creating EC CA Cert chain-1-serverCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n chain-1-serverCA-ec -r -d . -o ecroot.cert
cert.sh: #4024: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate chain-2-serverCA-ec ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/serverCA
cert.sh: Creating EC CA Cert chain-2-serverCA-ec  --------------------------
certutil -s "CN=NSS Chain2 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #4025: Creating EC CA Cert chain-2-serverCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n chain-2-serverCA-ec -r -d . -o ecroot.cert
cert.sh: #4026: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate clientCA-ec ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/clientCA
cert.sh: Creating EC CA Cert clientCA-ec  --------------------------
certutil -s "CN=NSS Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-ec -k ec -q secp521r1 -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #4027: Creating EC CA Cert clientCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n clientCA-ec -r -d . -o ecroot.cert
cert.sh: #4028: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate chain-1-clientCA-ec ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/clientCA
cert.sh: Creating EC CA Cert chain-1-clientCA-ec  --------------------------
certutil -s "CN=NSS Chain1 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #4029: Creating EC CA Cert chain-1-clientCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n chain-1-clientCA-ec -r -d . -o ecroot.cert
cert.sh: #4030: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate chain-2-clientCA-ec ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/clientCA
cert.sh: Creating EC CA Cert chain-2-clientCA-ec  --------------------------
certutil -s "CN=NSS Chain2 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #4031: Creating EC CA Cert chain-2-clientCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n chain-2-clientCA-ec -r -d . -o ecroot.cert
cert.sh: #4032: Exporting EC Root Cert - PASSED
cert.sh: Creating Certificates, issued by the last ===============
     of a chain of CA's which are not in the same database============
Server Cert
cert.sh: Initializing buildnss02.usersys.redhat.com's Cert DB (ext.) --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/ext_server -f ../tests.pw
cert.sh: #4033: Initializing buildnss02.usersys.redhat.com's Cert DB (ext.) - PASSED
cert.sh: Loading root cert module to buildnss02.usersys.redhat.com's Cert DB (ext.) --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/ext_server

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #4034: Loading root cert module to buildnss02.usersys.redhat.com's Cert DB (ext.) - PASSED
cert.sh: Generate Cert Request for buildnss02.usersys.redhat.com (ext) --------------------------
certutil -s "CN=buildnss02.usersys.redhat.com, E=buildnss02.usersys.redhat.com@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/ext_server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4035: Generate Cert Request for buildnss02.usersys.redhat.com (ext) - PASSED
cert.sh: Sign buildnss02.usersys.redhat.com's Request (ext) --------------------------
certutil -C -c chain-2-serverCA -m 200 -v 60 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/serverCA -i req -o buildnss02.usersys.redhat.com.cert -f ../tests.pw
cert.sh: #4036: Sign buildnss02.usersys.redhat.com's Request (ext) - PASSED
cert.sh: Import buildnss02.usersys.redhat.com's Cert  -t u,u,u (ext) --------------------------
certutil -A -n buildnss02.usersys.redhat.com -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/ext_server -f ../tests.pw -i buildnss02.usersys.redhat.com.cert
cert.sh: #4037: Import buildnss02.usersys.redhat.com's Cert  -t u,u,u (ext) - PASSED
cert.sh: Import Client Root CA -t T,, for buildnss02.usersys.redhat.com (ext.) --------------------------
certutil -A -n clientCA -t T,, -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/ext_server -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/clientCA/clientCA.ca.cert
cert.sh: #4038: Import Client Root CA -t T,, for buildnss02.usersys.redhat.com (ext.) - PASSED
cert.sh: Generate EC Cert Request for buildnss02.usersys.redhat.com (ext) --------------------------
certutil -s "CN=buildnss02.usersys.redhat.com, E=buildnss02.usersys.redhat.com-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4039: Generate EC Cert Request for buildnss02.usersys.redhat.com (ext) - PASSED
cert.sh: Sign buildnss02.usersys.redhat.com's EC Request (ext) --------------------------
certutil -C -c chain-2-serverCA-ec -m 200 -v 60 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/serverCA -i req -o buildnss02.usersys.redhat.com-ec.cert -f ../tests.pw
cert.sh: #4040: Sign buildnss02.usersys.redhat.com's EC Request (ext) - PASSED
cert.sh: Import buildnss02.usersys.redhat.com's EC Cert  -t u,u,u (ext) --------------------------
certutil -A -n buildnss02.usersys.redhat.com-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/ext_server -f ../tests.pw -i buildnss02.usersys.redhat.com-ec.cert
cert.sh: #4041: Import buildnss02.usersys.redhat.com's EC Cert  -t u,u,u (ext) - PASSED
cert.sh: Import Client EC Root CA -t T,, for buildnss02.usersys.redhat.com (ext.) --------------------------
certutil -A -n clientCA-ec -t T,, -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/ext_server -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/clientCA/clientCA-ec.ca.cert
cert.sh: #4042: Import Client EC Root CA -t T,, for buildnss02.usersys.redhat.com (ext.) - PASSED
cert.sh: Generate mixed EC Cert Request for buildnss02.usersys.redhat.com (ext) --------------------------
certutil -s "CN=buildnss02.usersys.redhat.com, E=buildnss02.usersys.redhat.com-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4043: Generate mixed EC Cert Request for buildnss02.usersys.redhat.com (ext) - PASSED
cert.sh: Sign buildnss02.usersys.redhat.com's mixed EC Request (ext) --------------------------
certutil -C -c chain-2-serverCA -m 201 -v 60 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/serverCA -i req -o buildnss02.usersys.redhat.com-ecmixed.cert -f ../tests.pw
cert.sh: #4044: Sign buildnss02.usersys.redhat.com's mixed EC Request (ext) - PASSED
cert.sh: Import buildnss02.usersys.redhat.com's mixed EC Cert  -t u,u,u (ext) --------------------------
certutil -A -n buildnss02.usersys.redhat.com-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/ext_server -f ../tests.pw -i buildnss02.usersys.redhat.com-ecmixed.cert
cert.sh: #4045: Import buildnss02.usersys.redhat.com's mixed EC Cert  -t u,u,u (ext) - PASSED
Importing all the server's own CA chain into the servers DB
cert.sh: Import chain-2-serverCA-ec CA -t u,u,u for buildnss02.usersys.redhat.com (ext.)  --------------------------
certutil -A -n chain-2-serverCA-ec -t u,u,u -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/ext_server -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/serverCA/chain-2-serverCA-ec.ca.cert
cert.sh: #4046: Import chain-2-serverCA-ec CA -t u,u,u for buildnss02.usersys.redhat.com (ext.)  - PASSED
cert.sh: Import chain-1-serverCA CA -t u,u,u for buildnss02.usersys.redhat.com (ext.)  --------------------------
certutil -A -n chain-1-serverCA -t u,u,u -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/ext_server -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/serverCA/chain-1-serverCA.ca.cert
cert.sh: #4047: Import chain-1-serverCA CA -t u,u,u for buildnss02.usersys.redhat.com (ext.)  - PASSED
cert.sh: Import serverCA CA -t C,C,C for buildnss02.usersys.redhat.com (ext.)  --------------------------
certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/ext_server -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/serverCA/serverCA.ca.cert
cert.sh: #4048: Import serverCA CA -t C,C,C for buildnss02.usersys.redhat.com (ext.)  - PASSED
cert.sh: Import chain-2-serverCA CA -t u,u,u for buildnss02.usersys.redhat.com (ext.)  --------------------------
certutil -A -n chain-2-serverCA -t u,u,u -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/ext_server -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/serverCA/chain-2-serverCA.ca.cert
cert.sh: #4049: Import chain-2-serverCA CA -t u,u,u for buildnss02.usersys.redhat.com (ext.)  - PASSED
cert.sh: Import serverCA-ec CA -t C,C,C for buildnss02.usersys.redhat.com (ext.)  --------------------------
certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/ext_server -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/serverCA/serverCA-ec.ca.cert
cert.sh: #4050: Import serverCA-ec CA -t C,C,C for buildnss02.usersys.redhat.com (ext.)  - PASSED
cert.sh: Import chain-1-serverCA-ec CA -t u,u,u for buildnss02.usersys.redhat.com (ext.)  --------------------------
certutil -A -n chain-1-serverCA-ec -t u,u,u -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/ext_server -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/serverCA/chain-1-serverCA-ec.ca.cert
cert.sh: #4051: Import chain-1-serverCA-ec CA -t u,u,u for buildnss02.usersys.redhat.com (ext.)  - PASSED
Client Cert
cert.sh: Initializing ExtendedSSLUser's Cert DB (ext.) --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/ext_client -f ../tests.pw
cert.sh: #4052: Initializing ExtendedSSLUser's Cert DB (ext.) - PASSED
cert.sh: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/ext_client

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #4053: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) - PASSED
cert.sh: Generate Cert Request for ExtendedSSLUser (ext) --------------------------
certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/ext_client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4054: Generate Cert Request for ExtendedSSLUser (ext) - PASSED
cert.sh: Sign ExtendedSSLUser's Request (ext) --------------------------
certutil -C -c chain-2-clientCA -m 300 -v 60 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/clientCA -i req -o ExtendedSSLUser.cert -f ../tests.pw
cert.sh: #4055: Sign ExtendedSSLUser's Request (ext) - PASSED
cert.sh: Import ExtendedSSLUser's Cert -t u,u,u (ext) --------------------------
certutil -A -n ExtendedSSLUser -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/ext_client -f ../tests.pw -i ExtendedSSLUser.cert
cert.sh: #4056: Import ExtendedSSLUser's Cert -t u,u,u (ext) - PASSED
cert.sh: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) --------------------------
certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/ext_client -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/serverCA/serverCA.ca.cert
cert.sh: #4057: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED
cert.sh: Generate EC Cert Request for ExtendedSSLUser (ext) --------------------------
certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4058: Generate EC Cert Request for ExtendedSSLUser (ext) - PASSED
cert.sh: Sign ExtendedSSLUser's EC Request (ext) --------------------------
certutil -C -c chain-2-clientCA-ec -m 300 -v 60 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/clientCA -i req -o ExtendedSSLUser-ec.cert -f ../tests.pw
cert.sh: #4059: Sign ExtendedSSLUser's EC Request (ext) - PASSED
cert.sh: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) --------------------------
certutil -A -n ExtendedSSLUser-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/ext_client -f ../tests.pw -i ExtendedSSLUser-ec.cert
cert.sh: #4060: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) - PASSED
cert.sh: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) --------------------------
certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/ext_client -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/serverCA/serverCA-ec.ca.cert
cert.sh: #4061: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED
cert.sh: Generate mixed EC Cert Request for ExtendedSSLUser (ext) --------------------------
certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4062: Generate mixed EC Cert Request for ExtendedSSLUser (ext) - PASSED
cert.sh: Sign ExtendedSSLUser's mixed EC Request (ext) --------------------------
certutil -C -c chain-2-clientCA -m 301 -v 60 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/clientCA -i req -o ExtendedSSLUser-ecmixed.cert -f ../tests.pw
cert.sh: #4063: Sign ExtendedSSLUser's mixed EC Request (ext) - PASSED
cert.sh: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) --------------------------
certutil -A -n ExtendedSSLUser-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/ext_client -f ../tests.pw -i ExtendedSSLUser-ecmixed.cert
cert.sh: #4064: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) - PASSED
Importing all the client's own CA chain into the servers DB
cert.sh: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) --------------------------
certutil -A -n chain-2-clientCA-ec -t u,u,u -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/ext_client -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/clientCA/chain-2-clientCA-ec.ca.cert
cert.sh: #4065: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) --------------------------
certutil -A -n clientCA -t T,C,C -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/ext_client -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/clientCA/clientCA.ca.cert
cert.sh: #4066: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) --------------------------
certutil -A -n chain-2-clientCA -t u,u,u -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/ext_client -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/clientCA/chain-2-clientCA.ca.cert
cert.sh: #4067: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) --------------------------
certutil -A -n clientCA-ec -t T,C,C -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/ext_client -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/clientCA/clientCA-ec.ca.cert
cert.sh: #4068: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) --------------------------
certutil -A -n chain-1-clientCA-ec -t u,u,u -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/ext_client -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/clientCA/chain-1-clientCA-ec.ca.cert
cert.sh: #4069: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) --------------------------
certutil -A -n chain-1-clientCA -t u,u,u -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/ext_client -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/clientCA/chain-1-clientCA.ca.cert
cert.sh: #4070: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED
cert.sh SUCCESS: EXT passed
cert.sh: Creating Client CA Issued Certificates ===============
cert.sh: Initializing TestUser's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw
cert.sh: #4071: Initializing TestUser's Cert DB - PASSED
cert.sh: Loading root cert module to TestUser's Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #4072: Loading root cert module to TestUser's Cert DB - PASSED
cert.sh: Import Root CA for TestUser --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -i ../CA/TestCA.ca.cert
cert.sh: #4073: Import Root CA for TestUser - PASSED
cert.sh: Import EC Root CA for TestUser --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -i ../CA/TestCA-ec.ca.cert
cert.sh: #4074: Import EC Root CA for TestUser - PASSED
cert.sh: Generate Cert Request for TestUser --------------------------
certutil -s "CN=TestUser, E=TestUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4075: Generate Cert Request for TestUser - PASSED
cert.sh: Sign TestUser's Request --------------------------
certutil -C -c TestCA -m 70 -v 60 -d ../CA -i req -o TestUser.cert -f ../tests.pw 
cert.sh: #4076: Sign TestUser's Request - PASSED
cert.sh: Import TestUser's Cert --------------------------
certutil -A -n TestUser -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser.cert
cert.sh: #4077: Import TestUser's Cert - PASSED
cert.sh SUCCESS: TestUser's Cert Created
cert.sh: Generate EC Cert Request for TestUser --------------------------
certutil -s "CN=TestUser, E=TestUser-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4078: Generate EC Cert Request for TestUser - PASSED
cert.sh: Sign TestUser's EC Request --------------------------
certutil -C -c TestCA-ec -m 70 -v 60 -d ../CA -i req -o TestUser-ec.cert -f ../tests.pw 
cert.sh: #4079: Sign TestUser's EC Request - PASSED
cert.sh: Import TestUser's EC Cert --------------------------
certutil -A -n TestUser-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser-ec.cert
cert.sh: #4080: Import TestUser's EC Cert - PASSED
cert.sh SUCCESS: TestUser's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser --------------------------
certutil -s "CN=TestUser, E=TestUser-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4081: Generate mixed EC Cert Request for TestUser - PASSED
cert.sh: Sign TestUser's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10070 -v 60 -d ../CA -i req -o TestUser-ecmixed.cert -f ../tests.pw 
cert.sh: #4082: Sign TestUser's EC Request with RSA - PASSED
cert.sh: Import TestUser's mixed EC Cert --------------------------
certutil -A -n TestUser-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser-ecmixed.cert
cert.sh: #4083: Import TestUser's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser's mixed EC Cert Created
cert.sh: Creating Server CA Issued Certificate for \
             buildnss02.usersys.redhat.com ------------------------------------
cert.sh: Initializing buildnss02.usersys.redhat.com's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/server -f ../tests.pw
cert.sh: #4084: Initializing buildnss02.usersys.redhat.com's Cert DB - PASSED
cert.sh: Loading root cert module to buildnss02.usersys.redhat.com's Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/server

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #4085: Loading root cert module to buildnss02.usersys.redhat.com's Cert DB - PASSED
cert.sh: Import Root CA for buildnss02.usersys.redhat.com --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/server -i ../CA/TestCA.ca.cert
cert.sh: #4086: Import Root CA for buildnss02.usersys.redhat.com - PASSED
cert.sh: Import EC Root CA for buildnss02.usersys.redhat.com --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/server -i ../CA/TestCA-ec.ca.cert
cert.sh: #4087: Import EC Root CA for buildnss02.usersys.redhat.com - PASSED
cert.sh: Generate Cert Request for buildnss02.usersys.redhat.com --------------------------
certutil -s "CN=buildnss02.usersys.redhat.com, E=buildnss02.usersys.redhat.com@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4088: Generate Cert Request for buildnss02.usersys.redhat.com - PASSED
cert.sh: Sign buildnss02.usersys.redhat.com's Request --------------------------
certutil -C -c TestCA -m 100 -v 60 -d ../CA -i req -o buildnss02.usersys.redhat.com.cert -f ../tests.pw 
cert.sh: #4089: Sign buildnss02.usersys.redhat.com's Request - PASSED
cert.sh: Import buildnss02.usersys.redhat.com's Cert --------------------------
certutil -A -n buildnss02.usersys.redhat.com -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/server -f ../tests.pw -i buildnss02.usersys.redhat.com.cert
cert.sh: #4090: Import buildnss02.usersys.redhat.com's Cert - PASSED
cert.sh SUCCESS: buildnss02.usersys.redhat.com's Cert Created
cert.sh: Generate EC Cert Request for buildnss02.usersys.redhat.com --------------------------
certutil -s "CN=buildnss02.usersys.redhat.com, E=buildnss02.usersys.redhat.com-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4091: Generate EC Cert Request for buildnss02.usersys.redhat.com - PASSED
cert.sh: Sign buildnss02.usersys.redhat.com's EC Request --------------------------
certutil -C -c TestCA-ec -m 100 -v 60 -d ../CA -i req -o buildnss02.usersys.redhat.com-ec.cert -f ../tests.pw 
cert.sh: #4092: Sign buildnss02.usersys.redhat.com's EC Request - PASSED
cert.sh: Import buildnss02.usersys.redhat.com's EC Cert --------------------------
certutil -A -n buildnss02.usersys.redhat.com-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/server -f ../tests.pw -i buildnss02.usersys.redhat.com-ec.cert
cert.sh: #4093: Import buildnss02.usersys.redhat.com's EC Cert - PASSED
cert.sh SUCCESS: buildnss02.usersys.redhat.com's EC Cert Created
cert.sh: Generate mixed EC Cert Request for buildnss02.usersys.redhat.com --------------------------
certutil -s "CN=buildnss02.usersys.redhat.com, E=buildnss02.usersys.redhat.com-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4094: Generate mixed EC Cert Request for buildnss02.usersys.redhat.com - PASSED
cert.sh: Sign buildnss02.usersys.redhat.com's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10100 -v 60 -d ../CA -i req -o buildnss02.usersys.redhat.com-ecmixed.cert -f ../tests.pw 
cert.sh: #4095: Sign buildnss02.usersys.redhat.com's EC Request with RSA - PASSED
cert.sh: Import buildnss02.usersys.redhat.com's mixed EC Cert --------------------------
certutil -A -n buildnss02.usersys.redhat.com-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/server -f ../tests.pw -i buildnss02.usersys.redhat.com-ecmixed.cert
cert.sh: #4096: Import buildnss02.usersys.redhat.com's mixed EC Cert - PASSED
cert.sh SUCCESS: buildnss02.usersys.redhat.com's mixed EC Cert Created
cert.sh: Creating Server CA Issued Certificate for \
             buildnss02.usersys.redhat.com-sni --------------------------------
cert.sh: Generate Cert Request for buildnss02-sni.usersys.redhat.com --------------------------
certutil -s "CN=buildnss02-sni.usersys.redhat.com, E=buildnss02-sni.usersys.redhat.com@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4097: Generate Cert Request for buildnss02-sni.usersys.redhat.com - PASSED
cert.sh: Sign buildnss02-sni.usersys.redhat.com's Request --------------------------
certutil -C -c TestCA -m 101 -v 60 -d ../CA -i req -o buildnss02-sni.usersys.redhat.com.cert -f ../tests.pw 
cert.sh: #4098: Sign buildnss02-sni.usersys.redhat.com's Request - PASSED
cert.sh: Import buildnss02-sni.usersys.redhat.com's Cert --------------------------
certutil -A -n buildnss02-sni.usersys.redhat.com -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/server -f ../tests.pw -i buildnss02-sni.usersys.redhat.com.cert
cert.sh: #4099: Import buildnss02-sni.usersys.redhat.com's Cert - PASSED
cert.sh SUCCESS: buildnss02-sni.usersys.redhat.com's Cert Created
cert.sh: Generate EC Cert Request for buildnss02-sni.usersys.redhat.com --------------------------
certutil -s "CN=buildnss02-sni.usersys.redhat.com, E=buildnss02-sni.usersys.redhat.com-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4100: Generate EC Cert Request for buildnss02-sni.usersys.redhat.com - PASSED
cert.sh: Sign buildnss02-sni.usersys.redhat.com's EC Request --------------------------
certutil -C -c TestCA-ec -m 101 -v 60 -d ../CA -i req -o buildnss02-sni.usersys.redhat.com-ec.cert -f ../tests.pw 
cert.sh: #4101: Sign buildnss02-sni.usersys.redhat.com's EC Request - PASSED
cert.sh: Import buildnss02-sni.usersys.redhat.com's EC Cert --------------------------
certutil -A -n buildnss02-sni.usersys.redhat.com-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/server -f ../tests.pw -i buildnss02-sni.usersys.redhat.com-ec.cert
cert.sh: #4102: Import buildnss02-sni.usersys.redhat.com's EC Cert - PASSED
cert.sh SUCCESS: buildnss02-sni.usersys.redhat.com's EC Cert Created
cert.sh: Generate mixed EC Cert Request for buildnss02-sni.usersys.redhat.com --------------------------
certutil -s "CN=buildnss02-sni.usersys.redhat.com, E=buildnss02-sni.usersys.redhat.com-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4103: Generate mixed EC Cert Request for buildnss02-sni.usersys.redhat.com - PASSED
cert.sh: Sign buildnss02-sni.usersys.redhat.com's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10101 -v 60 -d ../CA -i req -o buildnss02-sni.usersys.redhat.com-ecmixed.cert -f ../tests.pw 
cert.sh: #4104: Sign buildnss02-sni.usersys.redhat.com's EC Request with RSA - PASSED
cert.sh: Import buildnss02-sni.usersys.redhat.com's mixed EC Cert --------------------------
certutil -A -n buildnss02-sni.usersys.redhat.com-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/server -f ../tests.pw -i buildnss02-sni.usersys.redhat.com-ecmixed.cert
cert.sh: #4105: Import buildnss02-sni.usersys.redhat.com's mixed EC Cert - PASSED
cert.sh SUCCESS: buildnss02-sni.usersys.redhat.com's mixed EC Cert Created
cert.sh: Modify trust attributes of Root CA -t TC,TC,TC --------------------------
certutil -M -n TestCA -t TC,TC,TC -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/server -f ../tests.pw
cert.sh: #4106: Modify trust attributes of Root CA -t TC,TC,TC - PASSED
cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC --------------------------
certutil -M -n TestCA-ec -t TC,TC,TC -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/server -f ../tests.pw
cert.sh: #4107: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED
cert.sh SUCCESS: SSL passed
cert.sh: Creating Client CA Issued Certificates ==============
cert.sh: Initializing Alice's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/alicedir -f ../tests.pw
cert.sh: #4108: Initializing Alice's Cert DB - PASSED
cert.sh: Loading root cert module to Alice's Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/alicedir

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #4109: Loading root cert module to Alice's Cert DB - PASSED
cert.sh: Import Root CA for Alice --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/alicedir -i ../CA/TestCA.ca.cert
cert.sh: #4110: Import Root CA for Alice - PASSED
cert.sh: Import EC Root CA for Alice --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/alicedir -i ../CA/TestCA-ec.ca.cert
cert.sh: #4111: Import EC Root CA for Alice - PASSED
cert.sh: Generate Cert Request for Alice --------------------------
certutil -s "CN=Alice, E=Alice@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/alicedir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4112: Generate Cert Request for Alice - PASSED
cert.sh: Sign Alice's Request --------------------------
certutil -C -c TestCA -m 30 -v 60 -d ../CA -i req -o Alice.cert -f ../tests.pw 
cert.sh: #4113: Sign Alice's Request - PASSED
cert.sh: Import Alice's Cert --------------------------
certutil -A -n Alice -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/alicedir -f ../tests.pw -i Alice.cert
cert.sh: #4114: Import Alice's Cert - PASSED
cert.sh SUCCESS: Alice's Cert Created
cert.sh: Generate EC Cert Request for Alice --------------------------
certutil -s "CN=Alice, E=Alice-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/alicedir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4115: Generate EC Cert Request for Alice - PASSED
cert.sh: Sign Alice's EC Request --------------------------
certutil -C -c TestCA-ec -m 30 -v 60 -d ../CA -i req -o Alice-ec.cert -f ../tests.pw 
cert.sh: #4116: Sign Alice's EC Request - PASSED
cert.sh: Import Alice's EC Cert --------------------------
certutil -A -n Alice-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/alicedir -f ../tests.pw -i Alice-ec.cert
cert.sh: #4117: Import Alice's EC Cert - PASSED
cert.sh SUCCESS: Alice's EC Cert Created
cert.sh: Generate mixed EC Cert Request for Alice --------------------------
certutil -s "CN=Alice, E=Alice-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/alicedir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4118: Generate mixed EC Cert Request for Alice - PASSED
cert.sh: Sign Alice's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10030 -v 60 -d ../CA -i req -o Alice-ecmixed.cert -f ../tests.pw 
cert.sh: #4119: Sign Alice's EC Request with RSA - PASSED
cert.sh: Import Alice's mixed EC Cert --------------------------
certutil -A -n Alice-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/alicedir -f ../tests.pw -i Alice-ecmixed.cert
cert.sh: #4120: Import Alice's mixed EC Cert - PASSED
cert.sh SUCCESS: Alice's mixed EC Cert Created
cert.sh: Initializing Bob's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/bobdir -f ../tests.pw
cert.sh: #4121: Initializing Bob's Cert DB - PASSED
cert.sh: Loading root cert module to Bob's Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/bobdir

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #4122: Loading root cert module to Bob's Cert DB - PASSED
cert.sh: Import Root CA for Bob --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/bobdir -i ../CA/TestCA.ca.cert
cert.sh: #4123: Import Root CA for Bob - PASSED
cert.sh: Import EC Root CA for Bob --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/bobdir -i ../CA/TestCA-ec.ca.cert
cert.sh: #4124: Import EC Root CA for Bob - PASSED
cert.sh: Generate Cert Request for Bob --------------------------
certutil -s "CN=Bob, E=Bob@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/bobdir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4125: Generate Cert Request for Bob - PASSED
cert.sh: Sign Bob's Request --------------------------
certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o Bob.cert -f ../tests.pw 
cert.sh: #4126: Sign Bob's Request - PASSED
cert.sh: Import Bob's Cert --------------------------
certutil -A -n Bob -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/bobdir -f ../tests.pw -i Bob.cert
cert.sh: #4127: Import Bob's Cert - PASSED
cert.sh SUCCESS: Bob's Cert Created
cert.sh: Generate EC Cert Request for Bob --------------------------
certutil -s "CN=Bob, E=Bob-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/bobdir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4128: Generate EC Cert Request for Bob - PASSED
cert.sh: Sign Bob's EC Request --------------------------
certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o Bob-ec.cert -f ../tests.pw 
cert.sh: #4129: Sign Bob's EC Request - PASSED
cert.sh: Import Bob's EC Cert --------------------------
certutil -A -n Bob-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/bobdir -f ../tests.pw -i Bob-ec.cert
cert.sh: #4130: Import Bob's EC Cert - PASSED
cert.sh SUCCESS: Bob's EC Cert Created
cert.sh: Generate mixed EC Cert Request for Bob --------------------------
certutil -s "CN=Bob, E=Bob-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/bobdir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4131: Generate mixed EC Cert Request for Bob - PASSED
cert.sh: Sign Bob's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o Bob-ecmixed.cert -f ../tests.pw 
cert.sh: #4132: Sign Bob's EC Request with RSA - PASSED
cert.sh: Import Bob's mixed EC Cert --------------------------
certutil -A -n Bob-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/bobdir -f ../tests.pw -i Bob-ecmixed.cert
cert.sh: #4133: Import Bob's mixed EC Cert - PASSED
cert.sh SUCCESS: Bob's mixed EC Cert Created
cert.sh: Creating Dave's Certificate -------------------------
cert.sh: Initializing Dave's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/dave -f ../tests.pw
cert.sh: #4134: Initializing Dave's Cert DB - PASSED
cert.sh: Loading root cert module to Dave's Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/dave

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #4135: Loading root cert module to Dave's Cert DB - PASSED
cert.sh: Import Root CA for Dave --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/dave -i ../CA/TestCA.ca.cert
cert.sh: #4136: Import Root CA for Dave - PASSED
cert.sh: Import EC Root CA for Dave --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/dave -i ../CA/TestCA-ec.ca.cert
cert.sh: #4137: Import EC Root CA for Dave - PASSED
cert.sh: Generate Cert Request for Dave --------------------------
certutil -s "CN=Dave, E=Dave@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/dave -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4138: Generate Cert Request for Dave - PASSED
cert.sh: Sign Dave's Request --------------------------
certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o Dave.cert -f ../tests.pw 
cert.sh: #4139: Sign Dave's Request - PASSED
cert.sh: Import Dave's Cert --------------------------
certutil -A -n Dave -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/dave -f ../tests.pw -i Dave.cert
cert.sh: #4140: Import Dave's Cert - PASSED
cert.sh SUCCESS: Dave's Cert Created
cert.sh: Generate EC Cert Request for Dave --------------------------
certutil -s "CN=Dave, E=Dave-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/dave -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4141: Generate EC Cert Request for Dave - PASSED
cert.sh: Sign Dave's EC Request --------------------------
certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o Dave-ec.cert -f ../tests.pw 
cert.sh: #4142: Sign Dave's EC Request - PASSED
cert.sh: Import Dave's EC Cert --------------------------
certutil -A -n Dave-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/dave -f ../tests.pw -i Dave-ec.cert
cert.sh: #4143: Import Dave's EC Cert - PASSED
cert.sh SUCCESS: Dave's EC Cert Created
cert.sh: Generate mixed EC Cert Request for Dave --------------------------
certutil -s "CN=Dave, E=Dave-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/dave -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4144: Generate mixed EC Cert Request for Dave - PASSED
cert.sh: Sign Dave's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o Dave-ecmixed.cert -f ../tests.pw 
cert.sh: #4145: Sign Dave's EC Request with RSA - PASSED
cert.sh: Import Dave's mixed EC Cert --------------------------
certutil -A -n Dave-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/dave -f ../tests.pw -i Dave-ecmixed.cert
cert.sh: #4146: Import Dave's mixed EC Cert - PASSED
cert.sh SUCCESS: Dave's mixed EC Cert Created
cert.sh: Creating multiEmail's Certificate --------------------
cert.sh: Initializing Eve's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eve -f ../tests.pw
cert.sh: #4147: Initializing Eve's Cert DB - PASSED
cert.sh: Loading root cert module to Eve's Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eve

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #4148: Loading root cert module to Eve's Cert DB - PASSED
cert.sh: Import Root CA for Eve --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eve -i ../CA/TestCA.ca.cert
cert.sh: #4149: Import Root CA for Eve - PASSED
cert.sh: Import EC Root CA for Eve --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eve -i ../CA/TestCA-ec.ca.cert
cert.sh: #4150: Import EC Root CA for Eve - PASSED
cert.sh: Generate Cert Request for Eve --------------------------
certutil -s "CN=Eve, E=Eve@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eve -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4151: Generate Cert Request for Eve - PASSED
cert.sh: Sign Eve's Request --------------------------
certutil -C -c TestCA -m 60 -v 60 -d ../CA -i req -o Eve.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com
cert.sh: #4152: Sign Eve's Request - PASSED
cert.sh: Import Eve's Cert --------------------------
certutil -A -n Eve -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eve -f ../tests.pw -i Eve.cert
cert.sh: #4153: Import Eve's Cert - PASSED
cert.sh SUCCESS: Eve's Cert Created
cert.sh: Generate EC Cert Request for Eve --------------------------
certutil -s "CN=Eve, E=Eve-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eve -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4154: Generate EC Cert Request for Eve - PASSED
cert.sh: Sign Eve's EC Request --------------------------
certutil -C -c TestCA-ec -m 60 -v 60 -d ../CA -i req -o Eve-ec.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com
cert.sh: #4155: Sign Eve's EC Request - PASSED
cert.sh: Import Eve's EC Cert --------------------------
certutil -A -n Eve-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eve -f ../tests.pw -i Eve-ec.cert
cert.sh: #4156: Import Eve's EC Cert - PASSED
cert.sh SUCCESS: Eve's EC Cert Created
cert.sh: Generate mixed EC Cert Request for Eve --------------------------
certutil -s "CN=Eve, E=Eve-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eve -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4157: Generate mixed EC Cert Request for Eve - PASSED
cert.sh: Sign Eve's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10060 -v 60 -d ../CA -i req -o Eve-ecmixed.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com
cert.sh: #4158: Sign Eve's EC Request with RSA - PASSED
cert.sh: Import Eve's mixed EC Cert --------------------------
certutil -A -n Eve-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eve -f ../tests.pw -i Eve-ecmixed.cert
cert.sh: #4159: Import Eve's mixed EC Cert - PASSED
cert.sh SUCCESS: Eve's mixed EC Cert Created
cert.sh: Importing Certificates ==============================
cert.sh: Import Bob's cert into Alice's db --------------------------
certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob.cert
cert.sh: #4160: Import Bob's cert into Alice's db - PASSED
cert.sh: Import Dave's cert into Alice's DB --------------------------
certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave.cert
cert.sh: #4161: Import Dave's cert into Alice's DB - PASSED
cert.sh: Import Dave's cert into Bob's DB --------------------------
certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave.cert
cert.sh: #4162: Import Dave's cert into Bob's DB - PASSED
cert.sh: Import Eve's cert into Alice's DB --------------------------
certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../eve/Eve.cert
cert.sh: #4163: Import Eve's cert into Alice's DB - PASSED
cert.sh: Import Eve's cert into Bob's DB --------------------------
certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../eve/Eve.cert
cert.sh: #4164: Import Eve's cert into Bob's DB - PASSED
cert.sh: Importing EC Certificates ==============================
cert.sh: Import Bob's EC cert into Alice's db --------------------------
certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob-ec.cert
cert.sh: #4165: Import Bob's EC cert into Alice's db - PASSED
cert.sh: Import Dave's EC cert into Alice's DB --------------------------
certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave-ec.cert
cert.sh: #4166: Import Dave's EC cert into Alice's DB - PASSED
cert.sh: Import Dave's EC cert into Bob's DB --------------------------
certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave-ec.cert
cert.sh: #4167: Import Dave's EC cert into Bob's DB - PASSED
cert.sh SUCCESS: SMIME passed
cert.sh: Creating FIPS 140 DSA Certificates ==============
cert.sh: Initializing FIPS PUB 140 Test Certificate's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/fips -f ../tests.fipspw
cert.sh: #4168: Initializing FIPS PUB 140 Test Certificate's Cert DB - PASSED
cert.sh: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/fips

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #4169: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) - PASSED
cert.sh: Enable FIPS mode on database -----------------------
modutil -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/fips -fips true 

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
FIPS mode enabled.
cert.sh: #4170: Enable FIPS mode on database for FIPS PUB 140 Test Certificate - PASSED
cert.sh: Generate Certificate for FIPS PUB 140 Test Certificate --------------------------
certutil -s "CN=FIPS PUB 140 Test Certificate, E=fips@bogus.com, O=BOGUS NSS, OU=FIPS PUB 140, L=Mountain View, ST=California, C=US" -S -n FIPS_PUB_140_Test_Certificate -x -t Cu,Cu,Cu -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/fips -f ../tests.fipspw -k dsa -v 600 -m 500 -z ../tests_noise


Generating key.  This may take a few moments...

cert.sh: #4171: Generate Certificate for FIPS PUB 140 Test Certificate - PASSED
cert.sh SUCCESS: FIPS passed
cert.sh: Creating Server CA Issued Certificate for 
             EC Curves Test Certificates ------------------------------------
cert.sh: Initializing EC Curve's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw
cert.sh: #4172: Initializing EC Curve's Cert DB - PASSED
cert.sh: Loading root cert module to EC Curve's Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #4173: Loading root cert module to EC Curve's Cert DB - PASSED
cert.sh: Import EC Root CA for EC Curves Test Certificates --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -i ../CA/TestCA-ec.ca.cert
cert.sh: #4174: Import EC Root CA for EC Curves Test Certificates - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb163v1 --------------------------
certutil -s "CN=Curve-c2pnb163v1, E=Curve-c2pnb163v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb163v1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4175: Generate EC Cert Request for Curve-c2pnb163v1 - PASSED
cert.sh: Sign Curve-c2pnb163v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2001 -v 60 -d ../CA -i req -o Curve-c2pnb163v1-ec.cert -f ../tests.pw 
cert.sh: #4176: Sign Curve-c2pnb163v1's EC Request - PASSED
cert.sh: Import Curve-c2pnb163v1's EC Cert --------------------------
certutil -A -n Curve-c2pnb163v1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-c2pnb163v1-ec.cert
cert.sh: #4177: Import Curve-c2pnb163v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb163v2 --------------------------
certutil -s "CN=Curve-c2pnb163v2, E=Curve-c2pnb163v2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb163v2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4178: Generate EC Cert Request for Curve-c2pnb163v2 - PASSED
cert.sh: Sign Curve-c2pnb163v2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2002 -v 60 -d ../CA -i req -o Curve-c2pnb163v2-ec.cert -f ../tests.pw 
cert.sh: #4179: Sign Curve-c2pnb163v2's EC Request - PASSED
cert.sh: Import Curve-c2pnb163v2's EC Cert --------------------------
certutil -A -n Curve-c2pnb163v2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-c2pnb163v2-ec.cert
cert.sh: #4180: Import Curve-c2pnb163v2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb163v3 --------------------------
certutil -s "CN=Curve-c2pnb163v3, E=Curve-c2pnb163v3-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb163v3 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4181: Generate EC Cert Request for Curve-c2pnb163v3 - PASSED
cert.sh: Sign Curve-c2pnb163v3's EC Request --------------------------
certutil -C -c TestCA-ec -m 2003 -v 60 -d ../CA -i req -o Curve-c2pnb163v3-ec.cert -f ../tests.pw 
cert.sh: #4182: Sign Curve-c2pnb163v3's EC Request - PASSED
cert.sh: Import Curve-c2pnb163v3's EC Cert --------------------------
certutil -A -n Curve-c2pnb163v3-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-c2pnb163v3-ec.cert
cert.sh: #4183: Import Curve-c2pnb163v3's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb176v1 --------------------------
certutil -s "CN=Curve-c2pnb176v1, E=Curve-c2pnb176v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb176v1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4184: Generate EC Cert Request for Curve-c2pnb176v1 - PASSED
cert.sh: Sign Curve-c2pnb176v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2004 -v 60 -d ../CA -i req -o Curve-c2pnb176v1-ec.cert -f ../tests.pw 
cert.sh: #4185: Sign Curve-c2pnb176v1's EC Request - PASSED
cert.sh: Import Curve-c2pnb176v1's EC Cert --------------------------
certutil -A -n Curve-c2pnb176v1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-c2pnb176v1-ec.cert
cert.sh: #4186: Import Curve-c2pnb176v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb208w1 --------------------------
certutil -s "CN=Curve-c2pnb208w1, E=Curve-c2pnb208w1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb208w1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4187: Generate EC Cert Request for Curve-c2pnb208w1 - PASSED
cert.sh: Sign Curve-c2pnb208w1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2005 -v 60 -d ../CA -i req -o Curve-c2pnb208w1-ec.cert -f ../tests.pw 
cert.sh: #4188: Sign Curve-c2pnb208w1's EC Request - PASSED
cert.sh: Import Curve-c2pnb208w1's EC Cert --------------------------
certutil -A -n Curve-c2pnb208w1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-c2pnb208w1-ec.cert
cert.sh: #4189: Import Curve-c2pnb208w1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb272w1 --------------------------
certutil -s "CN=Curve-c2pnb272w1, E=Curve-c2pnb272w1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb272w1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4190: Generate EC Cert Request for Curve-c2pnb272w1 - PASSED
cert.sh: Sign Curve-c2pnb272w1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2006 -v 60 -d ../CA -i req -o Curve-c2pnb272w1-ec.cert -f ../tests.pw 
cert.sh: #4191: Sign Curve-c2pnb272w1's EC Request - PASSED
cert.sh: Import Curve-c2pnb272w1's EC Cert --------------------------
certutil -A -n Curve-c2pnb272w1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-c2pnb272w1-ec.cert
cert.sh: #4192: Import Curve-c2pnb272w1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb304w1 --------------------------
certutil -s "CN=Curve-c2pnb304w1, E=Curve-c2pnb304w1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb304w1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4193: Generate EC Cert Request for Curve-c2pnb304w1 - PASSED
cert.sh: Sign Curve-c2pnb304w1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2007 -v 60 -d ../CA -i req -o Curve-c2pnb304w1-ec.cert -f ../tests.pw 
cert.sh: #4194: Sign Curve-c2pnb304w1's EC Request - PASSED
cert.sh: Import Curve-c2pnb304w1's EC Cert --------------------------
certutil -A -n Curve-c2pnb304w1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-c2pnb304w1-ec.cert
cert.sh: #4195: Import Curve-c2pnb304w1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb368w1 --------------------------
certutil -s "CN=Curve-c2pnb368w1, E=Curve-c2pnb368w1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb368w1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4196: Generate EC Cert Request for Curve-c2pnb368w1 - PASSED
cert.sh: Sign Curve-c2pnb368w1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2008 -v 60 -d ../CA -i req -o Curve-c2pnb368w1-ec.cert -f ../tests.pw 
cert.sh: #4197: Sign Curve-c2pnb368w1's EC Request - PASSED
cert.sh: Import Curve-c2pnb368w1's EC Cert --------------------------
certutil -A -n Curve-c2pnb368w1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-c2pnb368w1-ec.cert
cert.sh: #4198: Import Curve-c2pnb368w1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb191v1 --------------------------
certutil -s "CN=Curve-c2tnb191v1, E=Curve-c2tnb191v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb191v1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4199: Generate EC Cert Request for Curve-c2tnb191v1 - PASSED
cert.sh: Sign Curve-c2tnb191v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2009 -v 60 -d ../CA -i req -o Curve-c2tnb191v1-ec.cert -f ../tests.pw 
cert.sh: #4200: Sign Curve-c2tnb191v1's EC Request - PASSED
cert.sh: Import Curve-c2tnb191v1's EC Cert --------------------------
certutil -A -n Curve-c2tnb191v1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-c2tnb191v1-ec.cert
cert.sh: #4201: Import Curve-c2tnb191v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb191v2 --------------------------
certutil -s "CN=Curve-c2tnb191v2, E=Curve-c2tnb191v2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb191v2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4202: Generate EC Cert Request for Curve-c2tnb191v2 - PASSED
cert.sh: Sign Curve-c2tnb191v2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2010 -v 60 -d ../CA -i req -o Curve-c2tnb191v2-ec.cert -f ../tests.pw 
cert.sh: #4203: Sign Curve-c2tnb191v2's EC Request - PASSED
cert.sh: Import Curve-c2tnb191v2's EC Cert --------------------------
certutil -A -n Curve-c2tnb191v2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-c2tnb191v2-ec.cert
cert.sh: #4204: Import Curve-c2tnb191v2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb191v3 --------------------------
certutil -s "CN=Curve-c2tnb191v3, E=Curve-c2tnb191v3-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb191v3 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4205: Generate EC Cert Request for Curve-c2tnb191v3 - PASSED
cert.sh: Sign Curve-c2tnb191v3's EC Request --------------------------
certutil -C -c TestCA-ec -m 2011 -v 60 -d ../CA -i req -o Curve-c2tnb191v3-ec.cert -f ../tests.pw 
cert.sh: #4206: Sign Curve-c2tnb191v3's EC Request - PASSED
cert.sh: Import Curve-c2tnb191v3's EC Cert --------------------------
certutil -A -n Curve-c2tnb191v3-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-c2tnb191v3-ec.cert
cert.sh: #4207: Import Curve-c2tnb191v3's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb239v1 --------------------------
certutil -s "CN=Curve-c2tnb239v1, E=Curve-c2tnb239v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb239v1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4208: Generate EC Cert Request for Curve-c2tnb239v1 - PASSED
cert.sh: Sign Curve-c2tnb239v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2012 -v 60 -d ../CA -i req -o Curve-c2tnb239v1-ec.cert -f ../tests.pw 
cert.sh: #4209: Sign Curve-c2tnb239v1's EC Request - PASSED
cert.sh: Import Curve-c2tnb239v1's EC Cert --------------------------
certutil -A -n Curve-c2tnb239v1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-c2tnb239v1-ec.cert
cert.sh: #4210: Import Curve-c2tnb239v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb239v2 --------------------------
certutil -s "CN=Curve-c2tnb239v2, E=Curve-c2tnb239v2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb239v2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4211: Generate EC Cert Request for Curve-c2tnb239v2 - PASSED
cert.sh: Sign Curve-c2tnb239v2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2013 -v 60 -d ../CA -i req -o Curve-c2tnb239v2-ec.cert -f ../tests.pw 
cert.sh: #4212: Sign Curve-c2tnb239v2's EC Request - PASSED
cert.sh: Import Curve-c2tnb239v2's EC Cert --------------------------
certutil -A -n Curve-c2tnb239v2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-c2tnb239v2-ec.cert
cert.sh: #4213: Import Curve-c2tnb239v2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb239v3 --------------------------
certutil -s "CN=Curve-c2tnb239v3, E=Curve-c2tnb239v3-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb239v3 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4214: Generate EC Cert Request for Curve-c2tnb239v3 - PASSED
cert.sh: Sign Curve-c2tnb239v3's EC Request --------------------------
certutil -C -c TestCA-ec -m 2014 -v 60 -d ../CA -i req -o Curve-c2tnb239v3-ec.cert -f ../tests.pw 
cert.sh: #4215: Sign Curve-c2tnb239v3's EC Request - PASSED
cert.sh: Import Curve-c2tnb239v3's EC Cert --------------------------
certutil -A -n Curve-c2tnb239v3-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-c2tnb239v3-ec.cert
cert.sh: #4216: Import Curve-c2tnb239v3's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb359v1 --------------------------
certutil -s "CN=Curve-c2tnb359v1, E=Curve-c2tnb359v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb359v1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4217: Generate EC Cert Request for Curve-c2tnb359v1 - PASSED
cert.sh: Sign Curve-c2tnb359v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2015 -v 60 -d ../CA -i req -o Curve-c2tnb359v1-ec.cert -f ../tests.pw 
cert.sh: #4218: Sign Curve-c2tnb359v1's EC Request - PASSED
cert.sh: Import Curve-c2tnb359v1's EC Cert --------------------------
certutil -A -n Curve-c2tnb359v1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-c2tnb359v1-ec.cert
cert.sh: #4219: Import Curve-c2tnb359v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb431r1 --------------------------
certutil -s "CN=Curve-c2tnb431r1, E=Curve-c2tnb431r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb431r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4220: Generate EC Cert Request for Curve-c2tnb431r1 - PASSED
cert.sh: Sign Curve-c2tnb431r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2016 -v 60 -d ../CA -i req -o Curve-c2tnb431r1-ec.cert -f ../tests.pw 
cert.sh: #4221: Sign Curve-c2tnb431r1's EC Request - PASSED
cert.sh: Import Curve-c2tnb431r1's EC Cert --------------------------
certutil -A -n Curve-c2tnb431r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-c2tnb431r1-ec.cert
cert.sh: #4222: Import Curve-c2tnb431r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistb163 --------------------------
certutil -s "CN=Curve-nistb163, E=Curve-nistb163-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistb163 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4223: Generate EC Cert Request for Curve-nistb163 - PASSED
cert.sh: Sign Curve-nistb163's EC Request --------------------------
certutil -C -c TestCA-ec -m 2017 -v 60 -d ../CA -i req -o Curve-nistb163-ec.cert -f ../tests.pw 
cert.sh: #4224: Sign Curve-nistb163's EC Request - PASSED
cert.sh: Import Curve-nistb163's EC Cert --------------------------
certutil -A -n Curve-nistb163-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-nistb163-ec.cert
cert.sh: #4225: Import Curve-nistb163's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistb233 --------------------------
certutil -s "CN=Curve-nistb233, E=Curve-nistb233-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistb233 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4226: Generate EC Cert Request for Curve-nistb233 - PASSED
cert.sh: Sign Curve-nistb233's EC Request --------------------------
certutil -C -c TestCA-ec -m 2018 -v 60 -d ../CA -i req -o Curve-nistb233-ec.cert -f ../tests.pw 
cert.sh: #4227: Sign Curve-nistb233's EC Request - PASSED
cert.sh: Import Curve-nistb233's EC Cert --------------------------
certutil -A -n Curve-nistb233-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-nistb233-ec.cert
cert.sh: #4228: Import Curve-nistb233's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistb283 --------------------------
certutil -s "CN=Curve-nistb283, E=Curve-nistb283-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistb283 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4229: Generate EC Cert Request for Curve-nistb283 - PASSED
cert.sh: Sign Curve-nistb283's EC Request --------------------------
certutil -C -c TestCA-ec -m 2019 -v 60 -d ../CA -i req -o Curve-nistb283-ec.cert -f ../tests.pw 
cert.sh: #4230: Sign Curve-nistb283's EC Request - PASSED
cert.sh: Import Curve-nistb283's EC Cert --------------------------
certutil -A -n Curve-nistb283-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-nistb283-ec.cert
cert.sh: #4231: Import Curve-nistb283's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistb409 --------------------------
certutil -s "CN=Curve-nistb409, E=Curve-nistb409-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistb409 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4232: Generate EC Cert Request for Curve-nistb409 - PASSED
cert.sh: Sign Curve-nistb409's EC Request --------------------------
certutil -C -c TestCA-ec -m 2020 -v 60 -d ../CA -i req -o Curve-nistb409-ec.cert -f ../tests.pw 
cert.sh: #4233: Sign Curve-nistb409's EC Request - PASSED
cert.sh: Import Curve-nistb409's EC Cert --------------------------
certutil -A -n Curve-nistb409-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-nistb409-ec.cert
cert.sh: #4234: Import Curve-nistb409's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistb571 --------------------------
certutil -s "CN=Curve-nistb571, E=Curve-nistb571-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistb571 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4235: Generate EC Cert Request for Curve-nistb571 - PASSED
cert.sh: Sign Curve-nistb571's EC Request --------------------------
certutil -C -c TestCA-ec -m 2021 -v 60 -d ../CA -i req -o Curve-nistb571-ec.cert -f ../tests.pw 
cert.sh: #4236: Sign Curve-nistb571's EC Request - PASSED
cert.sh: Import Curve-nistb571's EC Cert --------------------------
certutil -A -n Curve-nistb571-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-nistb571-ec.cert
cert.sh: #4237: Import Curve-nistb571's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistk163 --------------------------
certutil -s "CN=Curve-nistk163, E=Curve-nistk163-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistk163 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4238: Generate EC Cert Request for Curve-nistk163 - PASSED
cert.sh: Sign Curve-nistk163's EC Request --------------------------
certutil -C -c TestCA-ec -m 2022 -v 60 -d ../CA -i req -o Curve-nistk163-ec.cert -f ../tests.pw 
cert.sh: #4239: Sign Curve-nistk163's EC Request - PASSED
cert.sh: Import Curve-nistk163's EC Cert --------------------------
certutil -A -n Curve-nistk163-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-nistk163-ec.cert
cert.sh: #4240: Import Curve-nistk163's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistk233 --------------------------
certutil -s "CN=Curve-nistk233, E=Curve-nistk233-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistk233 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4241: Generate EC Cert Request for Curve-nistk233 - PASSED
cert.sh: Sign Curve-nistk233's EC Request --------------------------
certutil -C -c TestCA-ec -m 2023 -v 60 -d ../CA -i req -o Curve-nistk233-ec.cert -f ../tests.pw 
cert.sh: #4242: Sign Curve-nistk233's EC Request - PASSED
cert.sh: Import Curve-nistk233's EC Cert --------------------------
certutil -A -n Curve-nistk233-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-nistk233-ec.cert
cert.sh: #4243: Import Curve-nistk233's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistk283 --------------------------
certutil -s "CN=Curve-nistk283, E=Curve-nistk283-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistk283 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4244: Generate EC Cert Request for Curve-nistk283 - PASSED
cert.sh: Sign Curve-nistk283's EC Request --------------------------
certutil -C -c TestCA-ec -m 2024 -v 60 -d ../CA -i req -o Curve-nistk283-ec.cert -f ../tests.pw 
cert.sh: #4245: Sign Curve-nistk283's EC Request - PASSED
cert.sh: Import Curve-nistk283's EC Cert --------------------------
certutil -A -n Curve-nistk283-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-nistk283-ec.cert
cert.sh: #4246: Import Curve-nistk283's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistk409 --------------------------
certutil -s "CN=Curve-nistk409, E=Curve-nistk409-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistk409 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4247: Generate EC Cert Request for Curve-nistk409 - PASSED
cert.sh: Sign Curve-nistk409's EC Request --------------------------
certutil -C -c TestCA-ec -m 2025 -v 60 -d ../CA -i req -o Curve-nistk409-ec.cert -f ../tests.pw 
cert.sh: #4248: Sign Curve-nistk409's EC Request - PASSED
cert.sh: Import Curve-nistk409's EC Cert --------------------------
certutil -A -n Curve-nistk409-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-nistk409-ec.cert
cert.sh: #4249: Import Curve-nistk409's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistk571 --------------------------
certutil -s "CN=Curve-nistk571, E=Curve-nistk571-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistk571 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4250: Generate EC Cert Request for Curve-nistk571 - PASSED
cert.sh: Sign Curve-nistk571's EC Request --------------------------
certutil -C -c TestCA-ec -m 2026 -v 60 -d ../CA -i req -o Curve-nistk571-ec.cert -f ../tests.pw 
cert.sh: #4251: Sign Curve-nistk571's EC Request - PASSED
cert.sh: Import Curve-nistk571's EC Cert --------------------------
certutil -A -n Curve-nistk571-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-nistk571-ec.cert
cert.sh: #4252: Import Curve-nistk571's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistp192 --------------------------
certutil -s "CN=Curve-nistp192, E=Curve-nistp192-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp192 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4253: Generate EC Cert Request for Curve-nistp192 - PASSED
cert.sh: Sign Curve-nistp192's EC Request --------------------------
certutil -C -c TestCA-ec -m 2027 -v 60 -d ../CA -i req -o Curve-nistp192-ec.cert -f ../tests.pw 
cert.sh: #4254: Sign Curve-nistp192's EC Request - PASSED
cert.sh: Import Curve-nistp192's EC Cert --------------------------
certutil -A -n Curve-nistp192-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-nistp192-ec.cert
cert.sh: #4255: Import Curve-nistp192's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistp224 --------------------------
certutil -s "CN=Curve-nistp224, E=Curve-nistp224-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp224 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4256: Generate EC Cert Request for Curve-nistp224 - PASSED
cert.sh: Sign Curve-nistp224's EC Request --------------------------
certutil -C -c TestCA-ec -m 2028 -v 60 -d ../CA -i req -o Curve-nistp224-ec.cert -f ../tests.pw 
cert.sh: #4257: Sign Curve-nistp224's EC Request - PASSED
cert.sh: Import Curve-nistp224's EC Cert --------------------------
certutil -A -n Curve-nistp224-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-nistp224-ec.cert
cert.sh: #4258: Import Curve-nistp224's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistp256 --------------------------
certutil -s "CN=Curve-nistp256, E=Curve-nistp256-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp256 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4259: Generate EC Cert Request for Curve-nistp256 - PASSED
cert.sh: Sign Curve-nistp256's EC Request --------------------------
certutil -C -c TestCA-ec -m 2029 -v 60 -d ../CA -i req -o Curve-nistp256-ec.cert -f ../tests.pw 
cert.sh: #4260: Sign Curve-nistp256's EC Request - PASSED
cert.sh: Import Curve-nistp256's EC Cert --------------------------
certutil -A -n Curve-nistp256-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-nistp256-ec.cert
cert.sh: #4261: Import Curve-nistp256's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistp384 --------------------------
certutil -s "CN=Curve-nistp384, E=Curve-nistp384-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp384 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4262: Generate EC Cert Request for Curve-nistp384 - PASSED
cert.sh: Sign Curve-nistp384's EC Request --------------------------
certutil -C -c TestCA-ec -m 2030 -v 60 -d ../CA -i req -o Curve-nistp384-ec.cert -f ../tests.pw 
cert.sh: #4263: Sign Curve-nistp384's EC Request - PASSED
cert.sh: Import Curve-nistp384's EC Cert --------------------------
certutil -A -n Curve-nistp384-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-nistp384-ec.cert
cert.sh: #4264: Import Curve-nistp384's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistp521 --------------------------
certutil -s "CN=Curve-nistp521, E=Curve-nistp521-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp521 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4265: Generate EC Cert Request for Curve-nistp521 - PASSED
cert.sh: Sign Curve-nistp521's EC Request --------------------------
certutil -C -c TestCA-ec -m 2031 -v 60 -d ../CA -i req -o Curve-nistp521-ec.cert -f ../tests.pw 
cert.sh: #4266: Sign Curve-nistp521's EC Request - PASSED
cert.sh: Import Curve-nistp521's EC Cert --------------------------
certutil -A -n Curve-nistp521-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-nistp521-ec.cert
cert.sh: #4267: Import Curve-nistp521's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-prime192v1 --------------------------
certutil -s "CN=Curve-prime192v1, E=Curve-prime192v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime192v1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4268: Generate EC Cert Request for Curve-prime192v1 - PASSED
cert.sh: Sign Curve-prime192v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2032 -v 60 -d ../CA -i req -o Curve-prime192v1-ec.cert -f ../tests.pw 
cert.sh: #4269: Sign Curve-prime192v1's EC Request - PASSED
cert.sh: Import Curve-prime192v1's EC Cert --------------------------
certutil -A -n Curve-prime192v1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-prime192v1-ec.cert
cert.sh: #4270: Import Curve-prime192v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-prime192v2 --------------------------
certutil -s "CN=Curve-prime192v2, E=Curve-prime192v2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime192v2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4271: Generate EC Cert Request for Curve-prime192v2 - PASSED
cert.sh: Sign Curve-prime192v2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2033 -v 60 -d ../CA -i req -o Curve-prime192v2-ec.cert -f ../tests.pw 
cert.sh: #4272: Sign Curve-prime192v2's EC Request - PASSED
cert.sh: Import Curve-prime192v2's EC Cert --------------------------
certutil -A -n Curve-prime192v2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-prime192v2-ec.cert
cert.sh: #4273: Import Curve-prime192v2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-prime192v3 --------------------------
certutil -s "CN=Curve-prime192v3, E=Curve-prime192v3-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime192v3 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4274: Generate EC Cert Request for Curve-prime192v3 - PASSED
cert.sh: Sign Curve-prime192v3's EC Request --------------------------
certutil -C -c TestCA-ec -m 2034 -v 60 -d ../CA -i req -o Curve-prime192v3-ec.cert -f ../tests.pw 
cert.sh: #4275: Sign Curve-prime192v3's EC Request - PASSED
cert.sh: Import Curve-prime192v3's EC Cert --------------------------
certutil -A -n Curve-prime192v3-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-prime192v3-ec.cert
cert.sh: #4276: Import Curve-prime192v3's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-prime239v1 --------------------------
certutil -s "CN=Curve-prime239v1, E=Curve-prime239v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime239v1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4277: Generate EC Cert Request for Curve-prime239v1 - PASSED
cert.sh: Sign Curve-prime239v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2035 -v 60 -d ../CA -i req -o Curve-prime239v1-ec.cert -f ../tests.pw 
cert.sh: #4278: Sign Curve-prime239v1's EC Request - PASSED
cert.sh: Import Curve-prime239v1's EC Cert --------------------------
certutil -A -n Curve-prime239v1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-prime239v1-ec.cert
cert.sh: #4279: Import Curve-prime239v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-prime239v2 --------------------------
certutil -s "CN=Curve-prime239v2, E=Curve-prime239v2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime239v2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4280: Generate EC Cert Request for Curve-prime239v2 - PASSED
cert.sh: Sign Curve-prime239v2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2036 -v 60 -d ../CA -i req -o Curve-prime239v2-ec.cert -f ../tests.pw 
cert.sh: #4281: Sign Curve-prime239v2's EC Request - PASSED
cert.sh: Import Curve-prime239v2's EC Cert --------------------------
certutil -A -n Curve-prime239v2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-prime239v2-ec.cert
cert.sh: #4282: Import Curve-prime239v2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-prime239v3 --------------------------
certutil -s "CN=Curve-prime239v3, E=Curve-prime239v3-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime239v3 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4283: Generate EC Cert Request for Curve-prime239v3 - PASSED
cert.sh: Sign Curve-prime239v3's EC Request --------------------------
certutil -C -c TestCA-ec -m 2037 -v 60 -d ../CA -i req -o Curve-prime239v3-ec.cert -f ../tests.pw 
cert.sh: #4284: Sign Curve-prime239v3's EC Request - PASSED
cert.sh: Import Curve-prime239v3's EC Cert --------------------------
certutil -A -n Curve-prime239v3-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-prime239v3-ec.cert
cert.sh: #4285: Import Curve-prime239v3's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp112r1 --------------------------
certutil -s "CN=Curve-secp112r1, E=Curve-secp112r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp112r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4286: Generate EC Cert Request for Curve-secp112r1 - PASSED
cert.sh: Sign Curve-secp112r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2038 -v 60 -d ../CA -i req -o Curve-secp112r1-ec.cert -f ../tests.pw 
cert.sh: #4287: Sign Curve-secp112r1's EC Request - PASSED
cert.sh: Import Curve-secp112r1's EC Cert --------------------------
certutil -A -n Curve-secp112r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-secp112r1-ec.cert
cert.sh: #4288: Import Curve-secp112r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp112r2 --------------------------
certutil -s "CN=Curve-secp112r2, E=Curve-secp112r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp112r2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4289: Generate EC Cert Request for Curve-secp112r2 - PASSED
cert.sh: Sign Curve-secp112r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2039 -v 60 -d ../CA -i req -o Curve-secp112r2-ec.cert -f ../tests.pw 
cert.sh: #4290: Sign Curve-secp112r2's EC Request - PASSED
cert.sh: Import Curve-secp112r2's EC Cert --------------------------
certutil -A -n Curve-secp112r2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-secp112r2-ec.cert
cert.sh: #4291: Import Curve-secp112r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp128r1 --------------------------
certutil -s "CN=Curve-secp128r1, E=Curve-secp128r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp128r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4292: Generate EC Cert Request for Curve-secp128r1 - PASSED
cert.sh: Sign Curve-secp128r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2040 -v 60 -d ../CA -i req -o Curve-secp128r1-ec.cert -f ../tests.pw 
cert.sh: #4293: Sign Curve-secp128r1's EC Request - PASSED
cert.sh: Import Curve-secp128r1's EC Cert --------------------------
certutil -A -n Curve-secp128r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-secp128r1-ec.cert
cert.sh: #4294: Import Curve-secp128r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp128r2 --------------------------
certutil -s "CN=Curve-secp128r2, E=Curve-secp128r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp128r2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4295: Generate EC Cert Request for Curve-secp128r2 - PASSED
cert.sh: Sign Curve-secp128r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2041 -v 60 -d ../CA -i req -o Curve-secp128r2-ec.cert -f ../tests.pw 
cert.sh: #4296: Sign Curve-secp128r2's EC Request - PASSED
cert.sh: Import Curve-secp128r2's EC Cert --------------------------
certutil -A -n Curve-secp128r2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-secp128r2-ec.cert
cert.sh: #4297: Import Curve-secp128r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp160k1 --------------------------
certutil -s "CN=Curve-secp160k1, E=Curve-secp160k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp160k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4298: Generate EC Cert Request for Curve-secp160k1 - PASSED
cert.sh: Sign Curve-secp160k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2042 -v 60 -d ../CA -i req -o Curve-secp160k1-ec.cert -f ../tests.pw 
cert.sh: #4299: Sign Curve-secp160k1's EC Request - PASSED
cert.sh: Import Curve-secp160k1's EC Cert --------------------------
certutil -A -n Curve-secp160k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-secp160k1-ec.cert
cert.sh: #4300: Import Curve-secp160k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp160r1 --------------------------
certutil -s "CN=Curve-secp160r1, E=Curve-secp160r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp160r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4301: Generate EC Cert Request for Curve-secp160r1 - PASSED
cert.sh: Sign Curve-secp160r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2043 -v 60 -d ../CA -i req -o Curve-secp160r1-ec.cert -f ../tests.pw 
cert.sh: #4302: Sign Curve-secp160r1's EC Request - PASSED
cert.sh: Import Curve-secp160r1's EC Cert --------------------------
certutil -A -n Curve-secp160r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-secp160r1-ec.cert
cert.sh: #4303: Import Curve-secp160r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp160r2 --------------------------
certutil -s "CN=Curve-secp160r2, E=Curve-secp160r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp160r2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4304: Generate EC Cert Request for Curve-secp160r2 - PASSED
cert.sh: Sign Curve-secp160r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2044 -v 60 -d ../CA -i req -o Curve-secp160r2-ec.cert -f ../tests.pw 
cert.sh: #4305: Sign Curve-secp160r2's EC Request - PASSED
cert.sh: Import Curve-secp160r2's EC Cert --------------------------
certutil -A -n Curve-secp160r2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-secp160r2-ec.cert
cert.sh: #4306: Import Curve-secp160r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp192k1 --------------------------
certutil -s "CN=Curve-secp192k1, E=Curve-secp192k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp192k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4307: Generate EC Cert Request for Curve-secp192k1 - PASSED
cert.sh: Sign Curve-secp192k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2045 -v 60 -d ../CA -i req -o Curve-secp192k1-ec.cert -f ../tests.pw 
cert.sh: #4308: Sign Curve-secp192k1's EC Request - PASSED
cert.sh: Import Curve-secp192k1's EC Cert --------------------------
certutil -A -n Curve-secp192k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-secp192k1-ec.cert
cert.sh: #4309: Import Curve-secp192k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp192r1 --------------------------
certutil -s "CN=Curve-secp192r1, E=Curve-secp192r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp192r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4310: Generate EC Cert Request for Curve-secp192r1 - PASSED
cert.sh: Sign Curve-secp192r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2046 -v 60 -d ../CA -i req -o Curve-secp192r1-ec.cert -f ../tests.pw 
cert.sh: #4311: Sign Curve-secp192r1's EC Request - PASSED
cert.sh: Import Curve-secp192r1's EC Cert --------------------------
certutil -A -n Curve-secp192r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-secp192r1-ec.cert
cert.sh: #4312: Import Curve-secp192r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp224k1 --------------------------
certutil -s "CN=Curve-secp224k1, E=Curve-secp224k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp224k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4313: Generate EC Cert Request for Curve-secp224k1 - PASSED
cert.sh: Sign Curve-secp224k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2047 -v 60 -d ../CA -i req -o Curve-secp224k1-ec.cert -f ../tests.pw 
cert.sh: #4314: Sign Curve-secp224k1's EC Request - PASSED
cert.sh: Import Curve-secp224k1's EC Cert --------------------------
certutil -A -n Curve-secp224k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-secp224k1-ec.cert
cert.sh: #4315: Import Curve-secp224k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp224r1 --------------------------
certutil -s "CN=Curve-secp224r1, E=Curve-secp224r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp224r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4316: Generate EC Cert Request for Curve-secp224r1 - PASSED
cert.sh: Sign Curve-secp224r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2048 -v 60 -d ../CA -i req -o Curve-secp224r1-ec.cert -f ../tests.pw 
cert.sh: #4317: Sign Curve-secp224r1's EC Request - PASSED
cert.sh: Import Curve-secp224r1's EC Cert --------------------------
certutil -A -n Curve-secp224r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-secp224r1-ec.cert
cert.sh: #4318: Import Curve-secp224r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp256k1 --------------------------
certutil -s "CN=Curve-secp256k1, E=Curve-secp256k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp256k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4319: Generate EC Cert Request for Curve-secp256k1 - PASSED
cert.sh: Sign Curve-secp256k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2049 -v 60 -d ../CA -i req -o Curve-secp256k1-ec.cert -f ../tests.pw 
cert.sh: #4320: Sign Curve-secp256k1's EC Request - PASSED
cert.sh: Import Curve-secp256k1's EC Cert --------------------------
certutil -A -n Curve-secp256k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-secp256k1-ec.cert
cert.sh: #4321: Import Curve-secp256k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp256r1 --------------------------
certutil -s "CN=Curve-secp256r1, E=Curve-secp256r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp256r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4322: Generate EC Cert Request for Curve-secp256r1 - PASSED
cert.sh: Sign Curve-secp256r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2050 -v 60 -d ../CA -i req -o Curve-secp256r1-ec.cert -f ../tests.pw 
cert.sh: #4323: Sign Curve-secp256r1's EC Request - PASSED
cert.sh: Import Curve-secp256r1's EC Cert --------------------------
certutil -A -n Curve-secp256r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-secp256r1-ec.cert
cert.sh: #4324: Import Curve-secp256r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp384r1 --------------------------
certutil -s "CN=Curve-secp384r1, E=Curve-secp384r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4325: Generate EC Cert Request for Curve-secp384r1 - PASSED
cert.sh: Sign Curve-secp384r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2051 -v 60 -d ../CA -i req -o Curve-secp384r1-ec.cert -f ../tests.pw 
cert.sh: #4326: Sign Curve-secp384r1's EC Request - PASSED
cert.sh: Import Curve-secp384r1's EC Cert --------------------------
certutil -A -n Curve-secp384r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-secp384r1-ec.cert
cert.sh: #4327: Import Curve-secp384r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp521r1 --------------------------
certutil -s "CN=Curve-secp521r1, E=Curve-secp521r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp521r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4328: Generate EC Cert Request for Curve-secp521r1 - PASSED
cert.sh: Sign Curve-secp521r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2052 -v 60 -d ../CA -i req -o Curve-secp521r1-ec.cert -f ../tests.pw 
cert.sh: #4329: Sign Curve-secp521r1's EC Request - PASSED
cert.sh: Import Curve-secp521r1's EC Cert --------------------------
certutil -A -n Curve-secp521r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-secp521r1-ec.cert
cert.sh: #4330: Import Curve-secp521r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect113r1 --------------------------
certutil -s "CN=Curve-sect113r1, E=Curve-sect113r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect113r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4331: Generate EC Cert Request for Curve-sect113r1 - PASSED
cert.sh: Sign Curve-sect113r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2053 -v 60 -d ../CA -i req -o Curve-sect113r1-ec.cert -f ../tests.pw 
cert.sh: #4332: Sign Curve-sect113r1's EC Request - PASSED
cert.sh: Import Curve-sect113r1's EC Cert --------------------------
certutil -A -n Curve-sect113r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-sect113r1-ec.cert
cert.sh: #4333: Import Curve-sect113r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect113r2 --------------------------
certutil -s "CN=Curve-sect113r2, E=Curve-sect113r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect113r2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4334: Generate EC Cert Request for Curve-sect113r2 - PASSED
cert.sh: Sign Curve-sect113r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2054 -v 60 -d ../CA -i req -o Curve-sect113r2-ec.cert -f ../tests.pw 
cert.sh: #4335: Sign Curve-sect113r2's EC Request - PASSED
cert.sh: Import Curve-sect113r2's EC Cert --------------------------
certutil -A -n Curve-sect113r2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-sect113r2-ec.cert
cert.sh: #4336: Import Curve-sect113r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect131r1 --------------------------
certutil -s "CN=Curve-sect131r1, E=Curve-sect131r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect131r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4337: Generate EC Cert Request for Curve-sect131r1 - PASSED
cert.sh: Sign Curve-sect131r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2055 -v 60 -d ../CA -i req -o Curve-sect131r1-ec.cert -f ../tests.pw 
cert.sh: #4338: Sign Curve-sect131r1's EC Request - PASSED
cert.sh: Import Curve-sect131r1's EC Cert --------------------------
certutil -A -n Curve-sect131r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-sect131r1-ec.cert
cert.sh: #4339: Import Curve-sect131r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect131r2 --------------------------
certutil -s "CN=Curve-sect131r2, E=Curve-sect131r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect131r2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4340: Generate EC Cert Request for Curve-sect131r2 - PASSED
cert.sh: Sign Curve-sect131r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2056 -v 60 -d ../CA -i req -o Curve-sect131r2-ec.cert -f ../tests.pw 
cert.sh: #4341: Sign Curve-sect131r2's EC Request - PASSED
cert.sh: Import Curve-sect131r2's EC Cert --------------------------
certutil -A -n Curve-sect131r2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-sect131r2-ec.cert
cert.sh: #4342: Import Curve-sect131r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect163k1 --------------------------
certutil -s "CN=Curve-sect163k1, E=Curve-sect163k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect163k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4343: Generate EC Cert Request for Curve-sect163k1 - PASSED
cert.sh: Sign Curve-sect163k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2057 -v 60 -d ../CA -i req -o Curve-sect163k1-ec.cert -f ../tests.pw 
cert.sh: #4344: Sign Curve-sect163k1's EC Request - PASSED
cert.sh: Import Curve-sect163k1's EC Cert --------------------------
certutil -A -n Curve-sect163k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-sect163k1-ec.cert
cert.sh: #4345: Import Curve-sect163k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect163r1 --------------------------
certutil -s "CN=Curve-sect163r1, E=Curve-sect163r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect163r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4346: Generate EC Cert Request for Curve-sect163r1 - PASSED
cert.sh: Sign Curve-sect163r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2058 -v 60 -d ../CA -i req -o Curve-sect163r1-ec.cert -f ../tests.pw 
cert.sh: #4347: Sign Curve-sect163r1's EC Request - PASSED
cert.sh: Import Curve-sect163r1's EC Cert --------------------------
certutil -A -n Curve-sect163r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-sect163r1-ec.cert
cert.sh: #4348: Import Curve-sect163r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect163r2 --------------------------
certutil -s "CN=Curve-sect163r2, E=Curve-sect163r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect163r2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4349: Generate EC Cert Request for Curve-sect163r2 - PASSED
cert.sh: Sign Curve-sect163r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2059 -v 60 -d ../CA -i req -o Curve-sect163r2-ec.cert -f ../tests.pw 
cert.sh: #4350: Sign Curve-sect163r2's EC Request - PASSED
cert.sh: Import Curve-sect163r2's EC Cert --------------------------
certutil -A -n Curve-sect163r2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-sect163r2-ec.cert
cert.sh: #4351: Import Curve-sect163r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect193r1 --------------------------
certutil -s "CN=Curve-sect193r1, E=Curve-sect193r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect193r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4352: Generate EC Cert Request for Curve-sect193r1 - PASSED
cert.sh: Sign Curve-sect193r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2060 -v 60 -d ../CA -i req -o Curve-sect193r1-ec.cert -f ../tests.pw 
cert.sh: #4353: Sign Curve-sect193r1's EC Request - PASSED
cert.sh: Import Curve-sect193r1's EC Cert --------------------------
certutil -A -n Curve-sect193r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-sect193r1-ec.cert
cert.sh: #4354: Import Curve-sect193r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect193r2 --------------------------
certutil -s "CN=Curve-sect193r2, E=Curve-sect193r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect193r2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4355: Generate EC Cert Request for Curve-sect193r2 - PASSED
cert.sh: Sign Curve-sect193r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2061 -v 60 -d ../CA -i req -o Curve-sect193r2-ec.cert -f ../tests.pw 
cert.sh: #4356: Sign Curve-sect193r2's EC Request - PASSED
cert.sh: Import Curve-sect193r2's EC Cert --------------------------
certutil -A -n Curve-sect193r2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-sect193r2-ec.cert
cert.sh: #4357: Import Curve-sect193r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect233k1 --------------------------
certutil -s "CN=Curve-sect233k1, E=Curve-sect233k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect233k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4358: Generate EC Cert Request for Curve-sect233k1 - PASSED
cert.sh: Sign Curve-sect233k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2062 -v 60 -d ../CA -i req -o Curve-sect233k1-ec.cert -f ../tests.pw 
cert.sh: #4359: Sign Curve-sect233k1's EC Request - PASSED
cert.sh: Import Curve-sect233k1's EC Cert --------------------------
certutil -A -n Curve-sect233k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-sect233k1-ec.cert
cert.sh: #4360: Import Curve-sect233k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect233r1 --------------------------
certutil -s "CN=Curve-sect233r1, E=Curve-sect233r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect233r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4361: Generate EC Cert Request for Curve-sect233r1 - PASSED
cert.sh: Sign Curve-sect233r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2063 -v 60 -d ../CA -i req -o Curve-sect233r1-ec.cert -f ../tests.pw 
cert.sh: #4362: Sign Curve-sect233r1's EC Request - PASSED
cert.sh: Import Curve-sect233r1's EC Cert --------------------------
certutil -A -n Curve-sect233r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-sect233r1-ec.cert
cert.sh: #4363: Import Curve-sect233r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect239k1 --------------------------
certutil -s "CN=Curve-sect239k1, E=Curve-sect239k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect239k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4364: Generate EC Cert Request for Curve-sect239k1 - PASSED
cert.sh: Sign Curve-sect239k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2064 -v 60 -d ../CA -i req -o Curve-sect239k1-ec.cert -f ../tests.pw 
cert.sh: #4365: Sign Curve-sect239k1's EC Request - PASSED
cert.sh: Import Curve-sect239k1's EC Cert --------------------------
certutil -A -n Curve-sect239k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-sect239k1-ec.cert
cert.sh: #4366: Import Curve-sect239k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect283k1 --------------------------
certutil -s "CN=Curve-sect283k1, E=Curve-sect283k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect283k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4367: Generate EC Cert Request for Curve-sect283k1 - PASSED
cert.sh: Sign Curve-sect283k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2065 -v 60 -d ../CA -i req -o Curve-sect283k1-ec.cert -f ../tests.pw 
cert.sh: #4368: Sign Curve-sect283k1's EC Request - PASSED
cert.sh: Import Curve-sect283k1's EC Cert --------------------------
certutil -A -n Curve-sect283k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-sect283k1-ec.cert
cert.sh: #4369: Import Curve-sect283k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect283r1 --------------------------
certutil -s "CN=Curve-sect283r1, E=Curve-sect283r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect283r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4370: Generate EC Cert Request for Curve-sect283r1 - PASSED
cert.sh: Sign Curve-sect283r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2066 -v 60 -d ../CA -i req -o Curve-sect283r1-ec.cert -f ../tests.pw 
cert.sh: #4371: Sign Curve-sect283r1's EC Request - PASSED
cert.sh: Import Curve-sect283r1's EC Cert --------------------------
certutil -A -n Curve-sect283r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-sect283r1-ec.cert
cert.sh: #4372: Import Curve-sect283r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect409k1 --------------------------
certutil -s "CN=Curve-sect409k1, E=Curve-sect409k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect409k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4373: Generate EC Cert Request for Curve-sect409k1 - PASSED
cert.sh: Sign Curve-sect409k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2067 -v 60 -d ../CA -i req -o Curve-sect409k1-ec.cert -f ../tests.pw 
cert.sh: #4374: Sign Curve-sect409k1's EC Request - PASSED
cert.sh: Import Curve-sect409k1's EC Cert --------------------------
certutil -A -n Curve-sect409k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-sect409k1-ec.cert
cert.sh: #4375: Import Curve-sect409k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect409r1 --------------------------
certutil -s "CN=Curve-sect409r1, E=Curve-sect409r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect409r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4376: Generate EC Cert Request for Curve-sect409r1 - PASSED
cert.sh: Sign Curve-sect409r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2068 -v 60 -d ../CA -i req -o Curve-sect409r1-ec.cert -f ../tests.pw 
cert.sh: #4377: Sign Curve-sect409r1's EC Request - PASSED
cert.sh: Import Curve-sect409r1's EC Cert --------------------------
certutil -A -n Curve-sect409r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-sect409r1-ec.cert
cert.sh: #4378: Import Curve-sect409r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect571k1 --------------------------
certutil -s "CN=Curve-sect571k1, E=Curve-sect571k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect571k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4379: Generate EC Cert Request for Curve-sect571k1 - PASSED
cert.sh: Sign Curve-sect571k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2069 -v 60 -d ../CA -i req -o Curve-sect571k1-ec.cert -f ../tests.pw 
cert.sh: #4380: Sign Curve-sect571k1's EC Request - PASSED
cert.sh: Import Curve-sect571k1's EC Cert --------------------------
certutil -A -n Curve-sect571k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-sect571k1-ec.cert
cert.sh: #4381: Import Curve-sect571k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect571r1 --------------------------
certutil -s "CN=Curve-sect571r1, E=Curve-sect571r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect571r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4382: Generate EC Cert Request for Curve-sect571r1 - PASSED
cert.sh: Sign Curve-sect571r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2070 -v 60 -d ../CA -i req -o Curve-sect571r1-ec.cert -f ../tests.pw 
cert.sh: #4383: Sign Curve-sect571r1's EC Request - PASSED
cert.sh: Import Curve-sect571r1's EC Cert --------------------------
certutil -A -n Curve-sect571r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-sect571r1-ec.cert
cert.sh: #4384: Import Curve-sect571r1's EC Cert - PASSED
cert.sh: Initializing TestExt's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -f ../tests.pw
cert.sh: #4385: Initializing TestExt's Cert DB - PASSED
cert.sh: Loading root cert module to TestExt's Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #4386: Loading root cert module to TestExt's Cert DB - PASSED
cert.sh: Import Root CA for TestExt --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -i ../CA/TestCA.ca.cert
cert.sh: #4387: Import Root CA for TestExt - PASSED
cert.sh: Import EC Root CA for TestExt --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -i ../CA/TestCA-ec.ca.cert
cert.sh: #4388: Import EC Root CA for TestExt - PASSED
cert.sh: Generate Cert Request for TestExt --------------------------
certutil -s "CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4389: Generate Cert Request for TestExt - PASSED
cert.sh: Sign TestExt's Request --------------------------
certutil -C -c TestCA -m 90 -v 60 -d ../CA -i req -o TestExt.cert -f ../tests.pw 
cert.sh: #4390: Sign TestExt's Request - PASSED
cert.sh: Import TestExt's Cert --------------------------
certutil -A -n TestExt -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -f ../tests.pw -i TestExt.cert
cert.sh: #4391: Import TestExt's Cert - PASSED
cert.sh SUCCESS: TestExt's Cert Created
cert.sh: Generate EC Cert Request for TestExt --------------------------
certutil -s "CN=TestExt, E=TestExt-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4392: Generate EC Cert Request for TestExt - PASSED
cert.sh: Sign TestExt's EC Request --------------------------
certutil -C -c TestCA-ec -m 90 -v 60 -d ../CA -i req -o TestExt-ec.cert -f ../tests.pw 
cert.sh: #4393: Sign TestExt's EC Request - PASSED
cert.sh: Import TestExt's EC Cert --------------------------
certutil -A -n TestExt-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -f ../tests.pw -i TestExt-ec.cert
cert.sh: #4394: Import TestExt's EC Cert - PASSED
cert.sh SUCCESS: TestExt's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestExt --------------------------
certutil -s "CN=TestExt, E=TestExt-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4395: Generate mixed EC Cert Request for TestExt - PASSED
cert.sh: Sign TestExt's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10090 -v 60 -d ../CA -i req -o TestExt-ecmixed.cert -f ../tests.pw 
cert.sh: #4396: Sign TestExt's EC Request with RSA - PASSED
cert.sh: Import TestExt's mixed EC Cert --------------------------
certutil -A -n TestExt-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -f ../tests.pw -i TestExt-ecmixed.cert
cert.sh: #4397: Import TestExt's mixed EC Cert - PASSED
cert.sh SUCCESS: TestExt's mixed EC Cert Created

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -S -n TestExt1 -t u,u,u -o /tmp/cert -s CN=TestExt1, E=TestExt1@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions/test.args
certutil options:
0
1
2
3
4
5
6
10
n


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -L -n TestExt1
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f2:0b:4a
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 16:06:44 2012
            Not After : Thu Feb 28 16:06:44 2013
        Subject: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cb:2a:2c:23:90:02:3e:80:3a:ea:20:be:b3:d6:78:a1:
                    80:a3:8c:61:eb:89:27:ff:70:74:7b:30:02:74:46:49:
                    cf:c4:f7:bc:e1:82:1d:93:4c:a4:7c:99:77:fa:c2:3c:
                    df:f5:0d:da:6d:56:29:98:e8:a3:c2:17:44:ba:bc:a5:
                    ab:cd:11:21:a5:79:ed:2d:fa:7c:c7:db:e0:91:82:84:
                    3d:09:fc:61:f1:b8:4b:af:5b:59:22:68:72:5a:cd:cc:
                    88:5c:e3:11:8e:e6:c2:1d:59:6f:64:62:34:e5:fb:95:
                    de:fd:17:fb:f3:f1:e1:e7:7c:7c:23:c6:f3:67:81:c9
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Key Usage
            Usages: Digital Signature
                    Non-Repudiation
                    Key Encipherment
                    Data Encipherment
                    Key Agreement
                    Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8b:b5:2e:e9:29:5b:73:bb:e7:76:32:9f:08:80:f2:85:
        ec:eb:79:60:28:6b:84:1f:d0:fe:c4:5a:c1:24:88:3f:
        0c:92:a2:08:7a:23:1a:45:02:7e:d2:0b:46:62:4a:9f:
        3a:fe:31:68:6b:a2:d7:dc:0e:12:7c:30:a8:df:f1:1d:
        84:28:65:b2:9f:87:86:2e:ae:8b:c6:24:50:b7:dc:ec:
        0e:2a:6f:33:69:f5:d0:5c:49:b3:e5:e2:49:df:20:1a:
        50:81:0f:1e:5a:46:16:35:52:12:fe:df:e9:d0:5b:a1:
        0d:87:98:66:13:95:42:37:45:e5:32:bd:90:3a:b1:27
    Fingerprint (MD5):
        57:0F:98:72:F1:BE:39:AD:47:2D:78:F3:24:94:0A:D2
    Fingerprint (SHA1):
        71:ED:54:E6:C5:DB:5A:E6:9A:07:88:88:BD:35:EC:C8:F6:AB:F9:D3

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #4398: Certificate Key Usage Extension (1) - PASSED

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -S -n TestExt2 -t u,u,u -o /tmp/cert -s CN=TestExt2, E=TestExt2@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions/test.args
certutil options:
0
1
2
3
4
5
6
10
y


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -L -n TestExt2
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f2:0b:4b
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 16:06:45 2012
            Not After : Thu Feb 28 16:06:45 2013
        Subject: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a8:46:71:ab:48:6f:a0:ca:1c:dc:a2:c4:2f:d6:ea:a2:
                    ce:f6:08:3a:18:ee:fb:26:e3:03:28:a3:98:5a:45:28:
                    7f:2d:b2:d0:ba:fc:52:be:d4:c2:23:9e:ef:bc:61:d6:
                    b4:db:fb:0f:06:d2:6b:da:86:c0:eb:2d:a4:90:fd:2e:
                    d4:0c:06:57:ce:d4:76:5b:a6:8f:0b:0b:42:45:69:8c:
                    20:d6:4a:27:34:cb:2a:9d:1c:f1:ec:e5:89:f3:8e:0d:
                    4e:b6:11:f0:d2:ac:f3:56:93:0c:ef:06:bf:b3:24:8d:
                    40:d0:ae:b5:f7:da:47:53:19:e0:70:64:cf:3e:dd:43
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Key Usage
            Critical: True
            Usages: Digital Signature
                    Non-Repudiation
                    Key Encipherment
                    Data Encipherment
                    Key Agreement
                    Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        12:45:6b:80:b6:96:3e:dc:bd:4a:1b:81:f6:ae:07:9e:
        1e:a0:5f:29:3b:45:f0:1d:f4:1f:71:67:03:42:02:1b:
        ed:6a:aa:7b:95:31:9a:2b:8f:93:f8:db:8a:8c:90:5f:
        b4:d7:ef:8c:d9:59:7a:fb:b7:c0:c0:9e:dc:02:d3:d0:
        70:da:00:eb:15:fb:d2:d4:88:ec:b9:6f:d2:dc:95:56:
        18:17:0a:ff:d1:0e:67:8a:0e:c8:e2:39:5e:94:bd:1a:
        b3:d0:bd:e7:31:a2:8d:6d:0b:4a:86:21:2a:2a:e4:ab:
        09:b3:ce:de:2c:56:4f:7c:48:1e:5d:97:a7:e5:c2:b5
    Fingerprint (MD5):
        C5:B7:65:A2:49:1C:71:29:20:91:6B:86:6E:49:B4:08
    Fingerprint (SHA1):
        EF:49:3F:46:77:1A:02:11:73:3A:0D:99:7A:E6:FD:40:4F:61:AB:B1

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #4399: Certificate Key Usage Extension (2) - PASSED

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -S -n TestExt3 -t u,u,u -o /tmp/cert -s CN=TestExt3, E=TestExt3@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions/test.args
certutil options:
y
-1
n


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -L -n TestExt3
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f2:0b:4b
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 16:06:45 2012
            Not After : Thu Feb 28 16:06:45 2013
        Subject: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c3:11:5a:46:23:a7:ef:87:af:c8:e5:5f:46:27:8e:e9:
                    3b:03:25:a3:9a:9f:fa:d3:93:7f:29:5e:c7:e3:cd:00:
                    32:5f:9e:d2:a5:ba:f5:73:81:18:96:4e:7f:5d:79:b9:
                    3a:eb:ff:e6:33:9c:e9:81:17:bd:26:cd:1a:f7:e0:d5:
                    82:4b:73:67:0c:d1:8c:e7:5c:0a:b2:01:a0:75:d1:9e:
                    df:25:7b:eb:70:6c:97:cd:88:74:c1:9a:c1:e1:2f:51:
                    3e:17:ca:18:8b:81:25:c3:bb:8e:f1:da:6b:24:af:4f:
                    c8:11:74:9d:50:88:83:70:aa:2c:8d:0b:62:ce:5d:0f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        08:9c:ac:29:96:5d:1b:85:bd:83:ed:4d:8f:63:0c:3b:
        cd:d9:f6:54:2f:a0:fe:5a:69:02:ae:2c:15:2b:d7:4c:
        96:62:9f:23:90:08:80:53:d6:75:0c:e9:7b:68:5e:f2:
        02:15:58:e5:72:95:90:41:5e:66:46:45:16:38:38:94:
        fc:b2:c2:e6:a1:cc:c5:8f:dc:ba:ea:e5:01:e4:66:99:
        21:06:65:6b:03:47:a9:ec:e2:dc:0f:fc:25:24:63:9e:
        7b:e8:13:91:a6:1c:7f:d7:04:a6:b7:c5:fd:3e:0f:a8:
        48:7d:67:d8:4f:80:48:a3:39:f8:4d:9a:31:77:8b:e2
    Fingerprint (MD5):
        83:62:3D:E0:49:B2:DA:FF:47:A5:77:59:87:43:96:EA
    Fingerprint (SHA1):
        81:51:14:ED:B2:9E:C7:56:8C:12:C7:2C:9F:E8:78:C2:7C:76:B6:DB

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #4400: Certificate Basic Constraints Extension (3) - PASSED

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -S -n TestExt4 -t u,u,u -o /tmp/cert -s CN=TestExt4, E=TestExt4@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions/test.args
certutil options:
n
-1
y


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -L -n TestExt4
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f2:0b:4c
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 16:06:45 2012
            Not After : Thu Feb 28 16:06:45 2013
        Subject: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d2:62:b5:82:24:27:dd:a0:8d:fe:94:b1:ee:b7:74:cd:
                    78:1a:f9:a9:94:95:67:8b:af:0a:0a:cb:50:8e:c2:f0:
                    79:09:3c:43:63:c3:67:6e:f1:04:66:fc:7e:1c:7d:3e:
                    c6:08:42:37:2d:08:ed:6d:96:6b:f8:ab:71:09:88:47:
                    de:80:ac:84:c6:4e:c3:2d:d0:2b:a3:fe:3f:5a:c6:66:
                    89:84:9a:50:55:c5:b1:74:5d:ed:c9:86:fe:dc:d0:31:
                    ff:2c:3a:77:f5:82:33:57:d3:2c:82:d5:36:39:57:37:
                    a9:2c:06:27:17:51:ca:38:e9:37:87:d0:e1:af:ca:7f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is not a CA.

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        07:b2:45:f8:7e:b7:47:78:ab:be:b0:cb:c4:ae:ca:c9:
        28:ba:54:43:50:59:ac:fc:55:79:40:eb:e0:46:c7:f2:
        ea:30:1b:ab:fc:5d:8f:ed:07:04:a3:38:da:04:da:d3:
        a2:c4:b1:95:57:4a:a8:5b:df:30:30:58:8f:28:09:0f:
        52:24:f5:bf:28:a3:f3:8b:78:a9:4b:de:d5:fe:e6:0d:
        1e:f8:47:c4:82:86:da:1e:ae:7b:71:0f:ae:c1:e4:0d:
        6f:76:db:ec:84:d9:56:ac:28:82:d3:8c:44:f8:6a:52:
        21:f6:b3:04:5d:6b:6a:ac:31:64:9d:bb:76:5a:83:ed
    Fingerprint (MD5):
        17:E8:E7:61:B3:1C:6C:76:50:62:FE:4D:B7:90:1A:B0
    Fingerprint (SHA1):
        02:DB:73:4C:6A:23:9F:79:3C:9F:F6:15:BC:52:A0:31:BD:E8:57:42

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #4401: Certificate Basic Constraints Extension (4) - PASSED

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -S -n TestExt5 -t u,u,u -o /tmp/cert -s CN=TestExt5, E=TestExt5@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions/test.args
certutil options:
y
12341235123


y


Generating key.  This may take a few moments...

Enter value for the authKeyID extension [y/N]?
Enter value for the key identifier fields,enter to omit:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter value for the authCertSerial field, enter to omit:
Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -L -n TestExt5
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f2:0b:4c
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 16:06:45 2012
            Not After : Thu Feb 28 16:06:45 2013
        Subject: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a9:e8:8c:a6:6e:12:99:5f:19:fd:5d:55:b4:8a:5b:22:
                    98:1a:1d:1a:55:12:e2:15:7d:d1:fb:53:eb:8c:e6:2a:
                    cb:fc:70:05:15:52:3a:67:f1:dc:16:5c:0c:e3:32:f0:
                    0d:79:69:68:af:a3:97:ec:a4:20:56:69:10:92:a4:b8:
                    96:2f:a7:96:2d:7a:31:3a:38:7b:42:fd:70:36:ea:ef:
                    d3:a1:3c:28:fe:50:6f:43:a0:14:be:77:3a:72:ba:eb:
                    49:17:6d:d4:a2:72:27:90:10:bb:7b:ec:4d:f8:d2:07:
                    d2:30:05:2b:c6:ac:97:f3:53:e9:64:5e:47:c4:45:91
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Authority Key Identifier
            Critical: True
            Key ID:
                12341235123

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        05:0a:24:c6:29:dc:4c:03:94:9c:8d:a1:a4:bb:43:7f:
        4b:05:d6:23:d3:76:22:99:31:18:a1:09:f3:59:4e:32:
        ed:b7:07:cb:0a:4f:4c:44:c4:a8:c4:5b:f8:0e:e5:96:
        a8:54:85:20:6f:86:2b:c7:42:4b:18:f0:0e:33:df:ea:
        1c:0e:6c:99:8c:ea:9f:31:28:17:3f:17:ce:43:b0:99:
        b1:d4:a0:ab:9d:0d:e4:4d:c7:75:24:31:e4:b7:bb:f0:
        d5:b4:2f:11:8c:63:f9:63:76:cc:44:8a:f6:4e:5a:db:
        96:81:6a:66:ab:a9:70:c2:cd:d4:2d:f4:7d:51:01:cb
    Fingerprint (MD5):
        57:55:29:85:01:6E:32:BE:AF:03:80:37:69:DA:D4:E2
    Fingerprint (SHA1):
        D2:51:EE:CE:91:6D:CA:37:B6:48:4B:B1:B2:A3:B9:24:A3:F1:01:AB

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #4402: Certificate Authority Key Identifier Extension (5) - PASSED

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -S -n TestExt6 -t u,u,u -o /tmp/cert -s CN=TestExt6, E=TestExt6@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions/test.args
certutil options:
y

3
test.com

214123
y


Generating key.  This may take a few moments...

Enter value for the authKeyID extension [y/N]?
Enter value for the key identifier fields,enter to omit:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter value for the authCertSerial field, enter to omit:
Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -L -n TestExt6
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f2:0b:4d
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 16:06:46 2012
            Not After : Thu Feb 28 16:06:46 2013
        Subject: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:8a:5b:3c:96:35:11:f5:6e:00:e9:8e:97:18:e1:ed:
                    f6:af:b2:fa:a7:92:24:f7:7a:7e:df:7e:4b:2e:c8:8f:
                    d7:1c:c6:8e:4f:ea:ee:eb:da:9c:0e:e7:cc:af:8d:b8:
                    d3:60:9d:02:29:a6:34:96:1e:07:62:07:0d:67:a7:5a:
                    0b:2b:0d:92:ac:6e:7f:57:20:78:e9:5d:83:0e:44:95:
                    23:51:04:6d:c6:86:63:1f:88:fb:ca:0e:84:0e:84:3b:
                    63:87:db:9f:b5:41:8b:fa:6b:ff:f4:38:57:89:1a:08:
                    34:de:81:99:65:09:8b:20:4f:27:31:28:40:b6:de:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Authority Key Identifier
            Critical: True
            Issuer: 
                DNS name: "test.com"
            Serial Number:
                214123

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        01:1e:09:ab:f5:7c:0f:cf:b1:aa:4c:02:66:7e:35:f1:
        61:39:81:c6:1a:85:a5:69:e0:e2:d6:9e:4f:7f:e8:a9:
        3a:0a:52:a7:b5:55:c7:fe:6b:b0:b0:c3:cf:0a:35:15:
        01:19:b7:67:13:1b:68:ed:d7:e5:24:75:d9:02:f3:c1:
        12:e8:ce:0d:fd:4a:bd:28:ac:03:6a:60:89:99:a6:ee:
        12:75:6b:c9:91:8b:7b:f2:5c:39:e0:d6:3b:53:db:a0:
        5c:e1:77:cd:94:88:fb:a9:72:29:f9:2d:eb:ad:8e:58:
        1f:31:f3:33:68:50:9f:6b:e3:d8:f2:e1:f2:94:78:6b
    Fingerprint (MD5):
        9D:47:52:A2:E3:EF:9B:83:00:0C:90:52:F4:32:DE:10
    Fingerprint (SHA1):
        73:B6:47:A0:1D:3D:03:6A:02:87:4C:57:D7:48:A6:D4:70:72:76:6B

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #4403: Certificate Authority Key Identifier Extension (6) - PASSED

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -S -n TestExt7 -t u,u,u -o /tmp/cert -s CN=TestExt7, E=TestExt7@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions/test.args
certutil options:
1
2
rfc822@name.tld
3
test.com
8
1.2.3.4
9
OID.0.2.213
10
0
10
n
n


Generating key.  This may take a few moments...

Enter the type of the distribution point name:
1 - Full Name
2 - Relative Name
Any other number to finish
Choice:  > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Select one of the following for the reason flags
0 - unused
1 - keyCompromise
2 - caCompromise
3 - affiliationChanged
4 - superseded
5 - cessationOfOperation
6 - certificateHold
Any other number to finishChoice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -L -n TestExt7
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f2:0b:4e
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 16:06:46 2012
            Not After : Thu Feb 28 16:06:46 2013
        Subject: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e1:ca:0e:03:a1:8a:d7:55:4f:1c:91:aa:5a:d5:34:09:
                    bf:b3:e5:eb:b3:8e:de:07:5f:b8:e9:4f:f2:44:ba:6b:
                    4c:a2:c9:63:5d:01:6e:7c:2b:e5:60:92:95:0d:6e:ac:
                    4b:d8:54:ec:f4:6d:63:b8:e5:7e:0c:3d:5f:b1:e7:cb:
                    7d:a9:09:8e:67:7d:2e:12:03:cc:59:f8:02:3e:f9:f4:
                    ca:f6:6f:bf:44:93:94:52:6b:71:05:23:3d:57:1a:da:
                    cc:30:25:44:da:c6:4d:45:75:5d:71:9d:ec:34:e6:fd:
                    1d:29:5f:d0:14:b3:f8:47:75:ac:f4:a8:3c:c0:cd:c9
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: CRL Distribution Points
            Distribution point:
                RFC822 Name: "rfc822@name.tld"
                DNS name: "test.com"
                IP Address:
                    87:07:31:2e:32:2e:33:2e:34
                Registered ID: OID.2.955.79.73.68.46.48.46.50.46.50.49.51
                Reasons:
                    80
                    (7 least significant bits unused)

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        2e:d9:53:38:c9:e6:d5:41:fd:3d:d4:43:37:40:31:71:
        09:54:b4:6a:52:b4:e5:0b:e0:a4:69:27:d8:66:21:01:
        a7:d2:c6:89:99:4f:6d:16:c7:e7:24:cc:31:2a:b6:1b:
        4c:4a:64:ca:0b:e3:06:c2:b4:5d:9a:22:5f:c8:90:eb:
        0f:48:37:23:f0:4d:6b:39:65:ec:bc:08:e6:53:b1:82:
        24:8e:6e:17:19:09:d3:e5:f1:25:45:6b:4f:fd:32:67:
        b4:4b:69:d4:6d:9c:c8:01:5f:e0:14:fc:12:5f:63:83:
        e7:c0:6f:4d:03:5a:fb:ff:8a:a2:f7:f3:3e:a5:90:4b
    Fingerprint (MD5):
        B2:45:B4:05:76:D0:8D:CA:81:35:3C:FC:6A:2F:36:78
    Fingerprint (SHA1):
        02:2A:14:E0:0A:DC:CE:D2:E5:55:54:CD:B1:74:FE:4E:AC:A0:A6:6D

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #4404: CRL Distribution Points Extension (7) - PASSED

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -S -n TestExt8 -t u,u,u -o /tmp/cert -s CN=TestExt8, E=TestExt8@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions/test.args
certutil options:
2
SN=asdfsdf
4
3
test.com
10
n
n


Generating key.  This may take a few moments...

Enter the type of the distribution point name:
1 - Full Name
2 - Relative Name
Any other number to finish
Choice:  > Enter the relative name: 

Select one of the following for the reason flags
0 - unused
1 - keyCompromise
2 - caCompromise
3 - affiliationChanged
4 - superseded
5 - cessationOfOperation
6 - certificateHold
Any other number to finishChoice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -L -n TestExt8
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f2:0b:4e
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 16:06:46 2012
            Not After : Thu Feb 28 16:06:46 2013
        Subject: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b5:a7:40:60:5b:08:02:6a:92:d7:1b:32:82:d9:08:40:
                    c1:1b:31:3a:66:36:45:97:90:a9:d9:99:b3:4a:e4:d4:
                    79:00:27:d7:7e:bf:96:31:61:29:e3:6b:7d:45:d5:fc:
                    7d:28:d0:e6:44:ee:19:32:db:a6:c4:2a:05:40:dd:2c:
                    db:6e:83:f9:d2:66:bf:71:c5:36:0a:28:f5:f4:3c:a3:
                    cc:5d:b4:37:34:be:70:bf:f7:c8:a6:6e:47:56:5b:07:
                    ad:3b:70:f0:1f:15:e7:4b:89:f2:87:57:11:31:a7:4e:
                    e6:0f:66:56:a9:43:3c:93:2d:9f:f0:4d:a0:14:bc:23
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: CRL Distribution Points
            Distribution point:
                RDN: "SN=asdfsdf"
                Reasons:
                    08
                    (7 least significant bits unused)
                CRL issuer: 
                    DNS name: "test.com"

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        39:8c:9f:f1:6e:76:a9:f5:a2:ac:24:61:71:33:55:90:
        87:8c:2e:35:4f:c4:47:ee:94:8d:e3:e2:f3:b2:2f:67:
        8a:bc:2f:6b:ea:9e:07:aa:ca:4b:50:3d:ee:25:2f:f7:
        7b:c0:e1:9e:52:d8:bc:ba:6a:e8:80:9e:a2:13:2e:f7:
        d7:fd:ba:51:71:33:cd:76:b6:50:9c:6c:6d:c0:b9:f4:
        f9:3f:f3:ec:cb:a0:41:a6:a0:44:b2:32:76:ac:76:45:
        27:c1:ad:39:b7:77:d2:1e:06:40:da:32:35:5e:20:26:
        9e:93:10:da:09:be:ff:00:b1:43:12:f6:ca:58:18:00
    Fingerprint (MD5):
        07:A0:F8:33:6E:84:F7:D4:57:71:FF:F0:34:1D:8C:23
    Fingerprint (SHA1):
        16:80:AD:9A:76:B2:63:68:57:63:55:F2:F9:A0:B6:CD:CE:96:70:DE

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #4405: CRL Distribution Points Extension (8) - PASSED

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -S -n TestExt9 -t u,u,u -o /tmp/cert -s CN=TestExt9, E=TestExt9@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -5 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions/test.args
certutil options:
0
1
2
10
n


Generating key.  This may take a few moments...

0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -L -n TestExt9
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f2:0b:4f
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 16:06:47 2012
            Not After : Thu Feb 28 16:06:47 2013
        Subject: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a5:91:54:0a:c4:f8:54:63:1e:4f:2b:3c:82:47:72:c9:
                    d2:5e:04:c1:0c:05:d0:07:71:04:21:3e:f2:2b:17:d4:
                    36:6e:1d:1e:3c:8f:cd:01:ee:7d:e6:9e:b8:58:16:aa:
                    f5:a5:08:f0:77:8b:4f:dc:2a:fb:35:d9:00:17:f9:67:
                    11:bf:b1:e2:8d:1f:c9:4f:65:08:13:b0:a5:02:df:d3:
                    78:d6:6e:55:47:ed:b1:cc:ca:82:d7:a7:08:22:2f:28:
                    a3:2a:53:d0:eb:41:11:99:36:5b:34:e0:68:4e:b2:aa:
                    99:90:6e:8c:5f:16:be:43:85:ae:2b:26:cb:4a:4b:ff
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL Client,SSL Server,S/MIME>

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8d:bb:e2:86:52:bd:df:db:4e:f6:ec:5f:88:5a:4f:8c:
        39:b1:6c:6d:7f:39:1a:59:f4:25:34:d8:66:c6:38:a3:
        45:64:92:c3:50:d3:3d:1e:b2:35:b2:46:68:82:08:5f:
        7d:51:5f:ff:d9:8c:9b:bf:52:00:f5:c3:cd:4c:f0:e9:
        08:de:be:31:a6:05:4a:e3:09:09:13:2a:44:f3:b2:b7:
        be:0b:4f:83:8c:98:68:f6:14:d7:d2:99:66:a5:62:90:
        1c:ab:06:e4:6e:f2:1b:ab:aa:a3:05:3f:50:6f:84:5a:
        2e:30:ee:30:5d:20:68:36:4f:d3:83:0f:f0:c0:c9:fc
    Fingerprint (MD5):
        85:BC:54:CE:48:C8:07:2F:F6:C7:EC:20:C3:C2:5B:CD
    Fingerprint (SHA1):
        A1:2F:66:65:E5:89:9B:7E:17:35:C8:54:CD:93:68:4D:36:11:A4:52

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #4406: Certificate Type Extension (9) - PASSED

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -S -n TestExt10 -t u,u,u -o /tmp/cert -s CN=TestExt10, E=TestExt10@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -6 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions/test.args
certutil options:
0
1
2
3
4
5
6
10
y


Generating key.  This may take a few moments...

0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
 > 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
 > 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
 > 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
 > 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
 > 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
 > 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
 > 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
 > Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -L -n TestExt10
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f2:0b:4f
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain Vi
            ew,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 16:06:47 2012
            Not After : Thu Feb 28 16:06:47 2013
        Subject: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain V
            iew,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:8c:39:94:4d:a7:0d:d9:11:cf:c2:41:21:9a:91:a3:
                    42:1c:5f:2f:28:6b:a0:52:83:05:be:fd:64:1e:d6:34:
                    19:b5:48:d0:bd:74:fd:d4:fb:10:80:1c:a7:f1:6f:e9:
                    4b:ac:99:48:b2:f4:56:ed:f1:a6:70:ab:eb:b8:92:d1:
                    c7:92:98:60:e0:47:b8:43:ca:39:f1:04:e9:3c:97:a1:
                    f8:5c:8d:9c:38:42:28:95:bf:03:4c:3b:57:ac:cb:ed:
                    8b:fc:e6:a1:b5:8f:06:b6:1a:90:6e:49:73:27:34:6a:
                    f8:ee:64:35:81:5e:34:7f:6c:ea:07:81:39:9d:93:9b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Extended Key Usage
            Critical: True
                TLS Web Server Authentication Certificate
                TLS Web Client Authentication Certificate
                Code Signing Certificate
                E-Mail Protection Certificate
                Time Stamping Certifcate
                OCSP Responder Certificate
                Strong Crypto Export Approved

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        6e:e8:a5:8e:6d:d8:80:8d:8b:df:a1:7b:ee:ef:e3:0a:
        ea:6d:46:2f:32:14:06:5d:d2:33:c3:f2:e4:55:17:ca:
        bf:ee:3e:1e:38:43:4d:fd:d9:60:43:19:37:66:eb:ae:
        26:af:8d:f8:ac:8a:92:37:b5:30:c8:cd:7b:5b:44:fe:
        c9:32:9d:c1:ce:3c:61:b0:04:13:9b:99:fa:40:06:b2:
        de:1e:d9:8e:09:da:c9:fa:d4:1e:b8:9c:81:0c:52:ea:
        70:16:6b:44:29:cd:6a:b9:99:7a:2e:0c:d0:bc:17:a0:
        a0:c6:24:7a:70:4c:e0:f4:c8:06:2d:71:6c:8d:ea:01
    Fingerprint (MD5):
        2C:25:EF:3A:38:08:5A:56:39:35:09:F0:E5:6B:3A:54
    Fingerprint (SHA1):
        8D:49:6E:59:2B:97:04:B0:20:AB:DF:BD:75:81:1E:86:DE:4F:C6:AF

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #4407: Extended Key Usage Extension (10) - PASSED

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -S -n TestExt11 -t u,u,u -o /tmp/cert -s CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions/test.args
certutil options:

1
2
3
4
5
6
10
n


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -L -n TestExt11
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f2:0b:50
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain Vi
            ew,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 16:06:47 2012
            Not After : Thu Feb 28 16:06:47 2013
        Subject: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain V
            iew,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a4:f3:8c:49:16:55:94:21:62:cc:22:50:6f:22:f6:2b:
                    83:4c:30:ee:4e:d1:fd:51:df:ca:1b:89:3c:b7:01:1d:
                    38:c8:78:b3:e4:59:b9:6e:7a:eb:50:0d:a6:07:14:1b:
                    a7:55:b7:1c:e6:97:51:cf:1c:0d:f3:37:8f:9d:14:11:
                    46:14:47:47:b6:9a:45:99:bc:d0:58:e3:43:14:2e:ad:
                    1c:e0:d1:50:f7:0f:dc:71:90:1a:7d:72:07:c6:0b:c9:
                    d3:55:76:90:10:dc:95:ff:1f:e6:f4:35:66:61:f9:70:
                    e1:62:9f:64:dc:41:5a:94:92:a1:38:89:3e:f7:bf:db
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Key Usage
            Usages: Non-Repudiation
                    Key Encipherment
                    Data Encipherment
                    Key Agreement
                    Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        0c:1b:45:86:c7:3a:42:a2:07:7a:aa:43:a0:ae:c0:6f:
        ab:02:2d:49:ff:79:29:dc:9b:fb:e7:0b:67:1e:01:8b:
        3a:dc:4a:3a:6f:72:58:55:3a:35:fc:b6:8c:b7:26:ec:
        01:b2:7c:fe:af:99:3d:fc:fe:ef:c9:fb:0d:d8:33:85:
        25:6b:8b:59:82:0f:c9:67:fb:ab:0f:8d:8b:b0:b5:58:
        38:41:9f:3e:94:f2:d9:0a:90:a2:9a:70:6d:7e:fa:bb:
        fa:f9:67:6c:0f:13:b7:bd:80:c9:0f:71:00:05:74:f8:
        19:66:6b:65:d6:8a:dd:01:5d:3e:59:36:9f:b6:36:72
    Fingerprint (MD5):
        C5:E3:67:8A:5B:6E:71:2A:69:88:5A:DF:0E:02:9A:0E
    Fingerprint (SHA1):
        16:4A:0A:94:76:0D:82:DE:8C:A6:B0:83:77:FD:AC:FE:F3:71:81:1B

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #4408: Certificate Key Usage Extension (11) - PASSED
cert.sh: Create A Password Test Cert  ==============
cert.sh: Create A Password Test Ca  --------
cert.sh: Creating a CA Certificate PasswordCA ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/dbpass
cert.sh: Creating CA Cert DB --------------------------
certutil -s "CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/dbpass -f ../tests.pw
cert.sh: #4409: Creating CA Cert DB - PASSED
cert.sh: Loading root cert module to CA Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/dbpass

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #4410: Loading root cert module to CA Cert DB - PASSED
cert.sh: Certificate initialized ----------
cert.sh: Creating CA Cert PasswordCA  --------------------------
certutil -s "CN=NSS Password Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCA -t CTu,CTu,CTu -v 600 -x -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/dbpass -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #4411: Creating CA Cert PasswordCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n PasswordCA -r -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/dbpass -o root.cert
cert.sh: #4412: Exporting Root Cert - PASSED
cert.sh: Changing password on Password Test Cert's Cert DB --------------------------
certutil -W -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/dbpass -f ../tests.pw -@ ../tests.fipspw
Password changed successfully.
cert.sh: #4413: Changing password on Password Test Cert's Cert DB - PASSED
cert.sh: Generate Certificate for Password Test Cert with new password --------------------------
certutil -s "CN=Password Test Cert, E=password@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCert -c PasswordCA -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/dbpass -f ../tests.fipspw -z ../tests_noise


Generating key.  This may take a few moments...

cert.sh: #4414: Generate Certificate for Password Test Cert with new password - PASSED
cert.sh SUCCESS: PASSWORD passed
cert.sh: Verify Certificate for Password Test Cert with new password --------------------------
certutil -V -n PasswordCert -u S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/dbpass -f ../tests.fipspw
certutil: certificate is valid
cert.sh: #4415: Verify Certificate for Password Test Cert with new password - PASSED
cert.sh: Creating Distrusted Certificate
cert.sh: Initializing Distrusted's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/distrust -f ../tests.pw
cert.sh: #4416: Initializing Distrusted's Cert DB - PASSED
cert.sh: Loading root cert module to Distrusted's Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/distrust

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #4417: Loading root cert module to Distrusted's Cert DB - PASSED
cert.sh: Import Root CA for Distrusted --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/distrust -i ../CA/TestCA.ca.cert
cert.sh: #4418: Import Root CA for Distrusted - PASSED
cert.sh: Import EC Root CA for Distrusted --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/distrust -i ../CA/TestCA-ec.ca.cert
cert.sh: #4419: Import EC Root CA for Distrusted - PASSED
cert.sh: Generate Cert Request for Distrusted --------------------------
certutil -s "CN=Distrusted, E=Distrusted@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4420: Generate Cert Request for Distrusted - PASSED
cert.sh: Sign Distrusted's Request --------------------------
certutil -C -c TestCA -m 2000 -v 60 -d ../CA -i req -o Distrusted.cert -f ../tests.pw 
cert.sh: #4421: Sign Distrusted's Request - PASSED
cert.sh: Import Distrusted's Cert --------------------------
certutil -A -n Distrusted -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/distrust -f ../tests.pw -i Distrusted.cert
cert.sh: #4422: Import Distrusted's Cert - PASSED
cert.sh SUCCESS: Distrusted's Cert Created
cert.sh: Generate EC Cert Request for Distrusted --------------------------
certutil -s "CN=Distrusted, E=Distrusted-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4423: Generate EC Cert Request for Distrusted - PASSED
cert.sh: Sign Distrusted's EC Request --------------------------
certutil -C -c TestCA-ec -m 2000 -v 60 -d ../CA -i req -o Distrusted-ec.cert -f ../tests.pw 
cert.sh: #4424: Sign Distrusted's EC Request - PASSED
cert.sh: Import Distrusted's EC Cert --------------------------
certutil -A -n Distrusted-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/distrust -f ../tests.pw -i Distrusted-ec.cert
cert.sh: #4425: Import Distrusted's EC Cert - PASSED
cert.sh SUCCESS: Distrusted's EC Cert Created
cert.sh: Generate mixed EC Cert Request for Distrusted --------------------------
certutil -s "CN=Distrusted, E=Distrusted-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4426: Generate mixed EC Cert Request for Distrusted - PASSED
cert.sh: Sign Distrusted's EC Request with RSA --------------------------
certutil -C -c TestCA -m 12000 -v 60 -d ../CA -i req -o Distrusted-ecmixed.cert -f ../tests.pw 
cert.sh: #4427: Sign Distrusted's EC Request with RSA - PASSED
cert.sh: Import Distrusted's mixed EC Cert --------------------------
certutil -A -n Distrusted-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/distrust -f ../tests.pw -i Distrusted-ecmixed.cert
cert.sh: #4428: Import Distrusted's mixed EC Cert - PASSED
cert.sh SUCCESS: Distrusted's mixed EC Cert Created
cert.sh: Mark CERT as unstrusted --------------------------
certutil -M -n Distrusted -t p,p,p -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/distrust -f ../tests.pw
cert.sh: #4429: Mark CERT as unstrusted - PASSED
cert.sh: Creating Distrusted Intermediate
cert.sh: Creating a CA Certificate DistrustedCA ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/CA
cert.sh: Creating CA Cert DistrustedCA  --------------------------
certutil -s "CN=DistrustedCA, E=DistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n DistrustedCA -t ,, -v 600 -c TestCA -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2010


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #4430: Creating CA Cert DistrustedCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n DistrustedCA -r -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/CA -o root.cert
cert.sh: #4431: Exporting Root Cert - PASSED
cert.sh: Import Distrusted Intermediate --------------------------
certutil -A -n DistrustedCA -t p,p,p -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/distrust -i ../CA/DistrustedCA.ca.cert
cert.sh: #4432: Import Distrusted Intermediate - PASSED
cert.sh: Generate Cert Request for Leaf Chained to Distrusted CA --------------------------
certutil -s "CN=LeafChainedToDistrustedCA, E=LeafChainedToDistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4433: Generate Cert Request for Leaf Chained to Distrusted CA - PASSED
cp: `./req' and `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/CA/req' are the same file
cert.sh: Sign LeafChainedToDistrustedCA's Request --------------------------
certutil -C -c DistrustedCA -m 100 -v 60 -d ../CA -i req -o LeafChainedToDistrustedCA.cert -f ../tests.pw
cert.sh: #4434: Sign LeafChainedToDistrustedCA's Request - PASSED
cert.sh: Import LeafChainedToDistrustedCA's Cert  -t u,u,u --------------------------
certutil -A -n LeafChainedToDistrustedCA -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/distrust -f ../tests.pw -i LeafChainedToDistrustedCA.cert
cert.sh: #4435: Import LeafChainedToDistrustedCA's Cert  -t u,u,u - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Server --------------------------
certutil -V -n LeafChainedToDistrustedCA -u V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #4436: Verify LeafChainedToDistrustedCA Cert for SSL Server - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Client --------------------------
certutil -V -n LeafChainedToDistrustedCA -u C -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #4437: Verify LeafChainedToDistrustedCA Cert for SSL Client - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for Email signer --------------------------
certutil -V -n LeafChainedToDistrustedCA -u S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #4438: Verify LeafChainedToDistrustedCA Cert for Email signer - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for Email recipient --------------------------
certutil -V -n LeafChainedToDistrustedCA -u R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #4439: Verify LeafChainedToDistrustedCA Cert for Email recipient - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for OCSP responder --------------------------
certutil -V -n LeafChainedToDistrustedCA -u O -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/distrust -f ../tests.pw
certutil: certificate is invalid: Certificate type not approved for application.
cert.sh: #4440: Verify LeafChainedToDistrustedCA Cert for OCSP responder - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for Object Signer --------------------------
certutil -V -n LeafChainedToDistrustedCA -u J -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/distrust -f ../tests.pw
certutil: certificate is invalid: Certificate type not approved for application.
cert.sh: #4441: Verify LeafChainedToDistrustedCA Cert for Object Signer - PASSED
cert.sh: Verify Distrusted Cert for SSL Server --------------------------
certutil -V -n Distrusted -u V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #4442: Verify Distrusted Cert for SSL Server - PASSED
cert.sh: Verify Distrusted Cert for SSL Client --------------------------
certutil -V -n Distrusted -u C -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #4443: Verify Distrusted Cert for SSL Client - PASSED
cert.sh: Verify Distrusted Cert for Email signer --------------------------
certutil -V -n Distrusted -u S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #4444: Verify Distrusted Cert for Email signer - PASSED
cert.sh: Verify Distrusted Cert for Email recipient --------------------------
certutil -V -n Distrusted -u R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #4445: Verify Distrusted Cert for Email recipient - PASSED
cert.sh: Verify Distrusted Cert for OCSP responder --------------------------
certutil -V -n Distrusted -u O -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/distrust -f ../tests.pw
certutil: certificate is invalid: Certificate type not approved for application.
cert.sh: #4446: Verify Distrusted Cert for OCSP responder - PASSED
cert.sh: Verify Distrusted Cert for Object Signer --------------------------
certutil -V -n Distrusted -u J -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #4447: Verify Distrusted Cert for Object Signer - PASSED
cert.sh: OCSP response creation selftest
cert.sh: perform selftest --------------------------
ocspresp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/serverCA serverCA chain-1-serverCA -f ../tests.pw
cert.sh: #4448: perform selftest - PASSED
cert.sh: Creating Client CA Issued Certificates Range 40 - 52 ===
cert.sh: Generate Cert Request for TestUser40 --------------------------
certutil -s "CN=TestUser40, E=TestUser40@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4449: Generate Cert Request for TestUser40 - PASSED
cert.sh: Sign TestUser40's Request --------------------------
certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o TestUser40.cert -f ../tests.pw 
cert.sh: #4450: Sign TestUser40's Request - PASSED
cert.sh: Import TestUser40's Cert --------------------------
certutil -A -n TestUser40 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser40.cert
cert.sh: #4451: Import TestUser40's Cert - PASSED
cert.sh SUCCESS: TestUser40's Cert Created
cert.sh: Generate EC Cert Request for TestUser40 --------------------------
certutil -s "CN=TestUser40, E=TestUser40-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4452: Generate EC Cert Request for TestUser40 - PASSED
cert.sh: Sign TestUser40's EC Request --------------------------
certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o TestUser40-ec.cert -f ../tests.pw 
cert.sh: #4453: Sign TestUser40's EC Request - PASSED
cert.sh: Import TestUser40's EC Cert --------------------------
certutil -A -n TestUser40-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser40-ec.cert
cert.sh: #4454: Import TestUser40's EC Cert - PASSED
cert.sh SUCCESS: TestUser40's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser40 --------------------------
certutil -s "CN=TestUser40, E=TestUser40-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4455: Generate mixed EC Cert Request for TestUser40 - PASSED
cert.sh: Sign TestUser40's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o TestUser40-ecmixed.cert -f ../tests.pw 
cert.sh: #4456: Sign TestUser40's EC Request with RSA - PASSED
cert.sh: Import TestUser40's mixed EC Cert --------------------------
certutil -A -n TestUser40-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser40-ecmixed.cert
cert.sh: #4457: Import TestUser40's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser40's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser41 --------------------------
certutil -s "CN=TestUser41, E=TestUser41@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4458: Generate Cert Request for TestUser41 - PASSED
cert.sh: Sign TestUser41's Request --------------------------
certutil -C -c TestCA -m 41 -v 60 -d ../CA -i req -o TestUser41.cert -f ../tests.pw 
cert.sh: #4459: Sign TestUser41's Request - PASSED
cert.sh: Import TestUser41's Cert --------------------------
certutil -A -n TestUser41 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser41.cert
cert.sh: #4460: Import TestUser41's Cert - PASSED
cert.sh SUCCESS: TestUser41's Cert Created
cert.sh: Generate EC Cert Request for TestUser41 --------------------------
certutil -s "CN=TestUser41, E=TestUser41-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4461: Generate EC Cert Request for TestUser41 - PASSED
cert.sh: Sign TestUser41's EC Request --------------------------
certutil -C -c TestCA-ec -m 41 -v 60 -d ../CA -i req -o TestUser41-ec.cert -f ../tests.pw 
cert.sh: #4462: Sign TestUser41's EC Request - PASSED
cert.sh: Import TestUser41's EC Cert --------------------------
certutil -A -n TestUser41-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser41-ec.cert
cert.sh: #4463: Import TestUser41's EC Cert - PASSED
cert.sh SUCCESS: TestUser41's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser41 --------------------------
certutil -s "CN=TestUser41, E=TestUser41-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4464: Generate mixed EC Cert Request for TestUser41 - PASSED
cert.sh: Sign TestUser41's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10041 -v 60 -d ../CA -i req -o TestUser41-ecmixed.cert -f ../tests.pw 
cert.sh: #4465: Sign TestUser41's EC Request with RSA - PASSED
cert.sh: Import TestUser41's mixed EC Cert --------------------------
certutil -A -n TestUser41-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser41-ecmixed.cert
cert.sh: #4466: Import TestUser41's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser41's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser42 --------------------------
certutil -s "CN=TestUser42, E=TestUser42@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4467: Generate Cert Request for TestUser42 - PASSED
cert.sh: Sign TestUser42's Request --------------------------
certutil -C -c TestCA -m 42 -v 60 -d ../CA -i req -o TestUser42.cert -f ../tests.pw 
cert.sh: #4468: Sign TestUser42's Request - PASSED
cert.sh: Import TestUser42's Cert --------------------------
certutil -A -n TestUser42 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser42.cert
cert.sh: #4469: Import TestUser42's Cert - PASSED
cert.sh SUCCESS: TestUser42's Cert Created
cert.sh: Generate EC Cert Request for TestUser42 --------------------------
certutil -s "CN=TestUser42, E=TestUser42-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4470: Generate EC Cert Request for TestUser42 - PASSED
cert.sh: Sign TestUser42's EC Request --------------------------
certutil -C -c TestCA-ec -m 42 -v 60 -d ../CA -i req -o TestUser42-ec.cert -f ../tests.pw 
cert.sh: #4471: Sign TestUser42's EC Request - PASSED
cert.sh: Import TestUser42's EC Cert --------------------------
certutil -A -n TestUser42-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser42-ec.cert
cert.sh: #4472: Import TestUser42's EC Cert - PASSED
cert.sh SUCCESS: TestUser42's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser42 --------------------------
certutil -s "CN=TestUser42, E=TestUser42-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4473: Generate mixed EC Cert Request for TestUser42 - PASSED
cert.sh: Sign TestUser42's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10042 -v 60 -d ../CA -i req -o TestUser42-ecmixed.cert -f ../tests.pw 
cert.sh: #4474: Sign TestUser42's EC Request with RSA - PASSED
cert.sh: Import TestUser42's mixed EC Cert --------------------------
certutil -A -n TestUser42-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser42-ecmixed.cert
cert.sh: #4475: Import TestUser42's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser42's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser43 --------------------------
certutil -s "CN=TestUser43, E=TestUser43@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4476: Generate Cert Request for TestUser43 - PASSED
cert.sh: Sign TestUser43's Request --------------------------
certutil -C -c TestCA -m 43 -v 60 -d ../CA -i req -o TestUser43.cert -f ../tests.pw 
cert.sh: #4477: Sign TestUser43's Request - PASSED
cert.sh: Import TestUser43's Cert --------------------------
certutil -A -n TestUser43 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser43.cert
cert.sh: #4478: Import TestUser43's Cert - PASSED
cert.sh SUCCESS: TestUser43's Cert Created
cert.sh: Generate EC Cert Request for TestUser43 --------------------------
certutil -s "CN=TestUser43, E=TestUser43-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4479: Generate EC Cert Request for TestUser43 - PASSED
cert.sh: Sign TestUser43's EC Request --------------------------
certutil -C -c TestCA-ec -m 43 -v 60 -d ../CA -i req -o TestUser43-ec.cert -f ../tests.pw 
cert.sh: #4480: Sign TestUser43's EC Request - PASSED
cert.sh: Import TestUser43's EC Cert --------------------------
certutil -A -n TestUser43-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser43-ec.cert
cert.sh: #4481: Import TestUser43's EC Cert - PASSED
cert.sh SUCCESS: TestUser43's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser43 --------------------------
certutil -s "CN=TestUser43, E=TestUser43-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4482: Generate mixed EC Cert Request for TestUser43 - PASSED
cert.sh: Sign TestUser43's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10043 -v 60 -d ../CA -i req -o TestUser43-ecmixed.cert -f ../tests.pw 
cert.sh: #4483: Sign TestUser43's EC Request with RSA - PASSED
cert.sh: Import TestUser43's mixed EC Cert --------------------------
certutil -A -n TestUser43-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser43-ecmixed.cert
cert.sh: #4484: Import TestUser43's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser43's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser44 --------------------------
certutil -s "CN=TestUser44, E=TestUser44@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4485: Generate Cert Request for TestUser44 - PASSED
cert.sh: Sign TestUser44's Request --------------------------
certutil -C -c TestCA -m 44 -v 60 -d ../CA -i req -o TestUser44.cert -f ../tests.pw 
cert.sh: #4486: Sign TestUser44's Request - PASSED
cert.sh: Import TestUser44's Cert --------------------------
certutil -A -n TestUser44 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser44.cert
cert.sh: #4487: Import TestUser44's Cert - PASSED
cert.sh SUCCESS: TestUser44's Cert Created
cert.sh: Generate EC Cert Request for TestUser44 --------------------------
certutil -s "CN=TestUser44, E=TestUser44-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4488: Generate EC Cert Request for TestUser44 - PASSED
cert.sh: Sign TestUser44's EC Request --------------------------
certutil -C -c TestCA-ec -m 44 -v 60 -d ../CA -i req -o TestUser44-ec.cert -f ../tests.pw 
cert.sh: #4489: Sign TestUser44's EC Request - PASSED
cert.sh: Import TestUser44's EC Cert --------------------------
certutil -A -n TestUser44-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser44-ec.cert
cert.sh: #4490: Import TestUser44's EC Cert - PASSED
cert.sh SUCCESS: TestUser44's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser44 --------------------------
certutil -s "CN=TestUser44, E=TestUser44-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4491: Generate mixed EC Cert Request for TestUser44 - PASSED
cert.sh: Sign TestUser44's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10044 -v 60 -d ../CA -i req -o TestUser44-ecmixed.cert -f ../tests.pw 
cert.sh: #4492: Sign TestUser44's EC Request with RSA - PASSED
cert.sh: Import TestUser44's mixed EC Cert --------------------------
certutil -A -n TestUser44-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser44-ecmixed.cert
cert.sh: #4493: Import TestUser44's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser44's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser45 --------------------------
certutil -s "CN=TestUser45, E=TestUser45@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4494: Generate Cert Request for TestUser45 - PASSED
cert.sh: Sign TestUser45's Request --------------------------
certutil -C -c TestCA -m 45 -v 60 -d ../CA -i req -o TestUser45.cert -f ../tests.pw 
cert.sh: #4495: Sign TestUser45's Request - PASSED
cert.sh: Import TestUser45's Cert --------------------------
certutil -A -n TestUser45 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser45.cert
cert.sh: #4496: Import TestUser45's Cert - PASSED
cert.sh SUCCESS: TestUser45's Cert Created
cert.sh: Generate EC Cert Request for TestUser45 --------------------------
certutil -s "CN=TestUser45, E=TestUser45-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4497: Generate EC Cert Request for TestUser45 - PASSED
cert.sh: Sign TestUser45's EC Request --------------------------
certutil -C -c TestCA-ec -m 45 -v 60 -d ../CA -i req -o TestUser45-ec.cert -f ../tests.pw 
cert.sh: #4498: Sign TestUser45's EC Request - PASSED
cert.sh: Import TestUser45's EC Cert --------------------------
certutil -A -n TestUser45-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser45-ec.cert
cert.sh: #4499: Import TestUser45's EC Cert - PASSED
cert.sh SUCCESS: TestUser45's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser45 --------------------------
certutil -s "CN=TestUser45, E=TestUser45-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4500: Generate mixed EC Cert Request for TestUser45 - PASSED
cert.sh: Sign TestUser45's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10045 -v 60 -d ../CA -i req -o TestUser45-ecmixed.cert -f ../tests.pw 
cert.sh: #4501: Sign TestUser45's EC Request with RSA - PASSED
cert.sh: Import TestUser45's mixed EC Cert --------------------------
certutil -A -n TestUser45-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser45-ecmixed.cert
cert.sh: #4502: Import TestUser45's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser45's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser46 --------------------------
certutil -s "CN=TestUser46, E=TestUser46@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4503: Generate Cert Request for TestUser46 - PASSED
cert.sh: Sign TestUser46's Request --------------------------
certutil -C -c TestCA -m 46 -v 60 -d ../CA -i req -o TestUser46.cert -f ../tests.pw 
cert.sh: #4504: Sign TestUser46's Request - PASSED
cert.sh: Import TestUser46's Cert --------------------------
certutil -A -n TestUser46 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser46.cert
cert.sh: #4505: Import TestUser46's Cert - PASSED
cert.sh SUCCESS: TestUser46's Cert Created
cert.sh: Generate EC Cert Request for TestUser46 --------------------------
certutil -s "CN=TestUser46, E=TestUser46-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4506: Generate EC Cert Request for TestUser46 - PASSED
cert.sh: Sign TestUser46's EC Request --------------------------
certutil -C -c TestCA-ec -m 46 -v 60 -d ../CA -i req -o TestUser46-ec.cert -f ../tests.pw 
cert.sh: #4507: Sign TestUser46's EC Request - PASSED
cert.sh: Import TestUser46's EC Cert --------------------------
certutil -A -n TestUser46-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser46-ec.cert
cert.sh: #4508: Import TestUser46's EC Cert - PASSED
cert.sh SUCCESS: TestUser46's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser46 --------------------------
certutil -s "CN=TestUser46, E=TestUser46-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4509: Generate mixed EC Cert Request for TestUser46 - PASSED
cert.sh: Sign TestUser46's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10046 -v 60 -d ../CA -i req -o TestUser46-ecmixed.cert -f ../tests.pw 
cert.sh: #4510: Sign TestUser46's EC Request with RSA - PASSED
cert.sh: Import TestUser46's mixed EC Cert --------------------------
certutil -A -n TestUser46-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser46-ecmixed.cert
cert.sh: #4511: Import TestUser46's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser46's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser47 --------------------------
certutil -s "CN=TestUser47, E=TestUser47@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4512: Generate Cert Request for TestUser47 - PASSED
cert.sh: Sign TestUser47's Request --------------------------
certutil -C -c TestCA -m 47 -v 60 -d ../CA -i req -o TestUser47.cert -f ../tests.pw 
cert.sh: #4513: Sign TestUser47's Request - PASSED
cert.sh: Import TestUser47's Cert --------------------------
certutil -A -n TestUser47 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser47.cert
cert.sh: #4514: Import TestUser47's Cert - PASSED
cert.sh SUCCESS: TestUser47's Cert Created
cert.sh: Generate EC Cert Request for TestUser47 --------------------------
certutil -s "CN=TestUser47, E=TestUser47-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4515: Generate EC Cert Request for TestUser47 - PASSED
cert.sh: Sign TestUser47's EC Request --------------------------
certutil -C -c TestCA-ec -m 47 -v 60 -d ../CA -i req -o TestUser47-ec.cert -f ../tests.pw 
cert.sh: #4516: Sign TestUser47's EC Request - PASSED
cert.sh: Import TestUser47's EC Cert --------------------------
certutil -A -n TestUser47-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser47-ec.cert
cert.sh: #4517: Import TestUser47's EC Cert - PASSED
cert.sh SUCCESS: TestUser47's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser47 --------------------------
certutil -s "CN=TestUser47, E=TestUser47-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4518: Generate mixed EC Cert Request for TestUser47 - PASSED
cert.sh: Sign TestUser47's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10047 -v 60 -d ../CA -i req -o TestUser47-ecmixed.cert -f ../tests.pw 
cert.sh: #4519: Sign TestUser47's EC Request with RSA - PASSED
cert.sh: Import TestUser47's mixed EC Cert --------------------------
certutil -A -n TestUser47-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser47-ecmixed.cert
cert.sh: #4520: Import TestUser47's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser47's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser48 --------------------------
certutil -s "CN=TestUser48, E=TestUser48@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4521: Generate Cert Request for TestUser48 - PASSED
cert.sh: Sign TestUser48's Request --------------------------
certutil -C -c TestCA -m 48 -v 60 -d ../CA -i req -o TestUser48.cert -f ../tests.pw 
cert.sh: #4522: Sign TestUser48's Request - PASSED
cert.sh: Import TestUser48's Cert --------------------------
certutil -A -n TestUser48 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser48.cert
cert.sh: #4523: Import TestUser48's Cert - PASSED
cert.sh SUCCESS: TestUser48's Cert Created
cert.sh: Generate EC Cert Request for TestUser48 --------------------------
certutil -s "CN=TestUser48, E=TestUser48-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4524: Generate EC Cert Request for TestUser48 - PASSED
cert.sh: Sign TestUser48's EC Request --------------------------
certutil -C -c TestCA-ec -m 48 -v 60 -d ../CA -i req -o TestUser48-ec.cert -f ../tests.pw 
cert.sh: #4525: Sign TestUser48's EC Request - PASSED
cert.sh: Import TestUser48's EC Cert --------------------------
certutil -A -n TestUser48-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser48-ec.cert
cert.sh: #4526: Import TestUser48's EC Cert - PASSED
cert.sh SUCCESS: TestUser48's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser48 --------------------------
certutil -s "CN=TestUser48, E=TestUser48-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4527: Generate mixed EC Cert Request for TestUser48 - PASSED
cert.sh: Sign TestUser48's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10048 -v 60 -d ../CA -i req -o TestUser48-ecmixed.cert -f ../tests.pw 
cert.sh: #4528: Sign TestUser48's EC Request with RSA - PASSED
cert.sh: Import TestUser48's mixed EC Cert --------------------------
certutil -A -n TestUser48-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser48-ecmixed.cert
cert.sh: #4529: Import TestUser48's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser48's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser49 --------------------------
certutil -s "CN=TestUser49, E=TestUser49@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4530: Generate Cert Request for TestUser49 - PASSED
cert.sh: Sign TestUser49's Request --------------------------
certutil -C -c TestCA -m 49 -v 60 -d ../CA -i req -o TestUser49.cert -f ../tests.pw 
cert.sh: #4531: Sign TestUser49's Request - PASSED
cert.sh: Import TestUser49's Cert --------------------------
certutil -A -n TestUser49 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser49.cert
cert.sh: #4532: Import TestUser49's Cert - PASSED
cert.sh SUCCESS: TestUser49's Cert Created
cert.sh: Generate EC Cert Request for TestUser49 --------------------------
certutil -s "CN=TestUser49, E=TestUser49-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4533: Generate EC Cert Request for TestUser49 - PASSED
cert.sh: Sign TestUser49's EC Request --------------------------
certutil -C -c TestCA-ec -m 49 -v 60 -d ../CA -i req -o TestUser49-ec.cert -f ../tests.pw 
cert.sh: #4534: Sign TestUser49's EC Request - PASSED
cert.sh: Import TestUser49's EC Cert --------------------------
certutil -A -n TestUser49-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser49-ec.cert
cert.sh: #4535: Import TestUser49's EC Cert - PASSED
cert.sh SUCCESS: TestUser49's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser49 --------------------------
certutil -s "CN=TestUser49, E=TestUser49-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4536: Generate mixed EC Cert Request for TestUser49 - PASSED
cert.sh: Sign TestUser49's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10049 -v 60 -d ../CA -i req -o TestUser49-ecmixed.cert -f ../tests.pw 
cert.sh: #4537: Sign TestUser49's EC Request with RSA - PASSED
cert.sh: Import TestUser49's mixed EC Cert --------------------------
certutil -A -n TestUser49-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser49-ecmixed.cert
cert.sh: #4538: Import TestUser49's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser49's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser50 --------------------------
certutil -s "CN=TestUser50, E=TestUser50@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4539: Generate Cert Request for TestUser50 - PASSED
cert.sh: Sign TestUser50's Request --------------------------
certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o TestUser50.cert -f ../tests.pw 
cert.sh: #4540: Sign TestUser50's Request - PASSED
cert.sh: Import TestUser50's Cert --------------------------
certutil -A -n TestUser50 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser50.cert
cert.sh: #4541: Import TestUser50's Cert - PASSED
cert.sh SUCCESS: TestUser50's Cert Created
cert.sh: Generate EC Cert Request for TestUser50 --------------------------
certutil -s "CN=TestUser50, E=TestUser50-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4542: Generate EC Cert Request for TestUser50 - PASSED
cert.sh: Sign TestUser50's EC Request --------------------------
certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o TestUser50-ec.cert -f ../tests.pw 
cert.sh: #4543: Sign TestUser50's EC Request - PASSED
cert.sh: Import TestUser50's EC Cert --------------------------
certutil -A -n TestUser50-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser50-ec.cert
cert.sh: #4544: Import TestUser50's EC Cert - PASSED
cert.sh SUCCESS: TestUser50's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser50 --------------------------
certutil -s "CN=TestUser50, E=TestUser50-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4545: Generate mixed EC Cert Request for TestUser50 - PASSED
cert.sh: Sign TestUser50's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o TestUser50-ecmixed.cert -f ../tests.pw 
cert.sh: #4546: Sign TestUser50's EC Request with RSA - PASSED
cert.sh: Import TestUser50's mixed EC Cert --------------------------
certutil -A -n TestUser50-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser50-ecmixed.cert
cert.sh: #4547: Import TestUser50's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser50's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser51 --------------------------
certutil -s "CN=TestUser51, E=TestUser51@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4548: Generate Cert Request for TestUser51 - PASSED
cert.sh: Sign TestUser51's Request --------------------------
certutil -C -c TestCA -m 51 -v 60 -d ../CA -i req -o TestUser51.cert -f ../tests.pw 
cert.sh: #4549: Sign TestUser51's Request - PASSED
cert.sh: Import TestUser51's Cert --------------------------
certutil -A -n TestUser51 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser51.cert
cert.sh: #4550: Import TestUser51's Cert - PASSED
cert.sh SUCCESS: TestUser51's Cert Created
cert.sh: Generate EC Cert Request for TestUser51 --------------------------
certutil -s "CN=TestUser51, E=TestUser51-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4551: Generate EC Cert Request for TestUser51 - PASSED
cert.sh: Sign TestUser51's EC Request --------------------------
certutil -C -c TestCA-ec -m 51 -v 60 -d ../CA -i req -o TestUser51-ec.cert -f ../tests.pw 
cert.sh: #4552: Sign TestUser51's EC Request - PASSED
cert.sh: Import TestUser51's EC Cert --------------------------
certutil -A -n TestUser51-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser51-ec.cert
cert.sh: #4553: Import TestUser51's EC Cert - PASSED
cert.sh SUCCESS: TestUser51's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser51 --------------------------
certutil -s "CN=TestUser51, E=TestUser51-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4554: Generate mixed EC Cert Request for TestUser51 - PASSED
cert.sh: Sign TestUser51's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10051 -v 60 -d ../CA -i req -o TestUser51-ecmixed.cert -f ../tests.pw 
cert.sh: #4555: Sign TestUser51's EC Request with RSA - PASSED
cert.sh: Import TestUser51's mixed EC Cert --------------------------
certutil -A -n TestUser51-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser51-ecmixed.cert
cert.sh: #4556: Import TestUser51's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser51's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser52 --------------------------
certutil -s "CN=TestUser52, E=TestUser52@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4557: Generate Cert Request for TestUser52 - PASSED
cert.sh: Sign TestUser52's Request --------------------------
certutil -C -c TestCA -m 52 -v 60 -d ../CA -i req -o TestUser52.cert -f ../tests.pw 
cert.sh: #4558: Sign TestUser52's Request - PASSED
cert.sh: Import TestUser52's Cert --------------------------
certutil -A -n TestUser52 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser52.cert
cert.sh: #4559: Import TestUser52's Cert - PASSED
cert.sh SUCCESS: TestUser52's Cert Created
cert.sh: Generate EC Cert Request for TestUser52 --------------------------
certutil -s "CN=TestUser52, E=TestUser52-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4560: Generate EC Cert Request for TestUser52 - PASSED
cert.sh: Sign TestUser52's EC Request --------------------------
certutil -C -c TestCA-ec -m 52 -v 60 -d ../CA -i req -o TestUser52-ec.cert -f ../tests.pw 
cert.sh: #4561: Sign TestUser52's EC Request - PASSED
cert.sh: Import TestUser52's EC Cert --------------------------
certutil -A -n TestUser52-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser52-ec.cert
cert.sh: #4562: Import TestUser52's EC Cert - PASSED
cert.sh SUCCESS: TestUser52's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser52 --------------------------
certutil -s "CN=TestUser52, E=TestUser52-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4563: Generate mixed EC Cert Request for TestUser52 - PASSED
cert.sh: Sign TestUser52's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10052 -v 60 -d ../CA -i req -o TestUser52-ecmixed.cert -f ../tests.pw 
cert.sh: #4564: Sign TestUser52's EC Request with RSA - PASSED
cert.sh: Import TestUser52's mixed EC Cert --------------------------
certutil -A -n TestUser52-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser52-ecmixed.cert
cert.sh: #4565: Import TestUser52's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser52's mixed EC Cert Created
cert.sh: Creating CA CRL =====================================
cert.sh: Generating CRL for range 40-42 TestCA authority --------------------------
crlutil -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/CA -G -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or
cert.sh: #4566: Generating CRL for range 40-42 TestCA authority - PASSED
cert.sh: Generating CRL (ECC) for range 40-42 TestCA-ec authority --------------------------
crlutil -q -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/CA -G -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or-ec
cert.sh: #4567: Generating CRL (ECC) for range 40-42 TestCA-ec authority - PASSED
cert.sh: Modifying CA CRL by adding one more cert ============
cert.sh: Modify CRL by adding one more cert --------------------------
crlutil -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or1 -i ../server/root.crl_40-42_or
cert.sh: #4568: Modify CRL by adding one more cert - PASSED
cert.sh: Modify CRL (ECC) by adding one more cert --------------------------
crlutil -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or1-ec -i ../server/root.crl_40-42_or-ec
cert.sh: #4569: Modify CRL (ECC) by adding one more cert - PASSED
cert.sh: Modifying CA CRL by removing one cert ===============
cert.sh: Modify CRL by removing one cert --------------------------
crlutil -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1
cert.sh: #4570: Modify CRL by removing one cert - PASSED
cert.sh: Modify CRL (ECC) by removing one cert --------------------------
crlutil -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42-ec -i ../server/root.crl_40-42_or1-ec
cert.sh: #4571: Modify CRL (ECC) by removing one cert - PASSED
cert.sh: Creating CA CRL for groups 1 and 2  ===============
cert.sh: Creating CRL for groups 1 and 2 --------------------------
crlutil -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_43-48 -i ../server/root.crl_40-42
cert.sh: #4572: Creating CRL for groups 1 and 2 - PASSED
cert.sh: Creating CRL (ECC) for groups 1 and 2 --------------------------
crlutil -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_43-48-ec -i ../server/root.crl_40-42-ec
cert.sh: #4573: Creating CRL (ECC) for groups 1 and 2 - PASSED
cert.sh: Creating CA CRL for groups 1, 2 and 3  ===============
cert.sh: Creating CRL for groups 1, 2 and 3 --------------------------
crlutil -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_49-52 -i ../server/root.crl_43-48
cert.sh: #4574: Creating CRL for groups 1, 2 and 3 - PASSED
cert.sh: Creating CRL (ECC) for groups 1, 2 and 3 --------------------------
crlutil -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_49-52-ec -i ../server/root.crl_43-48-ec
cert.sh: #4575: Creating CRL (ECC) for groups 1, 2 and 3 - PASSED
cert.sh: Importing Server CA Issued CRL for certs  trough 52
cert.sh: Importing CRL for groups 1 --------------------------
crlutil -q -D -n TestCA -f ../tests.pw -d ../server
crlutil: could not find TestCA's CRL: No matching CRL was found.
crlutil: could not find the issuer TestCA's CRL: No matching CRL was found.
cert.sh: #4576: Importing CRL for groups 1 - PASSED
cert.sh: Importing CRL for groups 1 --------------------------
crlutil -q -I -i ../server/root.crl_40-42 -n TestCA -f ../tests.pw -d ../server
cert.sh: #4577: Importing CRL for groups 1 - PASSED
cert.sh: Importing CRL (ECC) for groups 1 --------------------------
crlutil -q -D -n TestCA-ec -f ../tests.pw -d ../server
crlutil: could not find TestCA-ec's CRL: No matching CRL was found.
crlutil: could not find the issuer TestCA-ec's CRL: No matching CRL was found.
cert.sh: #4578: Importing CRL (ECC) for groups 1 - PASSED
cert.sh: Importing CRL (ECC) for groups 1 --------------------------
crlutil -q -I -i ../server/root.crl_40-42-ec -n TestCA-ec -f ../tests.pw -d ../server
cert.sh: #4579: Importing CRL (ECC) for groups 1 - PASSED
cert.sh SUCCESS: SSL CRL prep passed
cert.sh cert.sh: finished cert.sh
TIMESTAMP cert END: Wed Nov 28 11:07:08 EST 2012
Running tests for tools
TIMESTAMP tools BEGIN: Wed Nov 28 11:07:08 EST 2012
tools.sh: Tools Tests with ECC ===============================
tools.sh: Exporting Alice's email cert & key - default ciphers
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4580: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                26:87:24:41:c4:6a:60:a3:df:0e:9e:1a:d0:6d:9d:ad
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:20 2012
            Not After : Tue Nov 28 16:06:20 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d0:7a:19:11:89:35:7d:47:8e:d7:4d:85:b5:d0:b4:72:
                    b4:f0:24:04:30:ac:c5:8a:69:a9:d7:7a:e4:b2:96:f1:
                    a9:3d:f5:da:c9:58:87:03:80:ef:88:7c:37:16:0c:9c:
                    25:e1:70:1a:2a:28:16:d4:2d:73:88:28:8f:46:13:b4:
                    1a:28:d3:56:a2:04:a8:36:23:b8:d1:1b:05:de:83:69:
                    d6:7d:d2:6b:ce:7c:b5:86:2c:3b:51:78:be:dd:a1:e4:
                    b6:73:39:47:b6:06:a0:f3:c0:2a:95:5d:4e:46:59:0c:
                    00:bc:6a:89:34:61:e3:ed:7a:1d:1f:27:3e:da:fd:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        29:7e:a2:24:2f:69:8c:99:fa:75:2c:94:2f:ac:f1:ef:
        fb:db:99:5e:5e:e9:ea:4d:f5:c7:fb:8a:25:d8:45:da:
        ef:75:5f:03:58:05:80:4e:9b:51:4b:e2:63:53:69:44:
        5f:e4:0e:ba:82:d5:4c:f5:49:07:0a:fa:69:a2:e8:e8:
        ac:fd:2e:15:90:40:7a:2e:bd:6f:af:a9:84:7f:9d:a7:
        7b:a0:d3:7e:3b:bc:53:5d:52:53:6c:a5:c8:91:ff:31:
        01:a5:84:53:79:88:85:58:a5:d5:f2:fb:2b:71:1b:38:
        e0:91:c9:66:c8:e6:68:f5:0b:a9:6a:3e:da:83:b3:26
    Fingerprint (MD5):
        7D:09:1F:37:B4:F9:F4:1B:9F:19:DA:BC:39:3E:19:28
    Fingerprint (SHA1):
        46:69:C8:14:DA:BB:60:70:6B:97:7D:15:A8:D0:35:B9:14:E7:6E:D2

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:28 2012
            Not After : Tue Nov 28 16:06:28 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d5:ab:3f:4e:fc:36:b8:59:e0:45:9c:e5:b8:76:79:8c:
                    c7:9f:20:ca:23:43:51:d0:93:5e:ae:a1:6a:fb:13:bc:
                    68:d9:8d:9b:79:e0:90:3e:fa:80:23:1c:11:f7:3c:9c:
                    6f:55:16:ba:08:63:9c:c0:2e:78:84:ab:68:cc:5c:58:
                    a4:66:d4:7a:b2:1e:10:60:a2:c6:2e:87:6b:5f:4c:a2:
                    08:10:41:73:f2:2d:91:e0:d1:1c:cb:53:fc:15:41:ad:
                    d0:4c:ec:f1:b2:b4:23:2f:e4:73:d3:78:82:e6:6a:f2:
                    51:e0:6c:67:15:44:65:90:36:6c:98:ae:5d:ea:c1:19
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7d:58:b1:81:23:c5:f4:71:bd:0f:5a:1c:a9:b5:26:24:
        42:5e:10:63:41:b2:af:07:ce:6f:f0:76:6e:60:d1:d9:
        37:f8:17:51:1c:54:94:8a:ac:bb:e2:dd:9e:9d:78:29:
        5b:b3:1f:ef:c9:f7:89:de:4b:32:e9:89:2a:ad:cf:6a:
        d8:8b:7b:23:6d:bd:d5:08:97:31:fb:29:28:96:5a:f5:
        f6:4c:00:eb:3e:dc:d3:b3:ff:63:0c:37:d8:83:35:cc:
        85:0d:1a:1b:32:ab:cc:7d:49:da:28:b9:ec:71:01:f6:
        57:3c:f2:f4:33:1e:4f:7a:8c:21:88:dd:80:40:cb:71
    Fingerprint (MD5):
        7D:D4:D4:F3:18:BE:38:F3:E9:C2:97:63:FA:87:CB:5C
    Fingerprint (SHA1):
        B8:BD:BB:31:26:CF:2B:20:1A:58:35:89:6F:FD:68:BF:AE:F5:03:B8

    Friendly Name: Alice

tools.sh: #4581: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4582: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's email EC cert & key---------------
pk12util -o Alice-ec.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \
         -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4583: Exporting Alice's email EC cert & key (pk12util -o)  - PASSED
tools.sh: Importing Alice's email EC cert & key --------------
pk12util -i Alice-ec.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4584: Importing Alice's email EC cert & key (pk12util -i)  - PASSED
tools.sh: Listing Alice's pk12 EC file -----------------
pk12util -l Alice-ec.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice-ec

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                a5:86:2f:fe:5e:42:9c:df:99:f0:8a:0a:6c:33:41:1b
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: X9.62 ECDSA signature with SHA-1
        Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ
            ia,C=US"
        Validity:
            Not Before: Wed Nov 28 16:06:22 2012
            Not After : Tue Nov 28 16:06:22 2062
        Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor
            nia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: X9.62 elliptic curve public key
                Args:
                    06:05:2b:81:04:00:23
            EC Public Key:
                PublicValue:
                    04:00:8c:e0:d9:f7:94:69:d9:72:13:5c:ca:96:d5:f3:
                    d2:d3:97:77:ca:3a:14:3f:4f:7b:b0:d7:4d:ca:a1:ed:
                    21:98:6c:8f:eb:50:ee:3d:cb:80:8c:34:da:69:c5:db:
                    7a:2f:29:96:6c:42:5c:9d:d8:9d:5d:36:54:5c:dd:a8:
                    2b:9a:bc:00:9d:f0:75:25:c6:10:03:52:7f:3f:9b:13:
                    f7:3a:a0:52:ad:48:b8:2e:33:42:aa:3c:57:62:0e:20:
                    ea:41:ae:58:dd:c9:1a:d6:e5:a2:23:6f:c0:fe:4a:e9:
                    6c:5a:69:da:4a:3b:f5:b3:0a:a7:6f:ac:bc:98:d9:ef:
                    2f:ed:46:fc:07
                Curve: SECG elliptic curve secp521r1 (aka NIST P-521)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: X9.62 ECDSA signature with SHA-1
    Signature:
        30:81:87:02:42:01:8f:a5:27:50:7b:98:6b:04:6f:79:
        66:fc:68:35:9b:e9:27:f7:4e:d0:67:c5:90:55:40:1d:
        b6:db:ca:51:5b:13:7b:f9:d7:e0:1c:cd:25:7f:18:ba:
        fd:98:b7:54:8e:3c:9a:9a:fb:38:36:bc:20:f4:9e:51:
        c2:93:b5:39:22:96:0f:02:41:13:b2:fb:a3:8c:b5:35:
        8e:25:c3:74:82:39:98:e0:15:97:a2:3f:9f:65:51:25:
        59:1a:68:f7:eb:b0:f0:a5:fd:65:50:ce:08:f6:7f:b5:
        b4:1f:21:94:66:3c:0a:bb:37:9a:83:28:a3:2c:40:f1:
        a5:2d:9b:ab:17:5f:07:ea:65:6d
    Fingerprint (MD5):
        2C:83:D1:A6:D9:21:66:97:A6:2B:DB:72:DA:9E:AE:15
    Fingerprint (SHA1):
        5D:64:FB:BF:9A:13:AC:CA:48:68:22:88:D2:40:CB:13:1F:F8:D7:A6

    Friendly Name: TestCA-ec

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: X9.62 ECDSA signature with SHA-1
        Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ
            ia,C=US"
        Validity:
            Not Before: Wed Nov 28 16:06:28 2012
            Not After : Tue Nov 28 16:06:28 2017
        Subject: "CN=Alice,E=Alice-ec@bogus.com,O=BOGUS NSS,L=Mountain View,S
            T=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: X9.62 elliptic curve public key
                Args:
                    06:05:2b:81:04:00:22
            EC Public Key:
                PublicValue:
                    04:8d:2b:b6:4f:70:b5:79:9d:5a:d5:25:b9:d4:0f:6d:
                    2f:43:f7:56:ba:58:8e:0c:2f:a5:c4:e5:d9:c3:80:e5:
                    ab:51:63:b0:05:be:cc:2f:13:9f:5e:f1:7c:99:38:0e:
                    2c:bc:7a:bf:6d:3f:9d:e0:20:fb:9e:d5:13:6d:96:da:
                    b1:c1:2c:0c:d1:e2:70:14:f4:b5:4a:d0:c1:b6:ae:03:
                    33:c1:8b:f8:07:aa:f7:aa:2a:83:91:ea:a3:fc:eb:c1:
                    3d
                Curve: SECG elliptic curve secp384r1 (aka NIST P-384)
    Signature Algorithm: X9.62 ECDSA signature with SHA-1
    Signature:
        30:81:87:02:42:01:d1:b8:24:09:3e:42:05:60:a3:b4:
        70:cb:5f:2b:34:04:d7:ed:c0:de:b3:c7:28:13:f1:5e:
        43:07:68:90:5c:6b:54:07:17:f9:8a:48:8d:86:7b:38:
        b1:7f:10:bf:6c:86:73:4e:49:08:23:54:97:9c:9f:60:
        cc:40:b2:cf:be:0a:00:02:41:74:89:b2:1d:ec:f3:54:
        c4:bc:d2:9c:f5:e6:03:64:82:b1:9a:04:e8:2c:d2:cc:
        d2:33:da:9b:8b:28:f3:11:96:91:24:88:25:0f:91:98:
        3a:dd:55:28:26:ff:a1:93:23:e7:52:67:46:af:df:b2:
        81:78:53:b7:02:c1:22:e5:ac:06
    Fingerprint (MD5):
        E8:58:A2:0D:8F:F9:0A:DA:71:25:52:26:1F:10:5C:10
    Fingerprint (SHA1):
        40:1C:DE:84:AA:93:0A:18:F8:B3:12:F4:E6:C0:D6:11:B5:9C:FA:6C

    Friendly Name: Alice-ec

tools.sh: #4585: Listing Alice's pk12 EC file (pk12util -l)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c RC2-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4586: Exporting with [RC2-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC
        Parameters:
            Salt:
                54:d8:6e:bc:9d:5e:23:f0:f3:8d:3b:fc:db:a5:6b:4e
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:20 2012
            Not After : Tue Nov 28 16:06:20 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d0:7a:19:11:89:35:7d:47:8e:d7:4d:85:b5:d0:b4:72:
                    b4:f0:24:04:30:ac:c5:8a:69:a9:d7:7a:e4:b2:96:f1:
                    a9:3d:f5:da:c9:58:87:03:80:ef:88:7c:37:16:0c:9c:
                    25:e1:70:1a:2a:28:16:d4:2d:73:88:28:8f:46:13:b4:
                    1a:28:d3:56:a2:04:a8:36:23:b8:d1:1b:05:de:83:69:
                    d6:7d:d2:6b:ce:7c:b5:86:2c:3b:51:78:be:dd:a1:e4:
                    b6:73:39:47:b6:06:a0:f3:c0:2a:95:5d:4e:46:59:0c:
                    00:bc:6a:89:34:61:e3:ed:7a:1d:1f:27:3e:da:fd:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        29:7e:a2:24:2f:69:8c:99:fa:75:2c:94:2f:ac:f1:ef:
        fb:db:99:5e:5e:e9:ea:4d:f5:c7:fb:8a:25:d8:45:da:
        ef:75:5f:03:58:05:80:4e:9b:51:4b:e2:63:53:69:44:
        5f:e4:0e:ba:82:d5:4c:f5:49:07:0a:fa:69:a2:e8:e8:
        ac:fd:2e:15:90:40:7a:2e:bd:6f:af:a9:84:7f:9d:a7:
        7b:a0:d3:7e:3b:bc:53:5d:52:53:6c:a5:c8:91:ff:31:
        01:a5:84:53:79:88:85:58:a5:d5:f2:fb:2b:71:1b:38:
        e0:91:c9:66:c8:e6:68:f5:0b:a9:6a:3e:da:83:b3:26
    Fingerprint (MD5):
        7D:09:1F:37:B4:F9:F4:1B:9F:19:DA:BC:39:3E:19:28
    Fingerprint (SHA1):
        46:69:C8:14:DA:BB:60:70:6B:97:7D:15:A8:D0:35:B9:14:E7:6E:D2

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:28 2012
            Not After : Tue Nov 28 16:06:28 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d5:ab:3f:4e:fc:36:b8:59:e0:45:9c:e5:b8:76:79:8c:
                    c7:9f:20:ca:23:43:51:d0:93:5e:ae:a1:6a:fb:13:bc:
                    68:d9:8d:9b:79:e0:90:3e:fa:80:23:1c:11:f7:3c:9c:
                    6f:55:16:ba:08:63:9c:c0:2e:78:84:ab:68:cc:5c:58:
                    a4:66:d4:7a:b2:1e:10:60:a2:c6:2e:87:6b:5f:4c:a2:
                    08:10:41:73:f2:2d:91:e0:d1:1c:cb:53:fc:15:41:ad:
                    d0:4c:ec:f1:b2:b4:23:2f:e4:73:d3:78:82:e6:6a:f2:
                    51:e0:6c:67:15:44:65:90:36:6c:98:ae:5d:ea:c1:19
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7d:58:b1:81:23:c5:f4:71:bd:0f:5a:1c:a9:b5:26:24:
        42:5e:10:63:41:b2:af:07:ce:6f:f0:76:6e:60:d1:d9:
        37:f8:17:51:1c:54:94:8a:ac:bb:e2:dd:9e:9d:78:29:
        5b:b3:1f:ef:c9:f7:89:de:4b:32:e9:89:2a:ad:cf:6a:
        d8:8b:7b:23:6d:bd:d5:08:97:31:fb:29:28:96:5a:f5:
        f6:4c:00:eb:3e:dc:d3:b3:ff:63:0c:37:d8:83:35:cc:
        85:0d:1a:1b:32:ab:cc:7d:49:da:28:b9:ec:71:01:f6:
        57:3c:f2:f4:33:1e:4f:7a:8c:21:88:dd:80:40:cb:71
    Fingerprint (MD5):
        7D:D4:D4:F3:18:BE:38:F3:E9:C2:97:63:FA:87:CB:5C
    Fingerprint (SHA1):
        B8:BD:BB:31:26:CF:2B:20:1A:58:35:89:6F:FD:68:BF:AE:F5:03:B8

    Friendly Name: Alice

tools.sh: #4587: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4588: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c RC2-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4589: Exporting with [RC2-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC
        Parameters:
            Salt:
                be:8f:a1:11:36:86:e0:04:b9:01:09:b0:20:9c:b9:ca
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:20 2012
            Not After : Tue Nov 28 16:06:20 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d0:7a:19:11:89:35:7d:47:8e:d7:4d:85:b5:d0:b4:72:
                    b4:f0:24:04:30:ac:c5:8a:69:a9:d7:7a:e4:b2:96:f1:
                    a9:3d:f5:da:c9:58:87:03:80:ef:88:7c:37:16:0c:9c:
                    25:e1:70:1a:2a:28:16:d4:2d:73:88:28:8f:46:13:b4:
                    1a:28:d3:56:a2:04:a8:36:23:b8:d1:1b:05:de:83:69:
                    d6:7d:d2:6b:ce:7c:b5:86:2c:3b:51:78:be:dd:a1:e4:
                    b6:73:39:47:b6:06:a0:f3:c0:2a:95:5d:4e:46:59:0c:
                    00:bc:6a:89:34:61:e3:ed:7a:1d:1f:27:3e:da:fd:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        29:7e:a2:24:2f:69:8c:99:fa:75:2c:94:2f:ac:f1:ef:
        fb:db:99:5e:5e:e9:ea:4d:f5:c7:fb:8a:25:d8:45:da:
        ef:75:5f:03:58:05:80:4e:9b:51:4b:e2:63:53:69:44:
        5f:e4:0e:ba:82:d5:4c:f5:49:07:0a:fa:69:a2:e8:e8:
        ac:fd:2e:15:90:40:7a:2e:bd:6f:af:a9:84:7f:9d:a7:
        7b:a0:d3:7e:3b:bc:53:5d:52:53:6c:a5:c8:91:ff:31:
        01:a5:84:53:79:88:85:58:a5:d5:f2:fb:2b:71:1b:38:
        e0:91:c9:66:c8:e6:68:f5:0b:a9:6a:3e:da:83:b3:26
    Fingerprint (MD5):
        7D:09:1F:37:B4:F9:F4:1B:9F:19:DA:BC:39:3E:19:28
    Fingerprint (SHA1):
        46:69:C8:14:DA:BB:60:70:6B:97:7D:15:A8:D0:35:B9:14:E7:6E:D2

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:28 2012
            Not After : Tue Nov 28 16:06:28 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d5:ab:3f:4e:fc:36:b8:59:e0:45:9c:e5:b8:76:79:8c:
                    c7:9f:20:ca:23:43:51:d0:93:5e:ae:a1:6a:fb:13:bc:
                    68:d9:8d:9b:79:e0:90:3e:fa:80:23:1c:11:f7:3c:9c:
                    6f:55:16:ba:08:63:9c:c0:2e:78:84:ab:68:cc:5c:58:
                    a4:66:d4:7a:b2:1e:10:60:a2:c6:2e:87:6b:5f:4c:a2:
                    08:10:41:73:f2:2d:91:e0:d1:1c:cb:53:fc:15:41:ad:
                    d0:4c:ec:f1:b2:b4:23:2f:e4:73:d3:78:82:e6:6a:f2:
                    51:e0:6c:67:15:44:65:90:36:6c:98:ae:5d:ea:c1:19
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7d:58:b1:81:23:c5:f4:71:bd:0f:5a:1c:a9:b5:26:24:
        42:5e:10:63:41:b2:af:07:ce:6f:f0:76:6e:60:d1:d9:
        37:f8:17:51:1c:54:94:8a:ac:bb:e2:dd:9e:9d:78:29:
        5b:b3:1f:ef:c9:f7:89:de:4b:32:e9:89:2a:ad:cf:6a:
        d8:8b:7b:23:6d:bd:d5:08:97:31:fb:29:28:96:5a:f5:
        f6:4c:00:eb:3e:dc:d3:b3:ff:63:0c:37:d8:83:35:cc:
        85:0d:1a:1b:32:ab:cc:7d:49:da:28:b9:ec:71:01:f6:
        57:3c:f2:f4:33:1e:4f:7a:8c:21:88:dd:80:40:cb:71
    Fingerprint (MD5):
        7D:D4:D4:F3:18:BE:38:F3:E9:C2:97:63:FA:87:CB:5C
    Fingerprint (SHA1):
        B8:BD:BB:31:26:CF:2B:20:1A:58:35:89:6F:FD:68:BF:AE:F5:03:B8

    Friendly Name: Alice

tools.sh: #4590: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4591: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c RC2-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4592: Exporting with [RC2-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:20 2012
            Not After : Tue Nov 28 16:06:20 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d0:7a:19:11:89:35:7d:47:8e:d7:4d:85:b5:d0:b4:72:
                    b4:f0:24:04:30:ac:c5:8a:69:a9:d7:7a:e4:b2:96:f1:
                    a9:3d:f5:da:c9:58:87:03:80:ef:88:7c:37:16:0c:9c:
                    25:e1:70:1a:2a:28:16:d4:2d:73:88:28:8f:46:13:b4:
                    1a:28:d3:56:a2:04:a8:36:23:b8:d1:1b:05:de:83:69:
                    d6:7d:d2:6b:ce:7c:b5:86:2c:3b:51:78:be:dd:a1:e4:
                    b6:73:39:47:b6:06:a0:f3:c0:2a:95:5d:4e:46:59:0c:
                    00:bc:6a:89:34:61:e3:ed:7a:1d:1f:27:3e:da:fd:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        29:7e:a2:24:2f:69:8c:99:fa:75:2c:94:2f:ac:f1:ef:
        fb:db:99:5e:5e:e9:ea:4d:f5:c7:fb:8a:25:d8:45:da:
        ef:75:5f:03:58:05:80:4e:9b:51:4b:e2:63:53:69:44:
        5f:e4:0e:ba:82:d5:4c:f5:49:07:0a:fa:69:a2:e8:e8:
        ac:fd:2e:15:90:40:7a:2e:bd:6f:af:a9:84:7f:9d:a7:
        7b:a0:d3:7e:3b:bc:53:5d:52:53:6c:a5:c8:91:ff:31:
        01:a5:84:53:79:88:85:58:a5:d5:f2:fb:2b:71:1b:38:
        e0:91:c9:66:c8:e6:68:f5:0b:a9:6a:3e:da:83:b3:26
    Fingerprint (MD5):
        7D:09:1F:37:B4:F9:F4:1B:9F:19:DA:BC:39:3E:19:28
    Fingerprint (SHA1):
        46:69:C8:14:DA:BB:60:70:6B:97:7D:15:A8:D0:35:B9:14:E7:6E:D2

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:28 2012
            Not After : Tue Nov 28 16:06:28 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d5:ab:3f:4e:fc:36:b8:59:e0:45:9c:e5:b8:76:79:8c:
                    c7:9f:20:ca:23:43:51:d0:93:5e:ae:a1:6a:fb:13:bc:
                    68:d9:8d:9b:79:e0:90:3e:fa:80:23:1c:11:f7:3c:9c:
                    6f:55:16:ba:08:63:9c:c0:2e:78:84:ab:68:cc:5c:58:
                    a4:66:d4:7a:b2:1e:10:60:a2:c6:2e:87:6b:5f:4c:a2:
                    08:10:41:73:f2:2d:91:e0:d1:1c:cb:53:fc:15:41:ad:
                    d0:4c:ec:f1:b2:b4:23:2f:e4:73:d3:78:82:e6:6a:f2:
                    51:e0:6c:67:15:44:65:90:36:6c:98:ae:5d:ea:c1:19
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7d:58:b1:81:23:c5:f4:71:bd:0f:5a:1c:a9:b5:26:24:
        42:5e:10:63:41:b2:af:07:ce:6f:f0:76:6e:60:d1:d9:
        37:f8:17:51:1c:54:94:8a:ac:bb:e2:dd:9e:9d:78:29:
        5b:b3:1f:ef:c9:f7:89:de:4b:32:e9:89:2a:ad:cf:6a:
        d8:8b:7b:23:6d:bd:d5:08:97:31:fb:29:28:96:5a:f5:
        f6:4c:00:eb:3e:dc:d3:b3:ff:63:0c:37:d8:83:35:cc:
        85:0d:1a:1b:32:ab:cc:7d:49:da:28:b9:ec:71:01:f6:
        57:3c:f2:f4:33:1e:4f:7a:8c:21:88:dd:80:40:cb:71
    Fingerprint (MD5):
        7D:D4:D4:F3:18:BE:38:F3:E9:C2:97:63:FA:87:CB:5C
    Fingerprint (SHA1):
        B8:BD:BB:31:26:CF:2B:20:1A:58:35:89:6F:FD:68:BF:AE:F5:03:B8

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC
        Parameters:
            Salt:
                45:ab:9c:96:1f:a8:16:86:4a:f5:e8:1d:2f:f6:80:d5
            Iteration Count: 2000 (0x7d0)
tools.sh: #4593: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4594: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4595: Exporting with [DES-EDE3-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                1a:8f:49:6f:97:3c:9e:71:9b:0c:ea:d6:17:d1:2b:0e
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:20 2012
            Not After : Tue Nov 28 16:06:20 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d0:7a:19:11:89:35:7d:47:8e:d7:4d:85:b5:d0:b4:72:
                    b4:f0:24:04:30:ac:c5:8a:69:a9:d7:7a:e4:b2:96:f1:
                    a9:3d:f5:da:c9:58:87:03:80:ef:88:7c:37:16:0c:9c:
                    25:e1:70:1a:2a:28:16:d4:2d:73:88:28:8f:46:13:b4:
                    1a:28:d3:56:a2:04:a8:36:23:b8:d1:1b:05:de:83:69:
                    d6:7d:d2:6b:ce:7c:b5:86:2c:3b:51:78:be:dd:a1:e4:
                    b6:73:39:47:b6:06:a0:f3:c0:2a:95:5d:4e:46:59:0c:
                    00:bc:6a:89:34:61:e3:ed:7a:1d:1f:27:3e:da:fd:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        29:7e:a2:24:2f:69:8c:99:fa:75:2c:94:2f:ac:f1:ef:
        fb:db:99:5e:5e:e9:ea:4d:f5:c7:fb:8a:25:d8:45:da:
        ef:75:5f:03:58:05:80:4e:9b:51:4b:e2:63:53:69:44:
        5f:e4:0e:ba:82:d5:4c:f5:49:07:0a:fa:69:a2:e8:e8:
        ac:fd:2e:15:90:40:7a:2e:bd:6f:af:a9:84:7f:9d:a7:
        7b:a0:d3:7e:3b:bc:53:5d:52:53:6c:a5:c8:91:ff:31:
        01:a5:84:53:79:88:85:58:a5:d5:f2:fb:2b:71:1b:38:
        e0:91:c9:66:c8:e6:68:f5:0b:a9:6a:3e:da:83:b3:26
    Fingerprint (MD5):
        7D:09:1F:37:B4:F9:F4:1B:9F:19:DA:BC:39:3E:19:28
    Fingerprint (SHA1):
        46:69:C8:14:DA:BB:60:70:6B:97:7D:15:A8:D0:35:B9:14:E7:6E:D2

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:28 2012
            Not After : Tue Nov 28 16:06:28 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d5:ab:3f:4e:fc:36:b8:59:e0:45:9c:e5:b8:76:79:8c:
                    c7:9f:20:ca:23:43:51:d0:93:5e:ae:a1:6a:fb:13:bc:
                    68:d9:8d:9b:79:e0:90:3e:fa:80:23:1c:11:f7:3c:9c:
                    6f:55:16:ba:08:63:9c:c0:2e:78:84:ab:68:cc:5c:58:
                    a4:66:d4:7a:b2:1e:10:60:a2:c6:2e:87:6b:5f:4c:a2:
                    08:10:41:73:f2:2d:91:e0:d1:1c:cb:53:fc:15:41:ad:
                    d0:4c:ec:f1:b2:b4:23:2f:e4:73:d3:78:82:e6:6a:f2:
                    51:e0:6c:67:15:44:65:90:36:6c:98:ae:5d:ea:c1:19
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7d:58:b1:81:23:c5:f4:71:bd:0f:5a:1c:a9:b5:26:24:
        42:5e:10:63:41:b2:af:07:ce:6f:f0:76:6e:60:d1:d9:
        37:f8:17:51:1c:54:94:8a:ac:bb:e2:dd:9e:9d:78:29:
        5b:b3:1f:ef:c9:f7:89:de:4b:32:e9:89:2a:ad:cf:6a:
        d8:8b:7b:23:6d:bd:d5:08:97:31:fb:29:28:96:5a:f5:
        f6:4c:00:eb:3e:dc:d3:b3:ff:63:0c:37:d8:83:35:cc:
        85:0d:1a:1b:32:ab:cc:7d:49:da:28:b9:ec:71:01:f6:
        57:3c:f2:f4:33:1e:4f:7a:8c:21:88:dd:80:40:cb:71
    Fingerprint (MD5):
        7D:D4:D4:F3:18:BE:38:F3:E9:C2:97:63:FA:87:CB:5C
    Fingerprint (SHA1):
        B8:BD:BB:31:26:CF:2B:20:1A:58:35:89:6F:FD:68:BF:AE:F5:03:B8

    Friendly Name: Alice

tools.sh: #4596: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4597: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4598: Exporting with [DES-EDE3-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                a0:30:f1:47:13:3f:1b:c1:dc:e5:f2:69:5b:a0:e7:82
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:20 2012
            Not After : Tue Nov 28 16:06:20 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d0:7a:19:11:89:35:7d:47:8e:d7:4d:85:b5:d0:b4:72:
                    b4:f0:24:04:30:ac:c5:8a:69:a9:d7:7a:e4:b2:96:f1:
                    a9:3d:f5:da:c9:58:87:03:80:ef:88:7c:37:16:0c:9c:
                    25:e1:70:1a:2a:28:16:d4:2d:73:88:28:8f:46:13:b4:
                    1a:28:d3:56:a2:04:a8:36:23:b8:d1:1b:05:de:83:69:
                    d6:7d:d2:6b:ce:7c:b5:86:2c:3b:51:78:be:dd:a1:e4:
                    b6:73:39:47:b6:06:a0:f3:c0:2a:95:5d:4e:46:59:0c:
                    00:bc:6a:89:34:61:e3:ed:7a:1d:1f:27:3e:da:fd:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        29:7e:a2:24:2f:69:8c:99:fa:75:2c:94:2f:ac:f1:ef:
        fb:db:99:5e:5e:e9:ea:4d:f5:c7:fb:8a:25:d8:45:da:
        ef:75:5f:03:58:05:80:4e:9b:51:4b:e2:63:53:69:44:
        5f:e4:0e:ba:82:d5:4c:f5:49:07:0a:fa:69:a2:e8:e8:
        ac:fd:2e:15:90:40:7a:2e:bd:6f:af:a9:84:7f:9d:a7:
        7b:a0:d3:7e:3b:bc:53:5d:52:53:6c:a5:c8:91:ff:31:
        01:a5:84:53:79:88:85:58:a5:d5:f2:fb:2b:71:1b:38:
        e0:91:c9:66:c8:e6:68:f5:0b:a9:6a:3e:da:83:b3:26
    Fingerprint (MD5):
        7D:09:1F:37:B4:F9:F4:1B:9F:19:DA:BC:39:3E:19:28
    Fingerprint (SHA1):
        46:69:C8:14:DA:BB:60:70:6B:97:7D:15:A8:D0:35:B9:14:E7:6E:D2

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:28 2012
            Not After : Tue Nov 28 16:06:28 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d5:ab:3f:4e:fc:36:b8:59:e0:45:9c:e5:b8:76:79:8c:
                    c7:9f:20:ca:23:43:51:d0:93:5e:ae:a1:6a:fb:13:bc:
                    68:d9:8d:9b:79:e0:90:3e:fa:80:23:1c:11:f7:3c:9c:
                    6f:55:16:ba:08:63:9c:c0:2e:78:84:ab:68:cc:5c:58:
                    a4:66:d4:7a:b2:1e:10:60:a2:c6:2e:87:6b:5f:4c:a2:
                    08:10:41:73:f2:2d:91:e0:d1:1c:cb:53:fc:15:41:ad:
                    d0:4c:ec:f1:b2:b4:23:2f:e4:73:d3:78:82:e6:6a:f2:
                    51:e0:6c:67:15:44:65:90:36:6c:98:ae:5d:ea:c1:19
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7d:58:b1:81:23:c5:f4:71:bd:0f:5a:1c:a9:b5:26:24:
        42:5e:10:63:41:b2:af:07:ce:6f:f0:76:6e:60:d1:d9:
        37:f8:17:51:1c:54:94:8a:ac:bb:e2:dd:9e:9d:78:29:
        5b:b3:1f:ef:c9:f7:89:de:4b:32:e9:89:2a:ad:cf:6a:
        d8:8b:7b:23:6d:bd:d5:08:97:31:fb:29:28:96:5a:f5:
        f6:4c:00:eb:3e:dc:d3:b3:ff:63:0c:37:d8:83:35:cc:
        85:0d:1a:1b:32:ab:cc:7d:49:da:28:b9:ec:71:01:f6:
        57:3c:f2:f4:33:1e:4f:7a:8c:21:88:dd:80:40:cb:71
    Fingerprint (MD5):
        7D:D4:D4:F3:18:BE:38:F3:E9:C2:97:63:FA:87:CB:5C
    Fingerprint (SHA1):
        B8:BD:BB:31:26:CF:2B:20:1A:58:35:89:6F:FD:68:BF:AE:F5:03:B8

    Friendly Name: Alice

tools.sh: #4599: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4600: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4601: Exporting with [DES-EDE3-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:20 2012
            Not After : Tue Nov 28 16:06:20 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d0:7a:19:11:89:35:7d:47:8e:d7:4d:85:b5:d0:b4:72:
                    b4:f0:24:04:30:ac:c5:8a:69:a9:d7:7a:e4:b2:96:f1:
                    a9:3d:f5:da:c9:58:87:03:80:ef:88:7c:37:16:0c:9c:
                    25:e1:70:1a:2a:28:16:d4:2d:73:88:28:8f:46:13:b4:
                    1a:28:d3:56:a2:04:a8:36:23:b8:d1:1b:05:de:83:69:
                    d6:7d:d2:6b:ce:7c:b5:86:2c:3b:51:78:be:dd:a1:e4:
                    b6:73:39:47:b6:06:a0:f3:c0:2a:95:5d:4e:46:59:0c:
                    00:bc:6a:89:34:61:e3:ed:7a:1d:1f:27:3e:da:fd:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        29:7e:a2:24:2f:69:8c:99:fa:75:2c:94:2f:ac:f1:ef:
        fb:db:99:5e:5e:e9:ea:4d:f5:c7:fb:8a:25:d8:45:da:
        ef:75:5f:03:58:05:80:4e:9b:51:4b:e2:63:53:69:44:
        5f:e4:0e:ba:82:d5:4c:f5:49:07:0a:fa:69:a2:e8:e8:
        ac:fd:2e:15:90:40:7a:2e:bd:6f:af:a9:84:7f:9d:a7:
        7b:a0:d3:7e:3b:bc:53:5d:52:53:6c:a5:c8:91:ff:31:
        01:a5:84:53:79:88:85:58:a5:d5:f2:fb:2b:71:1b:38:
        e0:91:c9:66:c8:e6:68:f5:0b:a9:6a:3e:da:83:b3:26
    Fingerprint (MD5):
        7D:09:1F:37:B4:F9:F4:1B:9F:19:DA:BC:39:3E:19:28
    Fingerprint (SHA1):
        46:69:C8:14:DA:BB:60:70:6B:97:7D:15:A8:D0:35:B9:14:E7:6E:D2

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:28 2012
            Not After : Tue Nov 28 16:06:28 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d5:ab:3f:4e:fc:36:b8:59:e0:45:9c:e5:b8:76:79:8c:
                    c7:9f:20:ca:23:43:51:d0:93:5e:ae:a1:6a:fb:13:bc:
                    68:d9:8d:9b:79:e0:90:3e:fa:80:23:1c:11:f7:3c:9c:
                    6f:55:16:ba:08:63:9c:c0:2e:78:84:ab:68:cc:5c:58:
                    a4:66:d4:7a:b2:1e:10:60:a2:c6:2e:87:6b:5f:4c:a2:
                    08:10:41:73:f2:2d:91:e0:d1:1c:cb:53:fc:15:41:ad:
                    d0:4c:ec:f1:b2:b4:23:2f:e4:73:d3:78:82:e6:6a:f2:
                    51:e0:6c:67:15:44:65:90:36:6c:98:ae:5d:ea:c1:19
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7d:58:b1:81:23:c5:f4:71:bd:0f:5a:1c:a9:b5:26:24:
        42:5e:10:63:41:b2:af:07:ce:6f:f0:76:6e:60:d1:d9:
        37:f8:17:51:1c:54:94:8a:ac:bb:e2:dd:9e:9d:78:29:
        5b:b3:1f:ef:c9:f7:89:de:4b:32:e9:89:2a:ad:cf:6a:
        d8:8b:7b:23:6d:bd:d5:08:97:31:fb:29:28:96:5a:f5:
        f6:4c:00:eb:3e:dc:d3:b3:ff:63:0c:37:d8:83:35:cc:
        85:0d:1a:1b:32:ab:cc:7d:49:da:28:b9:ec:71:01:f6:
        57:3c:f2:f4:33:1e:4f:7a:8c:21:88:dd:80:40:cb:71
    Fingerprint (MD5):
        7D:D4:D4:F3:18:BE:38:F3:E9:C2:97:63:FA:87:CB:5C
    Fingerprint (SHA1):
        B8:BD:BB:31:26:CF:2B:20:1A:58:35:89:6F:FD:68:BF:AE:F5:03:B8

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                38:c5:ad:6a:45:a4:75:0e:71:85:9a:87:15:03:87:bd
            Iteration Count: 2000 (0x7d0)
tools.sh: #4602: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4603: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4604: Exporting with [AES-128-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        a5:82:99:8f:24:61:2e:f7:f8:d0:fa:d2:c4:19:47:56
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-128-CBC
                Args:
                    04:10:8c:33:1e:11:bf:90:e9:c8:a7:38:42:a2:34:d9:
                    ac:72
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:20 2012
            Not After : Tue Nov 28 16:06:20 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d0:7a:19:11:89:35:7d:47:8e:d7:4d:85:b5:d0:b4:72:
                    b4:f0:24:04:30:ac:c5:8a:69:a9:d7:7a:e4:b2:96:f1:
                    a9:3d:f5:da:c9:58:87:03:80:ef:88:7c:37:16:0c:9c:
                    25:e1:70:1a:2a:28:16:d4:2d:73:88:28:8f:46:13:b4:
                    1a:28:d3:56:a2:04:a8:36:23:b8:d1:1b:05:de:83:69:
                    d6:7d:d2:6b:ce:7c:b5:86:2c:3b:51:78:be:dd:a1:e4:
                    b6:73:39:47:b6:06:a0:f3:c0:2a:95:5d:4e:46:59:0c:
                    00:bc:6a:89:34:61:e3:ed:7a:1d:1f:27:3e:da:fd:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        29:7e:a2:24:2f:69:8c:99:fa:75:2c:94:2f:ac:f1:ef:
        fb:db:99:5e:5e:e9:ea:4d:f5:c7:fb:8a:25:d8:45:da:
        ef:75:5f:03:58:05:80:4e:9b:51:4b:e2:63:53:69:44:
        5f:e4:0e:ba:82:d5:4c:f5:49:07:0a:fa:69:a2:e8:e8:
        ac:fd:2e:15:90:40:7a:2e:bd:6f:af:a9:84:7f:9d:a7:
        7b:a0:d3:7e:3b:bc:53:5d:52:53:6c:a5:c8:91:ff:31:
        01:a5:84:53:79:88:85:58:a5:d5:f2:fb:2b:71:1b:38:
        e0:91:c9:66:c8:e6:68:f5:0b:a9:6a:3e:da:83:b3:26
    Fingerprint (MD5):
        7D:09:1F:37:B4:F9:F4:1B:9F:19:DA:BC:39:3E:19:28
    Fingerprint (SHA1):
        46:69:C8:14:DA:BB:60:70:6B:97:7D:15:A8:D0:35:B9:14:E7:6E:D2

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:28 2012
            Not After : Tue Nov 28 16:06:28 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d5:ab:3f:4e:fc:36:b8:59:e0:45:9c:e5:b8:76:79:8c:
                    c7:9f:20:ca:23:43:51:d0:93:5e:ae:a1:6a:fb:13:bc:
                    68:d9:8d:9b:79:e0:90:3e:fa:80:23:1c:11:f7:3c:9c:
                    6f:55:16:ba:08:63:9c:c0:2e:78:84:ab:68:cc:5c:58:
                    a4:66:d4:7a:b2:1e:10:60:a2:c6:2e:87:6b:5f:4c:a2:
                    08:10:41:73:f2:2d:91:e0:d1:1c:cb:53:fc:15:41:ad:
                    d0:4c:ec:f1:b2:b4:23:2f:e4:73:d3:78:82:e6:6a:f2:
                    51:e0:6c:67:15:44:65:90:36:6c:98:ae:5d:ea:c1:19
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7d:58:b1:81:23:c5:f4:71:bd:0f:5a:1c:a9:b5:26:24:
        42:5e:10:63:41:b2:af:07:ce:6f:f0:76:6e:60:d1:d9:
        37:f8:17:51:1c:54:94:8a:ac:bb:e2:dd:9e:9d:78:29:
        5b:b3:1f:ef:c9:f7:89:de:4b:32:e9:89:2a:ad:cf:6a:
        d8:8b:7b:23:6d:bd:d5:08:97:31:fb:29:28:96:5a:f5:
        f6:4c:00:eb:3e:dc:d3:b3:ff:63:0c:37:d8:83:35:cc:
        85:0d:1a:1b:32:ab:cc:7d:49:da:28:b9:ec:71:01:f6:
        57:3c:f2:f4:33:1e:4f:7a:8c:21:88:dd:80:40:cb:71
    Fingerprint (MD5):
        7D:D4:D4:F3:18:BE:38:F3:E9:C2:97:63:FA:87:CB:5C
    Fingerprint (SHA1):
        B8:BD:BB:31:26:CF:2B:20:1A:58:35:89:6F:FD:68:BF:AE:F5:03:B8

    Friendly Name: Alice

tools.sh: #4605: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4606: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4607: Exporting with [AES-128-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        3a:cc:86:3d:e4:19:f8:b9:41:90:a6:ec:fe:1f:a5:82
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-128-CBC
                Args:
                    04:10:7a:49:53:30:81:40:4d:ef:6f:81:b6:7c:0c:17:
                    7a:38
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:20 2012
            Not After : Tue Nov 28 16:06:20 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d0:7a:19:11:89:35:7d:47:8e:d7:4d:85:b5:d0:b4:72:
                    b4:f0:24:04:30:ac:c5:8a:69:a9:d7:7a:e4:b2:96:f1:
                    a9:3d:f5:da:c9:58:87:03:80:ef:88:7c:37:16:0c:9c:
                    25:e1:70:1a:2a:28:16:d4:2d:73:88:28:8f:46:13:b4:
                    1a:28:d3:56:a2:04:a8:36:23:b8:d1:1b:05:de:83:69:
                    d6:7d:d2:6b:ce:7c:b5:86:2c:3b:51:78:be:dd:a1:e4:
                    b6:73:39:47:b6:06:a0:f3:c0:2a:95:5d:4e:46:59:0c:
                    00:bc:6a:89:34:61:e3:ed:7a:1d:1f:27:3e:da:fd:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        29:7e:a2:24:2f:69:8c:99:fa:75:2c:94:2f:ac:f1:ef:
        fb:db:99:5e:5e:e9:ea:4d:f5:c7:fb:8a:25:d8:45:da:
        ef:75:5f:03:58:05:80:4e:9b:51:4b:e2:63:53:69:44:
        5f:e4:0e:ba:82:d5:4c:f5:49:07:0a:fa:69:a2:e8:e8:
        ac:fd:2e:15:90:40:7a:2e:bd:6f:af:a9:84:7f:9d:a7:
        7b:a0:d3:7e:3b:bc:53:5d:52:53:6c:a5:c8:91:ff:31:
        01:a5:84:53:79:88:85:58:a5:d5:f2:fb:2b:71:1b:38:
        e0:91:c9:66:c8:e6:68:f5:0b:a9:6a:3e:da:83:b3:26
    Fingerprint (MD5):
        7D:09:1F:37:B4:F9:F4:1B:9F:19:DA:BC:39:3E:19:28
    Fingerprint (SHA1):
        46:69:C8:14:DA:BB:60:70:6B:97:7D:15:A8:D0:35:B9:14:E7:6E:D2

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:28 2012
            Not After : Tue Nov 28 16:06:28 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d5:ab:3f:4e:fc:36:b8:59:e0:45:9c:e5:b8:76:79:8c:
                    c7:9f:20:ca:23:43:51:d0:93:5e:ae:a1:6a:fb:13:bc:
                    68:d9:8d:9b:79:e0:90:3e:fa:80:23:1c:11:f7:3c:9c:
                    6f:55:16:ba:08:63:9c:c0:2e:78:84:ab:68:cc:5c:58:
                    a4:66:d4:7a:b2:1e:10:60:a2:c6:2e:87:6b:5f:4c:a2:
                    08:10:41:73:f2:2d:91:e0:d1:1c:cb:53:fc:15:41:ad:
                    d0:4c:ec:f1:b2:b4:23:2f:e4:73:d3:78:82:e6:6a:f2:
                    51:e0:6c:67:15:44:65:90:36:6c:98:ae:5d:ea:c1:19
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7d:58:b1:81:23:c5:f4:71:bd:0f:5a:1c:a9:b5:26:24:
        42:5e:10:63:41:b2:af:07:ce:6f:f0:76:6e:60:d1:d9:
        37:f8:17:51:1c:54:94:8a:ac:bb:e2:dd:9e:9d:78:29:
        5b:b3:1f:ef:c9:f7:89:de:4b:32:e9:89:2a:ad:cf:6a:
        d8:8b:7b:23:6d:bd:d5:08:97:31:fb:29:28:96:5a:f5:
        f6:4c:00:eb:3e:dc:d3:b3:ff:63:0c:37:d8:83:35:cc:
        85:0d:1a:1b:32:ab:cc:7d:49:da:28:b9:ec:71:01:f6:
        57:3c:f2:f4:33:1e:4f:7a:8c:21:88:dd:80:40:cb:71
    Fingerprint (MD5):
        7D:D4:D4:F3:18:BE:38:F3:E9:C2:97:63:FA:87:CB:5C
    Fingerprint (SHA1):
        B8:BD:BB:31:26:CF:2B:20:1A:58:35:89:6F:FD:68:BF:AE:F5:03:B8

    Friendly Name: Alice

tools.sh: #4608: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4609: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4610: Exporting with [AES-128-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:20 2012
            Not After : Tue Nov 28 16:06:20 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d0:7a:19:11:89:35:7d:47:8e:d7:4d:85:b5:d0:b4:72:
                    b4:f0:24:04:30:ac:c5:8a:69:a9:d7:7a:e4:b2:96:f1:
                    a9:3d:f5:da:c9:58:87:03:80:ef:88:7c:37:16:0c:9c:
                    25:e1:70:1a:2a:28:16:d4:2d:73:88:28:8f:46:13:b4:
                    1a:28:d3:56:a2:04:a8:36:23:b8:d1:1b:05:de:83:69:
                    d6:7d:d2:6b:ce:7c:b5:86:2c:3b:51:78:be:dd:a1:e4:
                    b6:73:39:47:b6:06:a0:f3:c0:2a:95:5d:4e:46:59:0c:
                    00:bc:6a:89:34:61:e3:ed:7a:1d:1f:27:3e:da:fd:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        29:7e:a2:24:2f:69:8c:99:fa:75:2c:94:2f:ac:f1:ef:
        fb:db:99:5e:5e:e9:ea:4d:f5:c7:fb:8a:25:d8:45:da:
        ef:75:5f:03:58:05:80:4e:9b:51:4b:e2:63:53:69:44:
        5f:e4:0e:ba:82:d5:4c:f5:49:07:0a:fa:69:a2:e8:e8:
        ac:fd:2e:15:90:40:7a:2e:bd:6f:af:a9:84:7f:9d:a7:
        7b:a0:d3:7e:3b:bc:53:5d:52:53:6c:a5:c8:91:ff:31:
        01:a5:84:53:79:88:85:58:a5:d5:f2:fb:2b:71:1b:38:
        e0:91:c9:66:c8:e6:68:f5:0b:a9:6a:3e:da:83:b3:26
    Fingerprint (MD5):
        7D:09:1F:37:B4:F9:F4:1B:9F:19:DA:BC:39:3E:19:28
    Fingerprint (SHA1):
        46:69:C8:14:DA:BB:60:70:6B:97:7D:15:A8:D0:35:B9:14:E7:6E:D2

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:28 2012
            Not After : Tue Nov 28 16:06:28 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d5:ab:3f:4e:fc:36:b8:59:e0:45:9c:e5:b8:76:79:8c:
                    c7:9f:20:ca:23:43:51:d0:93:5e:ae:a1:6a:fb:13:bc:
                    68:d9:8d:9b:79:e0:90:3e:fa:80:23:1c:11:f7:3c:9c:
                    6f:55:16:ba:08:63:9c:c0:2e:78:84:ab:68:cc:5c:58:
                    a4:66:d4:7a:b2:1e:10:60:a2:c6:2e:87:6b:5f:4c:a2:
                    08:10:41:73:f2:2d:91:e0:d1:1c:cb:53:fc:15:41:ad:
                    d0:4c:ec:f1:b2:b4:23:2f:e4:73:d3:78:82:e6:6a:f2:
                    51:e0:6c:67:15:44:65:90:36:6c:98:ae:5d:ea:c1:19
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7d:58:b1:81:23:c5:f4:71:bd:0f:5a:1c:a9:b5:26:24:
        42:5e:10:63:41:b2:af:07:ce:6f:f0:76:6e:60:d1:d9:
        37:f8:17:51:1c:54:94:8a:ac:bb:e2:dd:9e:9d:78:29:
        5b:b3:1f:ef:c9:f7:89:de:4b:32:e9:89:2a:ad:cf:6a:
        d8:8b:7b:23:6d:bd:d5:08:97:31:fb:29:28:96:5a:f5:
        f6:4c:00:eb:3e:dc:d3:b3:ff:63:0c:37:d8:83:35:cc:
        85:0d:1a:1b:32:ab:cc:7d:49:da:28:b9:ec:71:01:f6:
        57:3c:f2:f4:33:1e:4f:7a:8c:21:88:dd:80:40:cb:71
    Fingerprint (MD5):
        7D:D4:D4:F3:18:BE:38:F3:E9:C2:97:63:FA:87:CB:5C
    Fingerprint (SHA1):
        B8:BD:BB:31:26:CF:2B:20:1A:58:35:89:6F:FD:68:BF:AE:F5:03:B8

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        e3:cb:3a:98:4f:5e:27:98:f0:37:7a:ed:c3:d6:10:f7
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-128-CBC
                Args:
                    04:10:bd:fb:27:51:36:e8:fe:f6:e4:8e:00:e2:ed:7c:
                    eb:d8
tools.sh: #4611: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4612: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4613: Exporting with [AES-192-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        dd:66:18:2e:5e:7a:5c:30:41:79:c3:74:bd:df:43:18
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-192-CBC
                Args:
                    04:10:fc:61:4b:9b:af:1b:b1:96:a3:b6:92:80:76:a0:
                    95:5a
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:20 2012
            Not After : Tue Nov 28 16:06:20 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d0:7a:19:11:89:35:7d:47:8e:d7:4d:85:b5:d0:b4:72:
                    b4:f0:24:04:30:ac:c5:8a:69:a9:d7:7a:e4:b2:96:f1:
                    a9:3d:f5:da:c9:58:87:03:80:ef:88:7c:37:16:0c:9c:
                    25:e1:70:1a:2a:28:16:d4:2d:73:88:28:8f:46:13:b4:
                    1a:28:d3:56:a2:04:a8:36:23:b8:d1:1b:05:de:83:69:
                    d6:7d:d2:6b:ce:7c:b5:86:2c:3b:51:78:be:dd:a1:e4:
                    b6:73:39:47:b6:06:a0:f3:c0:2a:95:5d:4e:46:59:0c:
                    00:bc:6a:89:34:61:e3:ed:7a:1d:1f:27:3e:da:fd:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        29:7e:a2:24:2f:69:8c:99:fa:75:2c:94:2f:ac:f1:ef:
        fb:db:99:5e:5e:e9:ea:4d:f5:c7:fb:8a:25:d8:45:da:
        ef:75:5f:03:58:05:80:4e:9b:51:4b:e2:63:53:69:44:
        5f:e4:0e:ba:82:d5:4c:f5:49:07:0a:fa:69:a2:e8:e8:
        ac:fd:2e:15:90:40:7a:2e:bd:6f:af:a9:84:7f:9d:a7:
        7b:a0:d3:7e:3b:bc:53:5d:52:53:6c:a5:c8:91:ff:31:
        01:a5:84:53:79:88:85:58:a5:d5:f2:fb:2b:71:1b:38:
        e0:91:c9:66:c8:e6:68:f5:0b:a9:6a:3e:da:83:b3:26
    Fingerprint (MD5):
        7D:09:1F:37:B4:F9:F4:1B:9F:19:DA:BC:39:3E:19:28
    Fingerprint (SHA1):
        46:69:C8:14:DA:BB:60:70:6B:97:7D:15:A8:D0:35:B9:14:E7:6E:D2

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:28 2012
            Not After : Tue Nov 28 16:06:28 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d5:ab:3f:4e:fc:36:b8:59:e0:45:9c:e5:b8:76:79:8c:
                    c7:9f:20:ca:23:43:51:d0:93:5e:ae:a1:6a:fb:13:bc:
                    68:d9:8d:9b:79:e0:90:3e:fa:80:23:1c:11:f7:3c:9c:
                    6f:55:16:ba:08:63:9c:c0:2e:78:84:ab:68:cc:5c:58:
                    a4:66:d4:7a:b2:1e:10:60:a2:c6:2e:87:6b:5f:4c:a2:
                    08:10:41:73:f2:2d:91:e0:d1:1c:cb:53:fc:15:41:ad:
                    d0:4c:ec:f1:b2:b4:23:2f:e4:73:d3:78:82:e6:6a:f2:
                    51:e0:6c:67:15:44:65:90:36:6c:98:ae:5d:ea:c1:19
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7d:58:b1:81:23:c5:f4:71:bd:0f:5a:1c:a9:b5:26:24:
        42:5e:10:63:41:b2:af:07:ce:6f:f0:76:6e:60:d1:d9:
        37:f8:17:51:1c:54:94:8a:ac:bb:e2:dd:9e:9d:78:29:
        5b:b3:1f:ef:c9:f7:89:de:4b:32:e9:89:2a:ad:cf:6a:
        d8:8b:7b:23:6d:bd:d5:08:97:31:fb:29:28:96:5a:f5:
        f6:4c:00:eb:3e:dc:d3:b3:ff:63:0c:37:d8:83:35:cc:
        85:0d:1a:1b:32:ab:cc:7d:49:da:28:b9:ec:71:01:f6:
        57:3c:f2:f4:33:1e:4f:7a:8c:21:88:dd:80:40:cb:71
    Fingerprint (MD5):
        7D:D4:D4:F3:18:BE:38:F3:E9:C2:97:63:FA:87:CB:5C
    Fingerprint (SHA1):
        B8:BD:BB:31:26:CF:2B:20:1A:58:35:89:6F:FD:68:BF:AE:F5:03:B8

    Friendly Name: Alice

tools.sh: #4614: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4615: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4616: Exporting with [AES-192-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        ec:41:3b:9e:1c:17:28:3a:55:02:b9:19:88:96:01:3c
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-192-CBC
                Args:
                    04:10:5a:8d:74:2d:c2:c8:d4:5a:7e:63:c5:54:ea:cc:
                    9d:f1
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:20 2012
            Not After : Tue Nov 28 16:06:20 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d0:7a:19:11:89:35:7d:47:8e:d7:4d:85:b5:d0:b4:72:
                    b4:f0:24:04:30:ac:c5:8a:69:a9:d7:7a:e4:b2:96:f1:
                    a9:3d:f5:da:c9:58:87:03:80:ef:88:7c:37:16:0c:9c:
                    25:e1:70:1a:2a:28:16:d4:2d:73:88:28:8f:46:13:b4:
                    1a:28:d3:56:a2:04:a8:36:23:b8:d1:1b:05:de:83:69:
                    d6:7d:d2:6b:ce:7c:b5:86:2c:3b:51:78:be:dd:a1:e4:
                    b6:73:39:47:b6:06:a0:f3:c0:2a:95:5d:4e:46:59:0c:
                    00:bc:6a:89:34:61:e3:ed:7a:1d:1f:27:3e:da:fd:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        29:7e:a2:24:2f:69:8c:99:fa:75:2c:94:2f:ac:f1:ef:
        fb:db:99:5e:5e:e9:ea:4d:f5:c7:fb:8a:25:d8:45:da:
        ef:75:5f:03:58:05:80:4e:9b:51:4b:e2:63:53:69:44:
        5f:e4:0e:ba:82:d5:4c:f5:49:07:0a:fa:69:a2:e8:e8:
        ac:fd:2e:15:90:40:7a:2e:bd:6f:af:a9:84:7f:9d:a7:
        7b:a0:d3:7e:3b:bc:53:5d:52:53:6c:a5:c8:91:ff:31:
        01:a5:84:53:79:88:85:58:a5:d5:f2:fb:2b:71:1b:38:
        e0:91:c9:66:c8:e6:68:f5:0b:a9:6a:3e:da:83:b3:26
    Fingerprint (MD5):
        7D:09:1F:37:B4:F9:F4:1B:9F:19:DA:BC:39:3E:19:28
    Fingerprint (SHA1):
        46:69:C8:14:DA:BB:60:70:6B:97:7D:15:A8:D0:35:B9:14:E7:6E:D2

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:28 2012
            Not After : Tue Nov 28 16:06:28 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d5:ab:3f:4e:fc:36:b8:59:e0:45:9c:e5:b8:76:79:8c:
                    c7:9f:20:ca:23:43:51:d0:93:5e:ae:a1:6a:fb:13:bc:
                    68:d9:8d:9b:79:e0:90:3e:fa:80:23:1c:11:f7:3c:9c:
                    6f:55:16:ba:08:63:9c:c0:2e:78:84:ab:68:cc:5c:58:
                    a4:66:d4:7a:b2:1e:10:60:a2:c6:2e:87:6b:5f:4c:a2:
                    08:10:41:73:f2:2d:91:e0:d1:1c:cb:53:fc:15:41:ad:
                    d0:4c:ec:f1:b2:b4:23:2f:e4:73:d3:78:82:e6:6a:f2:
                    51:e0:6c:67:15:44:65:90:36:6c:98:ae:5d:ea:c1:19
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7d:58:b1:81:23:c5:f4:71:bd:0f:5a:1c:a9:b5:26:24:
        42:5e:10:63:41:b2:af:07:ce:6f:f0:76:6e:60:d1:d9:
        37:f8:17:51:1c:54:94:8a:ac:bb:e2:dd:9e:9d:78:29:
        5b:b3:1f:ef:c9:f7:89:de:4b:32:e9:89:2a:ad:cf:6a:
        d8:8b:7b:23:6d:bd:d5:08:97:31:fb:29:28:96:5a:f5:
        f6:4c:00:eb:3e:dc:d3:b3:ff:63:0c:37:d8:83:35:cc:
        85:0d:1a:1b:32:ab:cc:7d:49:da:28:b9:ec:71:01:f6:
        57:3c:f2:f4:33:1e:4f:7a:8c:21:88:dd:80:40:cb:71
    Fingerprint (MD5):
        7D:D4:D4:F3:18:BE:38:F3:E9:C2:97:63:FA:87:CB:5C
    Fingerprint (SHA1):
        B8:BD:BB:31:26:CF:2B:20:1A:58:35:89:6F:FD:68:BF:AE:F5:03:B8

    Friendly Name: Alice

tools.sh: #4617: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4618: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4619: Exporting with [AES-192-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:20 2012
            Not After : Tue Nov 28 16:06:20 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d0:7a:19:11:89:35:7d:47:8e:d7:4d:85:b5:d0:b4:72:
                    b4:f0:24:04:30:ac:c5:8a:69:a9:d7:7a:e4:b2:96:f1:
                    a9:3d:f5:da:c9:58:87:03:80:ef:88:7c:37:16:0c:9c:
                    25:e1:70:1a:2a:28:16:d4:2d:73:88:28:8f:46:13:b4:
                    1a:28:d3:56:a2:04:a8:36:23:b8:d1:1b:05:de:83:69:
                    d6:7d:d2:6b:ce:7c:b5:86:2c:3b:51:78:be:dd:a1:e4:
                    b6:73:39:47:b6:06:a0:f3:c0:2a:95:5d:4e:46:59:0c:
                    00:bc:6a:89:34:61:e3:ed:7a:1d:1f:27:3e:da:fd:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        29:7e:a2:24:2f:69:8c:99:fa:75:2c:94:2f:ac:f1:ef:
        fb:db:99:5e:5e:e9:ea:4d:f5:c7:fb:8a:25:d8:45:da:
        ef:75:5f:03:58:05:80:4e:9b:51:4b:e2:63:53:69:44:
        5f:e4:0e:ba:82:d5:4c:f5:49:07:0a:fa:69:a2:e8:e8:
        ac:fd:2e:15:90:40:7a:2e:bd:6f:af:a9:84:7f:9d:a7:
        7b:a0:d3:7e:3b:bc:53:5d:52:53:6c:a5:c8:91:ff:31:
        01:a5:84:53:79:88:85:58:a5:d5:f2:fb:2b:71:1b:38:
        e0:91:c9:66:c8:e6:68:f5:0b:a9:6a:3e:da:83:b3:26
    Fingerprint (MD5):
        7D:09:1F:37:B4:F9:F4:1B:9F:19:DA:BC:39:3E:19:28
    Fingerprint (SHA1):
        46:69:C8:14:DA:BB:60:70:6B:97:7D:15:A8:D0:35:B9:14:E7:6E:D2

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:28 2012
            Not After : Tue Nov 28 16:06:28 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d5:ab:3f:4e:fc:36:b8:59:e0:45:9c:e5:b8:76:79:8c:
                    c7:9f:20:ca:23:43:51:d0:93:5e:ae:a1:6a:fb:13:bc:
                    68:d9:8d:9b:79:e0:90:3e:fa:80:23:1c:11:f7:3c:9c:
                    6f:55:16:ba:08:63:9c:c0:2e:78:84:ab:68:cc:5c:58:
                    a4:66:d4:7a:b2:1e:10:60:a2:c6:2e:87:6b:5f:4c:a2:
                    08:10:41:73:f2:2d:91:e0:d1:1c:cb:53:fc:15:41:ad:
                    d0:4c:ec:f1:b2:b4:23:2f:e4:73:d3:78:82:e6:6a:f2:
                    51:e0:6c:67:15:44:65:90:36:6c:98:ae:5d:ea:c1:19
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7d:58:b1:81:23:c5:f4:71:bd:0f:5a:1c:a9:b5:26:24:
        42:5e:10:63:41:b2:af:07:ce:6f:f0:76:6e:60:d1:d9:
        37:f8:17:51:1c:54:94:8a:ac:bb:e2:dd:9e:9d:78:29:
        5b:b3:1f:ef:c9:f7:89:de:4b:32:e9:89:2a:ad:cf:6a:
        d8:8b:7b:23:6d:bd:d5:08:97:31:fb:29:28:96:5a:f5:
        f6:4c:00:eb:3e:dc:d3:b3:ff:63:0c:37:d8:83:35:cc:
        85:0d:1a:1b:32:ab:cc:7d:49:da:28:b9:ec:71:01:f6:
        57:3c:f2:f4:33:1e:4f:7a:8c:21:88:dd:80:40:cb:71
    Fingerprint (MD5):
        7D:D4:D4:F3:18:BE:38:F3:E9:C2:97:63:FA:87:CB:5C
    Fingerprint (SHA1):
        B8:BD:BB:31:26:CF:2B:20:1A:58:35:89:6F:FD:68:BF:AE:F5:03:B8

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        ec:65:4b:38:5a:14:86:82:9e:eb:28:70:88:a5:60:3e
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-192-CBC
                Args:
                    04:10:19:b1:09:63:bd:e3:e5:2f:ca:08:8d:2a:5f:21:
                    33:29
tools.sh: #4620: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4621: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4622: Exporting with [AES-256-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        42:77:4a:c1:e5:4f:b5:d9:ad:a4:4e:75:1d:f7:d2:73
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-256-CBC
                Args:
                    04:10:03:90:fd:2d:81:e5:f7:40:9b:94:a1:bc:53:17:
                    18:59
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:20 2012
            Not After : Tue Nov 28 16:06:20 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d0:7a:19:11:89:35:7d:47:8e:d7:4d:85:b5:d0:b4:72:
                    b4:f0:24:04:30:ac:c5:8a:69:a9:d7:7a:e4:b2:96:f1:
                    a9:3d:f5:da:c9:58:87:03:80:ef:88:7c:37:16:0c:9c:
                    25:e1:70:1a:2a:28:16:d4:2d:73:88:28:8f:46:13:b4:
                    1a:28:d3:56:a2:04:a8:36:23:b8:d1:1b:05:de:83:69:
                    d6:7d:d2:6b:ce:7c:b5:86:2c:3b:51:78:be:dd:a1:e4:
                    b6:73:39:47:b6:06:a0:f3:c0:2a:95:5d:4e:46:59:0c:
                    00:bc:6a:89:34:61:e3:ed:7a:1d:1f:27:3e:da:fd:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        29:7e:a2:24:2f:69:8c:99:fa:75:2c:94:2f:ac:f1:ef:
        fb:db:99:5e:5e:e9:ea:4d:f5:c7:fb:8a:25:d8:45:da:
        ef:75:5f:03:58:05:80:4e:9b:51:4b:e2:63:53:69:44:
        5f:e4:0e:ba:82:d5:4c:f5:49:07:0a:fa:69:a2:e8:e8:
        ac:fd:2e:15:90:40:7a:2e:bd:6f:af:a9:84:7f:9d:a7:
        7b:a0:d3:7e:3b:bc:53:5d:52:53:6c:a5:c8:91:ff:31:
        01:a5:84:53:79:88:85:58:a5:d5:f2:fb:2b:71:1b:38:
        e0:91:c9:66:c8:e6:68:f5:0b:a9:6a:3e:da:83:b3:26
    Fingerprint (MD5):
        7D:09:1F:37:B4:F9:F4:1B:9F:19:DA:BC:39:3E:19:28
    Fingerprint (SHA1):
        46:69:C8:14:DA:BB:60:70:6B:97:7D:15:A8:D0:35:B9:14:E7:6E:D2

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:28 2012
            Not After : Tue Nov 28 16:06:28 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d5:ab:3f:4e:fc:36:b8:59:e0:45:9c:e5:b8:76:79:8c:
                    c7:9f:20:ca:23:43:51:d0:93:5e:ae:a1:6a:fb:13:bc:
                    68:d9:8d:9b:79:e0:90:3e:fa:80:23:1c:11:f7:3c:9c:
                    6f:55:16:ba:08:63:9c:c0:2e:78:84:ab:68:cc:5c:58:
                    a4:66:d4:7a:b2:1e:10:60:a2:c6:2e:87:6b:5f:4c:a2:
                    08:10:41:73:f2:2d:91:e0:d1:1c:cb:53:fc:15:41:ad:
                    d0:4c:ec:f1:b2:b4:23:2f:e4:73:d3:78:82:e6:6a:f2:
                    51:e0:6c:67:15:44:65:90:36:6c:98:ae:5d:ea:c1:19
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7d:58:b1:81:23:c5:f4:71:bd:0f:5a:1c:a9:b5:26:24:
        42:5e:10:63:41:b2:af:07:ce:6f:f0:76:6e:60:d1:d9:
        37:f8:17:51:1c:54:94:8a:ac:bb:e2:dd:9e:9d:78:29:
        5b:b3:1f:ef:c9:f7:89:de:4b:32:e9:89:2a:ad:cf:6a:
        d8:8b:7b:23:6d:bd:d5:08:97:31:fb:29:28:96:5a:f5:
        f6:4c:00:eb:3e:dc:d3:b3:ff:63:0c:37:d8:83:35:cc:
        85:0d:1a:1b:32:ab:cc:7d:49:da:28:b9:ec:71:01:f6:
        57:3c:f2:f4:33:1e:4f:7a:8c:21:88:dd:80:40:cb:71
    Fingerprint (MD5):
        7D:D4:D4:F3:18:BE:38:F3:E9:C2:97:63:FA:87:CB:5C
    Fingerprint (SHA1):
        B8:BD:BB:31:26:CF:2B:20:1A:58:35:89:6F:FD:68:BF:AE:F5:03:B8

    Friendly Name: Alice

tools.sh: #4623: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4624: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4625: Exporting with [AES-256-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        b6:cf:21:42:c5:2c:ff:e7:0f:ee:e0:47:53:df:a3:77
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-256-CBC
                Args:
                    04:10:46:ad:ad:92:ab:87:12:85:bd:ed:18:8c:06:98:
                    44:af
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:20 2012
            Not After : Tue Nov 28 16:06:20 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d0:7a:19:11:89:35:7d:47:8e:d7:4d:85:b5:d0:b4:72:
                    b4:f0:24:04:30:ac:c5:8a:69:a9:d7:7a:e4:b2:96:f1:
                    a9:3d:f5:da:c9:58:87:03:80:ef:88:7c:37:16:0c:9c:
                    25:e1:70:1a:2a:28:16:d4:2d:73:88:28:8f:46:13:b4:
                    1a:28:d3:56:a2:04:a8:36:23:b8:d1:1b:05:de:83:69:
                    d6:7d:d2:6b:ce:7c:b5:86:2c:3b:51:78:be:dd:a1:e4:
                    b6:73:39:47:b6:06:a0:f3:c0:2a:95:5d:4e:46:59:0c:
                    00:bc:6a:89:34:61:e3:ed:7a:1d:1f:27:3e:da:fd:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        29:7e:a2:24:2f:69:8c:99:fa:75:2c:94:2f:ac:f1:ef:
        fb:db:99:5e:5e:e9:ea:4d:f5:c7:fb:8a:25:d8:45:da:
        ef:75:5f:03:58:05:80:4e:9b:51:4b:e2:63:53:69:44:
        5f:e4:0e:ba:82:d5:4c:f5:49:07:0a:fa:69:a2:e8:e8:
        ac:fd:2e:15:90:40:7a:2e:bd:6f:af:a9:84:7f:9d:a7:
        7b:a0:d3:7e:3b:bc:53:5d:52:53:6c:a5:c8:91:ff:31:
        01:a5:84:53:79:88:85:58:a5:d5:f2:fb:2b:71:1b:38:
        e0:91:c9:66:c8:e6:68:f5:0b:a9:6a:3e:da:83:b3:26
    Fingerprint (MD5):
        7D:09:1F:37:B4:F9:F4:1B:9F:19:DA:BC:39:3E:19:28
    Fingerprint (SHA1):
        46:69:C8:14:DA:BB:60:70:6B:97:7D:15:A8:D0:35:B9:14:E7:6E:D2

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:28 2012
            Not After : Tue Nov 28 16:06:28 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d5:ab:3f:4e:fc:36:b8:59:e0:45:9c:e5:b8:76:79:8c:
                    c7:9f:20:ca:23:43:51:d0:93:5e:ae:a1:6a:fb:13:bc:
                    68:d9:8d:9b:79:e0:90:3e:fa:80:23:1c:11:f7:3c:9c:
                    6f:55:16:ba:08:63:9c:c0:2e:78:84:ab:68:cc:5c:58:
                    a4:66:d4:7a:b2:1e:10:60:a2:c6:2e:87:6b:5f:4c:a2:
                    08:10:41:73:f2:2d:91:e0:d1:1c:cb:53:fc:15:41:ad:
                    d0:4c:ec:f1:b2:b4:23:2f:e4:73:d3:78:82:e6:6a:f2:
                    51:e0:6c:67:15:44:65:90:36:6c:98:ae:5d:ea:c1:19
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7d:58:b1:81:23:c5:f4:71:bd:0f:5a:1c:a9:b5:26:24:
        42:5e:10:63:41:b2:af:07:ce:6f:f0:76:6e:60:d1:d9:
        37:f8:17:51:1c:54:94:8a:ac:bb:e2:dd:9e:9d:78:29:
        5b:b3:1f:ef:c9:f7:89:de:4b:32:e9:89:2a:ad:cf:6a:
        d8:8b:7b:23:6d:bd:d5:08:97:31:fb:29:28:96:5a:f5:
        f6:4c:00:eb:3e:dc:d3:b3:ff:63:0c:37:d8:83:35:cc:
        85:0d:1a:1b:32:ab:cc:7d:49:da:28:b9:ec:71:01:f6:
        57:3c:f2:f4:33:1e:4f:7a:8c:21:88:dd:80:40:cb:71
    Fingerprint (MD5):
        7D:D4:D4:F3:18:BE:38:F3:E9:C2:97:63:FA:87:CB:5C
    Fingerprint (SHA1):
        B8:BD:BB:31:26:CF:2B:20:1A:58:35:89:6F:FD:68:BF:AE:F5:03:B8

    Friendly Name: Alice

tools.sh: #4626: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4627: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4628: Exporting with [AES-256-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:20 2012
            Not After : Tue Nov 28 16:06:20 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d0:7a:19:11:89:35:7d:47:8e:d7:4d:85:b5:d0:b4:72:
                    b4:f0:24:04:30:ac:c5:8a:69:a9:d7:7a:e4:b2:96:f1:
                    a9:3d:f5:da:c9:58:87:03:80:ef:88:7c:37:16:0c:9c:
                    25:e1:70:1a:2a:28:16:d4:2d:73:88:28:8f:46:13:b4:
                    1a:28:d3:56:a2:04:a8:36:23:b8:d1:1b:05:de:83:69:
                    d6:7d:d2:6b:ce:7c:b5:86:2c:3b:51:78:be:dd:a1:e4:
                    b6:73:39:47:b6:06:a0:f3:c0:2a:95:5d:4e:46:59:0c:
                    00:bc:6a:89:34:61:e3:ed:7a:1d:1f:27:3e:da:fd:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        29:7e:a2:24:2f:69:8c:99:fa:75:2c:94:2f:ac:f1:ef:
        fb:db:99:5e:5e:e9:ea:4d:f5:c7:fb:8a:25:d8:45:da:
        ef:75:5f:03:58:05:80:4e:9b:51:4b:e2:63:53:69:44:
        5f:e4:0e:ba:82:d5:4c:f5:49:07:0a:fa:69:a2:e8:e8:
        ac:fd:2e:15:90:40:7a:2e:bd:6f:af:a9:84:7f:9d:a7:
        7b:a0:d3:7e:3b:bc:53:5d:52:53:6c:a5:c8:91:ff:31:
        01:a5:84:53:79:88:85:58:a5:d5:f2:fb:2b:71:1b:38:
        e0:91:c9:66:c8:e6:68:f5:0b:a9:6a:3e:da:83:b3:26
    Fingerprint (MD5):
        7D:09:1F:37:B4:F9:F4:1B:9F:19:DA:BC:39:3E:19:28
    Fingerprint (SHA1):
        46:69:C8:14:DA:BB:60:70:6B:97:7D:15:A8:D0:35:B9:14:E7:6E:D2

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:28 2012
            Not After : Tue Nov 28 16:06:28 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d5:ab:3f:4e:fc:36:b8:59:e0:45:9c:e5:b8:76:79:8c:
                    c7:9f:20:ca:23:43:51:d0:93:5e:ae:a1:6a:fb:13:bc:
                    68:d9:8d:9b:79:e0:90:3e:fa:80:23:1c:11:f7:3c:9c:
                    6f:55:16:ba:08:63:9c:c0:2e:78:84:ab:68:cc:5c:58:
                    a4:66:d4:7a:b2:1e:10:60:a2:c6:2e:87:6b:5f:4c:a2:
                    08:10:41:73:f2:2d:91:e0:d1:1c:cb:53:fc:15:41:ad:
                    d0:4c:ec:f1:b2:b4:23:2f:e4:73:d3:78:82:e6:6a:f2:
                    51:e0:6c:67:15:44:65:90:36:6c:98:ae:5d:ea:c1:19
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7d:58:b1:81:23:c5:f4:71:bd:0f:5a:1c:a9:b5:26:24:
        42:5e:10:63:41:b2:af:07:ce:6f:f0:76:6e:60:d1:d9:
        37:f8:17:51:1c:54:94:8a:ac:bb:e2:dd:9e:9d:78:29:
        5b:b3:1f:ef:c9:f7:89:de:4b:32:e9:89:2a:ad:cf:6a:
        d8:8b:7b:23:6d:bd:d5:08:97:31:fb:29:28:96:5a:f5:
        f6:4c:00:eb:3e:dc:d3:b3:ff:63:0c:37:d8:83:35:cc:
        85:0d:1a:1b:32:ab:cc:7d:49:da:28:b9:ec:71:01:f6:
        57:3c:f2:f4:33:1e:4f:7a:8c:21:88:dd:80:40:cb:71
    Fingerprint (MD5):
        7D:D4:D4:F3:18:BE:38:F3:E9:C2:97:63:FA:87:CB:5C
    Fingerprint (SHA1):
        B8:BD:BB:31:26:CF:2B:20:1A:58:35:89:6F:FD:68:BF:AE:F5:03:B8

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        7f:49:47:66:08:d8:c1:85:d6:0c:ca:24:4f:30:c9:09
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-256-CBC
                Args:
                    04:10:bf:fe:d9:90:7e:e4:20:b2:48:6b:f8:be:0a:59:
                    b9:dd
tools.sh: #4629: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4630: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4631: Exporting with [CAMELLIA-128-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        f7:a5:13:d3:7d:b7:f1:d8:c6:6f:7d:0c:ea:5b:23:29
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-128-CBC
                Args:
                    04:10:08:2b:be:f3:8a:35:a1:38:bd:5c:6a:87:c0:16:
                    e4:64
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:20 2012
            Not After : Tue Nov 28 16:06:20 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d0:7a:19:11:89:35:7d:47:8e:d7:4d:85:b5:d0:b4:72:
                    b4:f0:24:04:30:ac:c5:8a:69:a9:d7:7a:e4:b2:96:f1:
                    a9:3d:f5:da:c9:58:87:03:80:ef:88:7c:37:16:0c:9c:
                    25:e1:70:1a:2a:28:16:d4:2d:73:88:28:8f:46:13:b4:
                    1a:28:d3:56:a2:04:a8:36:23:b8:d1:1b:05:de:83:69:
                    d6:7d:d2:6b:ce:7c:b5:86:2c:3b:51:78:be:dd:a1:e4:
                    b6:73:39:47:b6:06:a0:f3:c0:2a:95:5d:4e:46:59:0c:
                    00:bc:6a:89:34:61:e3:ed:7a:1d:1f:27:3e:da:fd:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        29:7e:a2:24:2f:69:8c:99:fa:75:2c:94:2f:ac:f1:ef:
        fb:db:99:5e:5e:e9:ea:4d:f5:c7:fb:8a:25:d8:45:da:
        ef:75:5f:03:58:05:80:4e:9b:51:4b:e2:63:53:69:44:
        5f:e4:0e:ba:82:d5:4c:f5:49:07:0a:fa:69:a2:e8:e8:
        ac:fd:2e:15:90:40:7a:2e:bd:6f:af:a9:84:7f:9d:a7:
        7b:a0:d3:7e:3b:bc:53:5d:52:53:6c:a5:c8:91:ff:31:
        01:a5:84:53:79:88:85:58:a5:d5:f2:fb:2b:71:1b:38:
        e0:91:c9:66:c8:e6:68:f5:0b:a9:6a:3e:da:83:b3:26
    Fingerprint (MD5):
        7D:09:1F:37:B4:F9:F4:1B:9F:19:DA:BC:39:3E:19:28
    Fingerprint (SHA1):
        46:69:C8:14:DA:BB:60:70:6B:97:7D:15:A8:D0:35:B9:14:E7:6E:D2

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:28 2012
            Not After : Tue Nov 28 16:06:28 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d5:ab:3f:4e:fc:36:b8:59:e0:45:9c:e5:b8:76:79:8c:
                    c7:9f:20:ca:23:43:51:d0:93:5e:ae:a1:6a:fb:13:bc:
                    68:d9:8d:9b:79:e0:90:3e:fa:80:23:1c:11:f7:3c:9c:
                    6f:55:16:ba:08:63:9c:c0:2e:78:84:ab:68:cc:5c:58:
                    a4:66:d4:7a:b2:1e:10:60:a2:c6:2e:87:6b:5f:4c:a2:
                    08:10:41:73:f2:2d:91:e0:d1:1c:cb:53:fc:15:41:ad:
                    d0:4c:ec:f1:b2:b4:23:2f:e4:73:d3:78:82:e6:6a:f2:
                    51:e0:6c:67:15:44:65:90:36:6c:98:ae:5d:ea:c1:19
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7d:58:b1:81:23:c5:f4:71:bd:0f:5a:1c:a9:b5:26:24:
        42:5e:10:63:41:b2:af:07:ce:6f:f0:76:6e:60:d1:d9:
        37:f8:17:51:1c:54:94:8a:ac:bb:e2:dd:9e:9d:78:29:
        5b:b3:1f:ef:c9:f7:89:de:4b:32:e9:89:2a:ad:cf:6a:
        d8:8b:7b:23:6d:bd:d5:08:97:31:fb:29:28:96:5a:f5:
        f6:4c:00:eb:3e:dc:d3:b3:ff:63:0c:37:d8:83:35:cc:
        85:0d:1a:1b:32:ab:cc:7d:49:da:28:b9:ec:71:01:f6:
        57:3c:f2:f4:33:1e:4f:7a:8c:21:88:dd:80:40:cb:71
    Fingerprint (MD5):
        7D:D4:D4:F3:18:BE:38:F3:E9:C2:97:63:FA:87:CB:5C
    Fingerprint (SHA1):
        B8:BD:BB:31:26:CF:2B:20:1A:58:35:89:6F:FD:68:BF:AE:F5:03:B8

    Friendly Name: Alice

tools.sh: #4632: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4633: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4634: Exporting with [CAMELLIA-128-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        e4:34:3d:5d:53:d0:e6:b3:04:e5:68:dc:a6:c1:c6:6d
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-128-CBC
                Args:
                    04:10:7e:47:7c:36:75:29:d7:81:2e:81:34:0d:6e:bc:
                    59:11
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:20 2012
            Not After : Tue Nov 28 16:06:20 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d0:7a:19:11:89:35:7d:47:8e:d7:4d:85:b5:d0:b4:72:
                    b4:f0:24:04:30:ac:c5:8a:69:a9:d7:7a:e4:b2:96:f1:
                    a9:3d:f5:da:c9:58:87:03:80:ef:88:7c:37:16:0c:9c:
                    25:e1:70:1a:2a:28:16:d4:2d:73:88:28:8f:46:13:b4:
                    1a:28:d3:56:a2:04:a8:36:23:b8:d1:1b:05:de:83:69:
                    d6:7d:d2:6b:ce:7c:b5:86:2c:3b:51:78:be:dd:a1:e4:
                    b6:73:39:47:b6:06:a0:f3:c0:2a:95:5d:4e:46:59:0c:
                    00:bc:6a:89:34:61:e3:ed:7a:1d:1f:27:3e:da:fd:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        29:7e:a2:24:2f:69:8c:99:fa:75:2c:94:2f:ac:f1:ef:
        fb:db:99:5e:5e:e9:ea:4d:f5:c7:fb:8a:25:d8:45:da:
        ef:75:5f:03:58:05:80:4e:9b:51:4b:e2:63:53:69:44:
        5f:e4:0e:ba:82:d5:4c:f5:49:07:0a:fa:69:a2:e8:e8:
        ac:fd:2e:15:90:40:7a:2e:bd:6f:af:a9:84:7f:9d:a7:
        7b:a0:d3:7e:3b:bc:53:5d:52:53:6c:a5:c8:91:ff:31:
        01:a5:84:53:79:88:85:58:a5:d5:f2:fb:2b:71:1b:38:
        e0:91:c9:66:c8:e6:68:f5:0b:a9:6a:3e:da:83:b3:26
    Fingerprint (MD5):
        7D:09:1F:37:B4:F9:F4:1B:9F:19:DA:BC:39:3E:19:28
    Fingerprint (SHA1):
        46:69:C8:14:DA:BB:60:70:6B:97:7D:15:A8:D0:35:B9:14:E7:6E:D2

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:28 2012
            Not After : Tue Nov 28 16:06:28 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d5:ab:3f:4e:fc:36:b8:59:e0:45:9c:e5:b8:76:79:8c:
                    c7:9f:20:ca:23:43:51:d0:93:5e:ae:a1:6a:fb:13:bc:
                    68:d9:8d:9b:79:e0:90:3e:fa:80:23:1c:11:f7:3c:9c:
                    6f:55:16:ba:08:63:9c:c0:2e:78:84:ab:68:cc:5c:58:
                    a4:66:d4:7a:b2:1e:10:60:a2:c6:2e:87:6b:5f:4c:a2:
                    08:10:41:73:f2:2d:91:e0:d1:1c:cb:53:fc:15:41:ad:
                    d0:4c:ec:f1:b2:b4:23:2f:e4:73:d3:78:82:e6:6a:f2:
                    51:e0:6c:67:15:44:65:90:36:6c:98:ae:5d:ea:c1:19
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7d:58:b1:81:23:c5:f4:71:bd:0f:5a:1c:a9:b5:26:24:
        42:5e:10:63:41:b2:af:07:ce:6f:f0:76:6e:60:d1:d9:
        37:f8:17:51:1c:54:94:8a:ac:bb:e2:dd:9e:9d:78:29:
        5b:b3:1f:ef:c9:f7:89:de:4b:32:e9:89:2a:ad:cf:6a:
        d8:8b:7b:23:6d:bd:d5:08:97:31:fb:29:28:96:5a:f5:
        f6:4c:00:eb:3e:dc:d3:b3:ff:63:0c:37:d8:83:35:cc:
        85:0d:1a:1b:32:ab:cc:7d:49:da:28:b9:ec:71:01:f6:
        57:3c:f2:f4:33:1e:4f:7a:8c:21:88:dd:80:40:cb:71
    Fingerprint (MD5):
        7D:D4:D4:F3:18:BE:38:F3:E9:C2:97:63:FA:87:CB:5C
    Fingerprint (SHA1):
        B8:BD:BB:31:26:CF:2B:20:1A:58:35:89:6F:FD:68:BF:AE:F5:03:B8

    Friendly Name: Alice

tools.sh: #4635: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4636: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4637: Exporting with [CAMELLIA-128-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:20 2012
            Not After : Tue Nov 28 16:06:20 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d0:7a:19:11:89:35:7d:47:8e:d7:4d:85:b5:d0:b4:72:
                    b4:f0:24:04:30:ac:c5:8a:69:a9:d7:7a:e4:b2:96:f1:
                    a9:3d:f5:da:c9:58:87:03:80:ef:88:7c:37:16:0c:9c:
                    25:e1:70:1a:2a:28:16:d4:2d:73:88:28:8f:46:13:b4:
                    1a:28:d3:56:a2:04:a8:36:23:b8:d1:1b:05:de:83:69:
                    d6:7d:d2:6b:ce:7c:b5:86:2c:3b:51:78:be:dd:a1:e4:
                    b6:73:39:47:b6:06:a0:f3:c0:2a:95:5d:4e:46:59:0c:
                    00:bc:6a:89:34:61:e3:ed:7a:1d:1f:27:3e:da:fd:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        29:7e:a2:24:2f:69:8c:99:fa:75:2c:94:2f:ac:f1:ef:
        fb:db:99:5e:5e:e9:ea:4d:f5:c7:fb:8a:25:d8:45:da:
        ef:75:5f:03:58:05:80:4e:9b:51:4b:e2:63:53:69:44:
        5f:e4:0e:ba:82:d5:4c:f5:49:07:0a:fa:69:a2:e8:e8:
        ac:fd:2e:15:90:40:7a:2e:bd:6f:af:a9:84:7f:9d:a7:
        7b:a0:d3:7e:3b:bc:53:5d:52:53:6c:a5:c8:91:ff:31:
        01:a5:84:53:79:88:85:58:a5:d5:f2:fb:2b:71:1b:38:
        e0:91:c9:66:c8:e6:68:f5:0b:a9:6a:3e:da:83:b3:26
    Fingerprint (MD5):
        7D:09:1F:37:B4:F9:F4:1B:9F:19:DA:BC:39:3E:19:28
    Fingerprint (SHA1):
        46:69:C8:14:DA:BB:60:70:6B:97:7D:15:A8:D0:35:B9:14:E7:6E:D2

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:28 2012
            Not After : Tue Nov 28 16:06:28 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d5:ab:3f:4e:fc:36:b8:59:e0:45:9c:e5:b8:76:79:8c:
                    c7:9f:20:ca:23:43:51:d0:93:5e:ae:a1:6a:fb:13:bc:
                    68:d9:8d:9b:79:e0:90:3e:fa:80:23:1c:11:f7:3c:9c:
                    6f:55:16:ba:08:63:9c:c0:2e:78:84:ab:68:cc:5c:58:
                    a4:66:d4:7a:b2:1e:10:60:a2:c6:2e:87:6b:5f:4c:a2:
                    08:10:41:73:f2:2d:91:e0:d1:1c:cb:53:fc:15:41:ad:
                    d0:4c:ec:f1:b2:b4:23:2f:e4:73:d3:78:82:e6:6a:f2:
                    51:e0:6c:67:15:44:65:90:36:6c:98:ae:5d:ea:c1:19
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7d:58:b1:81:23:c5:f4:71:bd:0f:5a:1c:a9:b5:26:24:
        42:5e:10:63:41:b2:af:07:ce:6f:f0:76:6e:60:d1:d9:
        37:f8:17:51:1c:54:94:8a:ac:bb:e2:dd:9e:9d:78:29:
        5b:b3:1f:ef:c9:f7:89:de:4b:32:e9:89:2a:ad:cf:6a:
        d8:8b:7b:23:6d:bd:d5:08:97:31:fb:29:28:96:5a:f5:
        f6:4c:00:eb:3e:dc:d3:b3:ff:63:0c:37:d8:83:35:cc:
        85:0d:1a:1b:32:ab:cc:7d:49:da:28:b9:ec:71:01:f6:
        57:3c:f2:f4:33:1e:4f:7a:8c:21:88:dd:80:40:cb:71
    Fingerprint (MD5):
        7D:D4:D4:F3:18:BE:38:F3:E9:C2:97:63:FA:87:CB:5C
    Fingerprint (SHA1):
        B8:BD:BB:31:26:CF:2B:20:1A:58:35:89:6F:FD:68:BF:AE:F5:03:B8

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        e0:78:c7:32:a0:b4:63:c8:24:1a:a3:99:2d:57:72:dc
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-128-CBC
                Args:
                    04:10:24:25:c6:dc:b8:e8:ef:c7:f7:f3:90:71:66:87:
                    0b:22
tools.sh: #4638: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4639: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4640: Exporting with [CAMELLIA-192-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        3c:c5:f0:68:1a:5c:b5:9e:eb:4f:33:85:95:57:a4:5f
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-192-CBC
                Args:
                    04:10:36:1c:75:61:dd:47:32:88:58:41:5c:d9:ff:9f:
                    3d:b7
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:20 2012
            Not After : Tue Nov 28 16:06:20 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d0:7a:19:11:89:35:7d:47:8e:d7:4d:85:b5:d0:b4:72:
                    b4:f0:24:04:30:ac:c5:8a:69:a9:d7:7a:e4:b2:96:f1:
                    a9:3d:f5:da:c9:58:87:03:80:ef:88:7c:37:16:0c:9c:
                    25:e1:70:1a:2a:28:16:d4:2d:73:88:28:8f:46:13:b4:
                    1a:28:d3:56:a2:04:a8:36:23:b8:d1:1b:05:de:83:69:
                    d6:7d:d2:6b:ce:7c:b5:86:2c:3b:51:78:be:dd:a1:e4:
                    b6:73:39:47:b6:06:a0:f3:c0:2a:95:5d:4e:46:59:0c:
                    00:bc:6a:89:34:61:e3:ed:7a:1d:1f:27:3e:da:fd:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        29:7e:a2:24:2f:69:8c:99:fa:75:2c:94:2f:ac:f1:ef:
        fb:db:99:5e:5e:e9:ea:4d:f5:c7:fb:8a:25:d8:45:da:
        ef:75:5f:03:58:05:80:4e:9b:51:4b:e2:63:53:69:44:
        5f:e4:0e:ba:82:d5:4c:f5:49:07:0a:fa:69:a2:e8:e8:
        ac:fd:2e:15:90:40:7a:2e:bd:6f:af:a9:84:7f:9d:a7:
        7b:a0:d3:7e:3b:bc:53:5d:52:53:6c:a5:c8:91:ff:31:
        01:a5:84:53:79:88:85:58:a5:d5:f2:fb:2b:71:1b:38:
        e0:91:c9:66:c8:e6:68:f5:0b:a9:6a:3e:da:83:b3:26
    Fingerprint (MD5):
        7D:09:1F:37:B4:F9:F4:1B:9F:19:DA:BC:39:3E:19:28
    Fingerprint (SHA1):
        46:69:C8:14:DA:BB:60:70:6B:97:7D:15:A8:D0:35:B9:14:E7:6E:D2

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:28 2012
            Not After : Tue Nov 28 16:06:28 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d5:ab:3f:4e:fc:36:b8:59:e0:45:9c:e5:b8:76:79:8c:
                    c7:9f:20:ca:23:43:51:d0:93:5e:ae:a1:6a:fb:13:bc:
                    68:d9:8d:9b:79:e0:90:3e:fa:80:23:1c:11:f7:3c:9c:
                    6f:55:16:ba:08:63:9c:c0:2e:78:84:ab:68:cc:5c:58:
                    a4:66:d4:7a:b2:1e:10:60:a2:c6:2e:87:6b:5f:4c:a2:
                    08:10:41:73:f2:2d:91:e0:d1:1c:cb:53:fc:15:41:ad:
                    d0:4c:ec:f1:b2:b4:23:2f:e4:73:d3:78:82:e6:6a:f2:
                    51:e0:6c:67:15:44:65:90:36:6c:98:ae:5d:ea:c1:19
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7d:58:b1:81:23:c5:f4:71:bd:0f:5a:1c:a9:b5:26:24:
        42:5e:10:63:41:b2:af:07:ce:6f:f0:76:6e:60:d1:d9:
        37:f8:17:51:1c:54:94:8a:ac:bb:e2:dd:9e:9d:78:29:
        5b:b3:1f:ef:c9:f7:89:de:4b:32:e9:89:2a:ad:cf:6a:
        d8:8b:7b:23:6d:bd:d5:08:97:31:fb:29:28:96:5a:f5:
        f6:4c:00:eb:3e:dc:d3:b3:ff:63:0c:37:d8:83:35:cc:
        85:0d:1a:1b:32:ab:cc:7d:49:da:28:b9:ec:71:01:f6:
        57:3c:f2:f4:33:1e:4f:7a:8c:21:88:dd:80:40:cb:71
    Fingerprint (MD5):
        7D:D4:D4:F3:18:BE:38:F3:E9:C2:97:63:FA:87:CB:5C
    Fingerprint (SHA1):
        B8:BD:BB:31:26:CF:2B:20:1A:58:35:89:6F:FD:68:BF:AE:F5:03:B8

    Friendly Name: Alice

tools.sh: #4641: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4642: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4643: Exporting with [CAMELLIA-192-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        d9:dc:69:7a:f1:5e:b0:97:20:64:2e:05:b3:01:a8:f2
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-192-CBC
                Args:
                    04:10:4b:ea:d2:a3:5a:39:b8:c7:a7:65:43:e6:98:42:
                    30:52
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:20 2012
            Not After : Tue Nov 28 16:06:20 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d0:7a:19:11:89:35:7d:47:8e:d7:4d:85:b5:d0:b4:72:
                    b4:f0:24:04:30:ac:c5:8a:69:a9:d7:7a:e4:b2:96:f1:
                    a9:3d:f5:da:c9:58:87:03:80:ef:88:7c:37:16:0c:9c:
                    25:e1:70:1a:2a:28:16:d4:2d:73:88:28:8f:46:13:b4:
                    1a:28:d3:56:a2:04:a8:36:23:b8:d1:1b:05:de:83:69:
                    d6:7d:d2:6b:ce:7c:b5:86:2c:3b:51:78:be:dd:a1:e4:
                    b6:73:39:47:b6:06:a0:f3:c0:2a:95:5d:4e:46:59:0c:
                    00:bc:6a:89:34:61:e3:ed:7a:1d:1f:27:3e:da:fd:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        29:7e:a2:24:2f:69:8c:99:fa:75:2c:94:2f:ac:f1:ef:
        fb:db:99:5e:5e:e9:ea:4d:f5:c7:fb:8a:25:d8:45:da:
        ef:75:5f:03:58:05:80:4e:9b:51:4b:e2:63:53:69:44:
        5f:e4:0e:ba:82:d5:4c:f5:49:07:0a:fa:69:a2:e8:e8:
        ac:fd:2e:15:90:40:7a:2e:bd:6f:af:a9:84:7f:9d:a7:
        7b:a0:d3:7e:3b:bc:53:5d:52:53:6c:a5:c8:91:ff:31:
        01:a5:84:53:79:88:85:58:a5:d5:f2:fb:2b:71:1b:38:
        e0:91:c9:66:c8:e6:68:f5:0b:a9:6a:3e:da:83:b3:26
    Fingerprint (MD5):
        7D:09:1F:37:B4:F9:F4:1B:9F:19:DA:BC:39:3E:19:28
    Fingerprint (SHA1):
        46:69:C8:14:DA:BB:60:70:6B:97:7D:15:A8:D0:35:B9:14:E7:6E:D2

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:28 2012
            Not After : Tue Nov 28 16:06:28 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d5:ab:3f:4e:fc:36:b8:59:e0:45:9c:e5:b8:76:79:8c:
                    c7:9f:20:ca:23:43:51:d0:93:5e:ae:a1:6a:fb:13:bc:
                    68:d9:8d:9b:79:e0:90:3e:fa:80:23:1c:11:f7:3c:9c:
                    6f:55:16:ba:08:63:9c:c0:2e:78:84:ab:68:cc:5c:58:
                    a4:66:d4:7a:b2:1e:10:60:a2:c6:2e:87:6b:5f:4c:a2:
                    08:10:41:73:f2:2d:91:e0:d1:1c:cb:53:fc:15:41:ad:
                    d0:4c:ec:f1:b2:b4:23:2f:e4:73:d3:78:82:e6:6a:f2:
                    51:e0:6c:67:15:44:65:90:36:6c:98:ae:5d:ea:c1:19
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7d:58:b1:81:23:c5:f4:71:bd:0f:5a:1c:a9:b5:26:24:
        42:5e:10:63:41:b2:af:07:ce:6f:f0:76:6e:60:d1:d9:
        37:f8:17:51:1c:54:94:8a:ac:bb:e2:dd:9e:9d:78:29:
        5b:b3:1f:ef:c9:f7:89:de:4b:32:e9:89:2a:ad:cf:6a:
        d8:8b:7b:23:6d:bd:d5:08:97:31:fb:29:28:96:5a:f5:
        f6:4c:00:eb:3e:dc:d3:b3:ff:63:0c:37:d8:83:35:cc:
        85:0d:1a:1b:32:ab:cc:7d:49:da:28:b9:ec:71:01:f6:
        57:3c:f2:f4:33:1e:4f:7a:8c:21:88:dd:80:40:cb:71
    Fingerprint (MD5):
        7D:D4:D4:F3:18:BE:38:F3:E9:C2:97:63:FA:87:CB:5C
    Fingerprint (SHA1):
        B8:BD:BB:31:26:CF:2B:20:1A:58:35:89:6F:FD:68:BF:AE:F5:03:B8

    Friendly Name: Alice

tools.sh: #4644: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4645: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4646: Exporting with [CAMELLIA-192-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:20 2012
            Not After : Tue Nov 28 16:06:20 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d0:7a:19:11:89:35:7d:47:8e:d7:4d:85:b5:d0:b4:72:
                    b4:f0:24:04:30:ac:c5:8a:69:a9:d7:7a:e4:b2:96:f1:
                    a9:3d:f5:da:c9:58:87:03:80:ef:88:7c:37:16:0c:9c:
                    25:e1:70:1a:2a:28:16:d4:2d:73:88:28:8f:46:13:b4:
                    1a:28:d3:56:a2:04:a8:36:23:b8:d1:1b:05:de:83:69:
                    d6:7d:d2:6b:ce:7c:b5:86:2c:3b:51:78:be:dd:a1:e4:
                    b6:73:39:47:b6:06:a0:f3:c0:2a:95:5d:4e:46:59:0c:
                    00:bc:6a:89:34:61:e3:ed:7a:1d:1f:27:3e:da:fd:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        29:7e:a2:24:2f:69:8c:99:fa:75:2c:94:2f:ac:f1:ef:
        fb:db:99:5e:5e:e9:ea:4d:f5:c7:fb:8a:25:d8:45:da:
        ef:75:5f:03:58:05:80:4e:9b:51:4b:e2:63:53:69:44:
        5f:e4:0e:ba:82:d5:4c:f5:49:07:0a:fa:69:a2:e8:e8:
        ac:fd:2e:15:90:40:7a:2e:bd:6f:af:a9:84:7f:9d:a7:
        7b:a0:d3:7e:3b:bc:53:5d:52:53:6c:a5:c8:91:ff:31:
        01:a5:84:53:79:88:85:58:a5:d5:f2:fb:2b:71:1b:38:
        e0:91:c9:66:c8:e6:68:f5:0b:a9:6a:3e:da:83:b3:26
    Fingerprint (MD5):
        7D:09:1F:37:B4:F9:F4:1B:9F:19:DA:BC:39:3E:19:28
    Fingerprint (SHA1):
        46:69:C8:14:DA:BB:60:70:6B:97:7D:15:A8:D0:35:B9:14:E7:6E:D2

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:28 2012
            Not After : Tue Nov 28 16:06:28 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d5:ab:3f:4e:fc:36:b8:59:e0:45:9c:e5:b8:76:79:8c:
                    c7:9f:20:ca:23:43:51:d0:93:5e:ae:a1:6a:fb:13:bc:
                    68:d9:8d:9b:79:e0:90:3e:fa:80:23:1c:11:f7:3c:9c:
                    6f:55:16:ba:08:63:9c:c0:2e:78:84:ab:68:cc:5c:58:
                    a4:66:d4:7a:b2:1e:10:60:a2:c6:2e:87:6b:5f:4c:a2:
                    08:10:41:73:f2:2d:91:e0:d1:1c:cb:53:fc:15:41:ad:
                    d0:4c:ec:f1:b2:b4:23:2f:e4:73:d3:78:82:e6:6a:f2:
                    51:e0:6c:67:15:44:65:90:36:6c:98:ae:5d:ea:c1:19
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7d:58:b1:81:23:c5:f4:71:bd:0f:5a:1c:a9:b5:26:24:
        42:5e:10:63:41:b2:af:07:ce:6f:f0:76:6e:60:d1:d9:
        37:f8:17:51:1c:54:94:8a:ac:bb:e2:dd:9e:9d:78:29:
        5b:b3:1f:ef:c9:f7:89:de:4b:32:e9:89:2a:ad:cf:6a:
        d8:8b:7b:23:6d:bd:d5:08:97:31:fb:29:28:96:5a:f5:
        f6:4c:00:eb:3e:dc:d3:b3:ff:63:0c:37:d8:83:35:cc:
        85:0d:1a:1b:32:ab:cc:7d:49:da:28:b9:ec:71:01:f6:
        57:3c:f2:f4:33:1e:4f:7a:8c:21:88:dd:80:40:cb:71
    Fingerprint (MD5):
        7D:D4:D4:F3:18:BE:38:F3:E9:C2:97:63:FA:87:CB:5C
    Fingerprint (SHA1):
        B8:BD:BB:31:26:CF:2B:20:1A:58:35:89:6F:FD:68:BF:AE:F5:03:B8

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        d7:87:3c:b4:b2:80:87:2f:29:d0:ef:04:c4:39:22:fa
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-192-CBC
                Args:
                    04:10:fb:c6:7d:11:14:2f:f4:9d:a7:07:15:d6:54:0e:
                    16:31
tools.sh: #4647: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4648: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4649: Exporting with [CAMELLIA-256-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        ca:ec:44:98:f0:b8:0f:fc:42:3f:7f:6c:50:67:7f:b6
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-256-CBC
                Args:
                    04:10:97:f8:30:d0:8f:e8:ac:f7:a1:28:52:e6:0c:af:
                    a6:7e
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:20 2012
            Not After : Tue Nov 28 16:06:20 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d0:7a:19:11:89:35:7d:47:8e:d7:4d:85:b5:d0:b4:72:
                    b4:f0:24:04:30:ac:c5:8a:69:a9:d7:7a:e4:b2:96:f1:
                    a9:3d:f5:da:c9:58:87:03:80:ef:88:7c:37:16:0c:9c:
                    25:e1:70:1a:2a:28:16:d4:2d:73:88:28:8f:46:13:b4:
                    1a:28:d3:56:a2:04:a8:36:23:b8:d1:1b:05:de:83:69:
                    d6:7d:d2:6b:ce:7c:b5:86:2c:3b:51:78:be:dd:a1:e4:
                    b6:73:39:47:b6:06:a0:f3:c0:2a:95:5d:4e:46:59:0c:
                    00:bc:6a:89:34:61:e3:ed:7a:1d:1f:27:3e:da:fd:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        29:7e:a2:24:2f:69:8c:99:fa:75:2c:94:2f:ac:f1:ef:
        fb:db:99:5e:5e:e9:ea:4d:f5:c7:fb:8a:25:d8:45:da:
        ef:75:5f:03:58:05:80:4e:9b:51:4b:e2:63:53:69:44:
        5f:e4:0e:ba:82:d5:4c:f5:49:07:0a:fa:69:a2:e8:e8:
        ac:fd:2e:15:90:40:7a:2e:bd:6f:af:a9:84:7f:9d:a7:
        7b:a0:d3:7e:3b:bc:53:5d:52:53:6c:a5:c8:91:ff:31:
        01:a5:84:53:79:88:85:58:a5:d5:f2:fb:2b:71:1b:38:
        e0:91:c9:66:c8:e6:68:f5:0b:a9:6a:3e:da:83:b3:26
    Fingerprint (MD5):
        7D:09:1F:37:B4:F9:F4:1B:9F:19:DA:BC:39:3E:19:28
    Fingerprint (SHA1):
        46:69:C8:14:DA:BB:60:70:6B:97:7D:15:A8:D0:35:B9:14:E7:6E:D2

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:28 2012
            Not After : Tue Nov 28 16:06:28 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d5:ab:3f:4e:fc:36:b8:59:e0:45:9c:e5:b8:76:79:8c:
                    c7:9f:20:ca:23:43:51:d0:93:5e:ae:a1:6a:fb:13:bc:
                    68:d9:8d:9b:79:e0:90:3e:fa:80:23:1c:11:f7:3c:9c:
                    6f:55:16:ba:08:63:9c:c0:2e:78:84:ab:68:cc:5c:58:
                    a4:66:d4:7a:b2:1e:10:60:a2:c6:2e:87:6b:5f:4c:a2:
                    08:10:41:73:f2:2d:91:e0:d1:1c:cb:53:fc:15:41:ad:
                    d0:4c:ec:f1:b2:b4:23:2f:e4:73:d3:78:82:e6:6a:f2:
                    51:e0:6c:67:15:44:65:90:36:6c:98:ae:5d:ea:c1:19
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7d:58:b1:81:23:c5:f4:71:bd:0f:5a:1c:a9:b5:26:24:
        42:5e:10:63:41:b2:af:07:ce:6f:f0:76:6e:60:d1:d9:
        37:f8:17:51:1c:54:94:8a:ac:bb:e2:dd:9e:9d:78:29:
        5b:b3:1f:ef:c9:f7:89:de:4b:32:e9:89:2a:ad:cf:6a:
        d8:8b:7b:23:6d:bd:d5:08:97:31:fb:29:28:96:5a:f5:
        f6:4c:00:eb:3e:dc:d3:b3:ff:63:0c:37:d8:83:35:cc:
        85:0d:1a:1b:32:ab:cc:7d:49:da:28:b9:ec:71:01:f6:
        57:3c:f2:f4:33:1e:4f:7a:8c:21:88:dd:80:40:cb:71
    Fingerprint (MD5):
        7D:D4:D4:F3:18:BE:38:F3:E9:C2:97:63:FA:87:CB:5C
    Fingerprint (SHA1):
        B8:BD:BB:31:26:CF:2B:20:1A:58:35:89:6F:FD:68:BF:AE:F5:03:B8

    Friendly Name: Alice

tools.sh: #4650: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4651: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4652: Exporting with [CAMELLIA-256-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        5c:88:05:25:1e:d2:1a:ac:45:f8:66:42:9a:0e:1f:06
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-256-CBC
                Args:
                    04:10:0a:90:a5:1d:90:99:e4:e3:3c:a5:dc:9a:1b:43:
                    35:68
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:20 2012
            Not After : Tue Nov 28 16:06:20 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d0:7a:19:11:89:35:7d:47:8e:d7:4d:85:b5:d0:b4:72:
                    b4:f0:24:04:30:ac:c5:8a:69:a9:d7:7a:e4:b2:96:f1:
                    a9:3d:f5:da:c9:58:87:03:80:ef:88:7c:37:16:0c:9c:
                    25:e1:70:1a:2a:28:16:d4:2d:73:88:28:8f:46:13:b4:
                    1a:28:d3:56:a2:04:a8:36:23:b8:d1:1b:05:de:83:69:
                    d6:7d:d2:6b:ce:7c:b5:86:2c:3b:51:78:be:dd:a1:e4:
                    b6:73:39:47:b6:06:a0:f3:c0:2a:95:5d:4e:46:59:0c:
                    00:bc:6a:89:34:61:e3:ed:7a:1d:1f:27:3e:da:fd:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        29:7e:a2:24:2f:69:8c:99:fa:75:2c:94:2f:ac:f1:ef:
        fb:db:99:5e:5e:e9:ea:4d:f5:c7:fb:8a:25:d8:45:da:
        ef:75:5f:03:58:05:80:4e:9b:51:4b:e2:63:53:69:44:
        5f:e4:0e:ba:82:d5:4c:f5:49:07:0a:fa:69:a2:e8:e8:
        ac:fd:2e:15:90:40:7a:2e:bd:6f:af:a9:84:7f:9d:a7:
        7b:a0:d3:7e:3b:bc:53:5d:52:53:6c:a5:c8:91:ff:31:
        01:a5:84:53:79:88:85:58:a5:d5:f2:fb:2b:71:1b:38:
        e0:91:c9:66:c8:e6:68:f5:0b:a9:6a:3e:da:83:b3:26
    Fingerprint (MD5):
        7D:09:1F:37:B4:F9:F4:1B:9F:19:DA:BC:39:3E:19:28
    Fingerprint (SHA1):
        46:69:C8:14:DA:BB:60:70:6B:97:7D:15:A8:D0:35:B9:14:E7:6E:D2

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:28 2012
            Not After : Tue Nov 28 16:06:28 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d5:ab:3f:4e:fc:36:b8:59:e0:45:9c:e5:b8:76:79:8c:
                    c7:9f:20:ca:23:43:51:d0:93:5e:ae:a1:6a:fb:13:bc:
                    68:d9:8d:9b:79:e0:90:3e:fa:80:23:1c:11:f7:3c:9c:
                    6f:55:16:ba:08:63:9c:c0:2e:78:84:ab:68:cc:5c:58:
                    a4:66:d4:7a:b2:1e:10:60:a2:c6:2e:87:6b:5f:4c:a2:
                    08:10:41:73:f2:2d:91:e0:d1:1c:cb:53:fc:15:41:ad:
                    d0:4c:ec:f1:b2:b4:23:2f:e4:73:d3:78:82:e6:6a:f2:
                    51:e0:6c:67:15:44:65:90:36:6c:98:ae:5d:ea:c1:19
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7d:58:b1:81:23:c5:f4:71:bd:0f:5a:1c:a9:b5:26:24:
        42:5e:10:63:41:b2:af:07:ce:6f:f0:76:6e:60:d1:d9:
        37:f8:17:51:1c:54:94:8a:ac:bb:e2:dd:9e:9d:78:29:
        5b:b3:1f:ef:c9:f7:89:de:4b:32:e9:89:2a:ad:cf:6a:
        d8:8b:7b:23:6d:bd:d5:08:97:31:fb:29:28:96:5a:f5:
        f6:4c:00:eb:3e:dc:d3:b3:ff:63:0c:37:d8:83:35:cc:
        85:0d:1a:1b:32:ab:cc:7d:49:da:28:b9:ec:71:01:f6:
        57:3c:f2:f4:33:1e:4f:7a:8c:21:88:dd:80:40:cb:71
    Fingerprint (MD5):
        7D:D4:D4:F3:18:BE:38:F3:E9:C2:97:63:FA:87:CB:5C
    Fingerprint (SHA1):
        B8:BD:BB:31:26:CF:2B:20:1A:58:35:89:6F:FD:68:BF:AE:F5:03:B8

    Friendly Name: Alice

tools.sh: #4653: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4654: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4655: Exporting with [CAMELLIA-256-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:20 2012
            Not After : Tue Nov 28 16:06:20 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d0:7a:19:11:89:35:7d:47:8e:d7:4d:85:b5:d0:b4:72:
                    b4:f0:24:04:30:ac:c5:8a:69:a9:d7:7a:e4:b2:96:f1:
                    a9:3d:f5:da:c9:58:87:03:80:ef:88:7c:37:16:0c:9c:
                    25:e1:70:1a:2a:28:16:d4:2d:73:88:28:8f:46:13:b4:
                    1a:28:d3:56:a2:04:a8:36:23:b8:d1:1b:05:de:83:69:
                    d6:7d:d2:6b:ce:7c:b5:86:2c:3b:51:78:be:dd:a1:e4:
                    b6:73:39:47:b6:06:a0:f3:c0:2a:95:5d:4e:46:59:0c:
                    00:bc:6a:89:34:61:e3:ed:7a:1d:1f:27:3e:da:fd:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        29:7e:a2:24:2f:69:8c:99:fa:75:2c:94:2f:ac:f1:ef:
        fb:db:99:5e:5e:e9:ea:4d:f5:c7:fb:8a:25:d8:45:da:
        ef:75:5f:03:58:05:80:4e:9b:51:4b:e2:63:53:69:44:
        5f:e4:0e:ba:82:d5:4c:f5:49:07:0a:fa:69:a2:e8:e8:
        ac:fd:2e:15:90:40:7a:2e:bd:6f:af:a9:84:7f:9d:a7:
        7b:a0:d3:7e:3b:bc:53:5d:52:53:6c:a5:c8:91:ff:31:
        01:a5:84:53:79:88:85:58:a5:d5:f2:fb:2b:71:1b:38:
        e0:91:c9:66:c8:e6:68:f5:0b:a9:6a:3e:da:83:b3:26
    Fingerprint (MD5):
        7D:09:1F:37:B4:F9:F4:1B:9F:19:DA:BC:39:3E:19:28
    Fingerprint (SHA1):
        46:69:C8:14:DA:BB:60:70:6B:97:7D:15:A8:D0:35:B9:14:E7:6E:D2

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:28 2012
            Not After : Tue Nov 28 16:06:28 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d5:ab:3f:4e:fc:36:b8:59:e0:45:9c:e5:b8:76:79:8c:
                    c7:9f:20:ca:23:43:51:d0:93:5e:ae:a1:6a:fb:13:bc:
                    68:d9:8d:9b:79:e0:90:3e:fa:80:23:1c:11:f7:3c:9c:
                    6f:55:16:ba:08:63:9c:c0:2e:78:84:ab:68:cc:5c:58:
                    a4:66:d4:7a:b2:1e:10:60:a2:c6:2e:87:6b:5f:4c:a2:
                    08:10:41:73:f2:2d:91:e0:d1:1c:cb:53:fc:15:41:ad:
                    d0:4c:ec:f1:b2:b4:23:2f:e4:73:d3:78:82:e6:6a:f2:
                    51:e0:6c:67:15:44:65:90:36:6c:98:ae:5d:ea:c1:19
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7d:58:b1:81:23:c5:f4:71:bd:0f:5a:1c:a9:b5:26:24:
        42:5e:10:63:41:b2:af:07:ce:6f:f0:76:6e:60:d1:d9:
        37:f8:17:51:1c:54:94:8a:ac:bb:e2:dd:9e:9d:78:29:
        5b:b3:1f:ef:c9:f7:89:de:4b:32:e9:89:2a:ad:cf:6a:
        d8:8b:7b:23:6d:bd:d5:08:97:31:fb:29:28:96:5a:f5:
        f6:4c:00:eb:3e:dc:d3:b3:ff:63:0c:37:d8:83:35:cc:
        85:0d:1a:1b:32:ab:cc:7d:49:da:28:b9:ec:71:01:f6:
        57:3c:f2:f4:33:1e:4f:7a:8c:21:88:dd:80:40:cb:71
    Fingerprint (MD5):
        7D:D4:D4:F3:18:BE:38:F3:E9:C2:97:63:FA:87:CB:5C
    Fingerprint (SHA1):
        B8:BD:BB:31:26:CF:2B:20:1A:58:35:89:6F:FD:68:BF:AE:F5:03:B8

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        1a:db:21:52:67:2f:1b:78:fa:12:01:2f:c5:d1:3d:bf
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-256-CBC
                Args:
                    04:10:e3:16:4c:a6:9a:bb:97:c2:3d:4f:74:a8:42:27:
                    ed:19
tools.sh: #4656: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4657: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4658: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
        Parameters:
            Salt:
                b0:9b:ab:d8:f4:7a:49:9e:fb:63:fc:15:bf:62:1d:f0
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:20 2012
            Not After : Tue Nov 28 16:06:20 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d0:7a:19:11:89:35:7d:47:8e:d7:4d:85:b5:d0:b4:72:
                    b4:f0:24:04:30:ac:c5:8a:69:a9:d7:7a:e4:b2:96:f1:
                    a9:3d:f5:da:c9:58:87:03:80:ef:88:7c:37:16:0c:9c:
                    25:e1:70:1a:2a:28:16:d4:2d:73:88:28:8f:46:13:b4:
                    1a:28:d3:56:a2:04:a8:36:23:b8:d1:1b:05:de:83:69:
                    d6:7d:d2:6b:ce:7c:b5:86:2c:3b:51:78:be:dd:a1:e4:
                    b6:73:39:47:b6:06:a0:f3:c0:2a:95:5d:4e:46:59:0c:
                    00:bc:6a:89:34:61:e3:ed:7a:1d:1f:27:3e:da:fd:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        29:7e:a2:24:2f:69:8c:99:fa:75:2c:94:2f:ac:f1:ef:
        fb:db:99:5e:5e:e9:ea:4d:f5:c7:fb:8a:25:d8:45:da:
        ef:75:5f:03:58:05:80:4e:9b:51:4b:e2:63:53:69:44:
        5f:e4:0e:ba:82:d5:4c:f5:49:07:0a:fa:69:a2:e8:e8:
        ac:fd:2e:15:90:40:7a:2e:bd:6f:af:a9:84:7f:9d:a7:
        7b:a0:d3:7e:3b:bc:53:5d:52:53:6c:a5:c8:91:ff:31:
        01:a5:84:53:79:88:85:58:a5:d5:f2:fb:2b:71:1b:38:
        e0:91:c9:66:c8:e6:68:f5:0b:a9:6a:3e:da:83:b3:26
    Fingerprint (MD5):
        7D:09:1F:37:B4:F9:F4:1B:9F:19:DA:BC:39:3E:19:28
    Fingerprint (SHA1):
        46:69:C8:14:DA:BB:60:70:6B:97:7D:15:A8:D0:35:B9:14:E7:6E:D2

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:28 2012
            Not After : Tue Nov 28 16:06:28 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d5:ab:3f:4e:fc:36:b8:59:e0:45:9c:e5:b8:76:79:8c:
                    c7:9f:20:ca:23:43:51:d0:93:5e:ae:a1:6a:fb:13:bc:
                    68:d9:8d:9b:79:e0:90:3e:fa:80:23:1c:11:f7:3c:9c:
                    6f:55:16:ba:08:63:9c:c0:2e:78:84:ab:68:cc:5c:58:
                    a4:66:d4:7a:b2:1e:10:60:a2:c6:2e:87:6b:5f:4c:a2:
                    08:10:41:73:f2:2d:91:e0:d1:1c:cb:53:fc:15:41:ad:
                    d0:4c:ec:f1:b2:b4:23:2f:e4:73:d3:78:82:e6:6a:f2:
                    51:e0:6c:67:15:44:65:90:36:6c:98:ae:5d:ea:c1:19
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7d:58:b1:81:23:c5:f4:71:bd:0f:5a:1c:a9:b5:26:24:
        42:5e:10:63:41:b2:af:07:ce:6f:f0:76:6e:60:d1:d9:
        37:f8:17:51:1c:54:94:8a:ac:bb:e2:dd:9e:9d:78:29:
        5b:b3:1f:ef:c9:f7:89:de:4b:32:e9:89:2a:ad:cf:6a:
        d8:8b:7b:23:6d:bd:d5:08:97:31:fb:29:28:96:5a:f5:
        f6:4c:00:eb:3e:dc:d3:b3:ff:63:0c:37:d8:83:35:cc:
        85:0d:1a:1b:32:ab:cc:7d:49:da:28:b9:ec:71:01:f6:
        57:3c:f2:f4:33:1e:4f:7a:8c:21:88:dd:80:40:cb:71
    Fingerprint (MD5):
        7D:D4:D4:F3:18:BE:38:F3:E9:C2:97:63:FA:87:CB:5C
    Fingerprint (SHA1):
        B8:BD:BB:31:26:CF:2B:20:1A:58:35:89:6F:FD:68:BF:AE:F5:03:B8

    Friendly Name: Alice

tools.sh: #4659: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4660: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4661: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
        Parameters:
            Salt:
                3a:58:53:f3:d7:9a:6f:9d:72:b9:47:73:e7:fd:ba:b6
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:20 2012
            Not After : Tue Nov 28 16:06:20 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d0:7a:19:11:89:35:7d:47:8e:d7:4d:85:b5:d0:b4:72:
                    b4:f0:24:04:30:ac:c5:8a:69:a9:d7:7a:e4:b2:96:f1:
                    a9:3d:f5:da:c9:58:87:03:80:ef:88:7c:37:16:0c:9c:
                    25:e1:70:1a:2a:28:16:d4:2d:73:88:28:8f:46:13:b4:
                    1a:28:d3:56:a2:04:a8:36:23:b8:d1:1b:05:de:83:69:
                    d6:7d:d2:6b:ce:7c:b5:86:2c:3b:51:78:be:dd:a1:e4:
                    b6:73:39:47:b6:06:a0:f3:c0:2a:95:5d:4e:46:59:0c:
                    00:bc:6a:89:34:61:e3:ed:7a:1d:1f:27:3e:da:fd:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        29:7e:a2:24:2f:69:8c:99:fa:75:2c:94:2f:ac:f1:ef:
        fb:db:99:5e:5e:e9:ea:4d:f5:c7:fb:8a:25:d8:45:da:
        ef:75:5f:03:58:05:80:4e:9b:51:4b:e2:63:53:69:44:
        5f:e4:0e:ba:82:d5:4c:f5:49:07:0a:fa:69:a2:e8:e8:
        ac:fd:2e:15:90:40:7a:2e:bd:6f:af:a9:84:7f:9d:a7:
        7b:a0:d3:7e:3b:bc:53:5d:52:53:6c:a5:c8:91:ff:31:
        01:a5:84:53:79:88:85:58:a5:d5:f2:fb:2b:71:1b:38:
        e0:91:c9:66:c8:e6:68:f5:0b:a9:6a:3e:da:83:b3:26
    Fingerprint (MD5):
        7D:09:1F:37:B4:F9:F4:1B:9F:19:DA:BC:39:3E:19:28
    Fingerprint (SHA1):
        46:69:C8:14:DA:BB:60:70:6B:97:7D:15:A8:D0:35:B9:14:E7:6E:D2

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:28 2012
            Not After : Tue Nov 28 16:06:28 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d5:ab:3f:4e:fc:36:b8:59:e0:45:9c:e5:b8:76:79:8c:
                    c7:9f:20:ca:23:43:51:d0:93:5e:ae:a1:6a:fb:13:bc:
                    68:d9:8d:9b:79:e0:90:3e:fa:80:23:1c:11:f7:3c:9c:
                    6f:55:16:ba:08:63:9c:c0:2e:78:84:ab:68:cc:5c:58:
                    a4:66:d4:7a:b2:1e:10:60:a2:c6:2e:87:6b:5f:4c:a2:
                    08:10:41:73:f2:2d:91:e0:d1:1c:cb:53:fc:15:41:ad:
                    d0:4c:ec:f1:b2:b4:23:2f:e4:73:d3:78:82:e6:6a:f2:
                    51:e0:6c:67:15:44:65:90:36:6c:98:ae:5d:ea:c1:19
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7d:58:b1:81:23:c5:f4:71:bd:0f:5a:1c:a9:b5:26:24:
        42:5e:10:63:41:b2:af:07:ce:6f:f0:76:6e:60:d1:d9:
        37:f8:17:51:1c:54:94:8a:ac:bb:e2:dd:9e:9d:78:29:
        5b:b3:1f:ef:c9:f7:89:de:4b:32:e9:89:2a:ad:cf:6a:
        d8:8b:7b:23:6d:bd:d5:08:97:31:fb:29:28:96:5a:f5:
        f6:4c:00:eb:3e:dc:d3:b3:ff:63:0c:37:d8:83:35:cc:
        85:0d:1a:1b:32:ab:cc:7d:49:da:28:b9:ec:71:01:f6:
        57:3c:f2:f4:33:1e:4f:7a:8c:21:88:dd:80:40:cb:71
    Fingerprint (MD5):
        7D:D4:D4:F3:18:BE:38:F3:E9:C2:97:63:FA:87:CB:5C
    Fingerprint (SHA1):
        B8:BD:BB:31:26:CF:2B:20:1A:58:35:89:6F:FD:68:BF:AE:F5:03:B8

    Friendly Name: Alice

tools.sh: #4662: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4663: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4664: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
        Parameters:
            Salt:
                0d:8f:48:f7:7e:92:b6:5f:fa:fd:28:ea:6f:22:de:37
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:20 2012
            Not After : Tue Nov 28 16:06:20 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d0:7a:19:11:89:35:7d:47:8e:d7:4d:85:b5:d0:b4:72:
                    b4:f0:24:04:30:ac:c5:8a:69:a9:d7:7a:e4:b2:96:f1:
                    a9:3d:f5:da:c9:58:87:03:80:ef:88:7c:37:16:0c:9c:
                    25:e1:70:1a:2a:28:16:d4:2d:73:88:28:8f:46:13:b4:
                    1a:28:d3:56:a2:04:a8:36:23:b8:d1:1b:05:de:83:69:
                    d6:7d:d2:6b:ce:7c:b5:86:2c:3b:51:78:be:dd:a1:e4:
                    b6:73:39:47:b6:06:a0:f3:c0:2a:95:5d:4e:46:59:0c:
                    00:bc:6a:89:34:61:e3:ed:7a:1d:1f:27:3e:da:fd:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        29:7e:a2:24:2f:69:8c:99:fa:75:2c:94:2f:ac:f1:ef:
        fb:db:99:5e:5e:e9:ea:4d:f5:c7:fb:8a:25:d8:45:da:
        ef:75:5f:03:58:05:80:4e:9b:51:4b:e2:63:53:69:44:
        5f:e4:0e:ba:82:d5:4c:f5:49:07:0a:fa:69:a2:e8:e8:
        ac:fd:2e:15:90:40:7a:2e:bd:6f:af:a9:84:7f:9d:a7:
        7b:a0:d3:7e:3b:bc:53:5d:52:53:6c:a5:c8:91:ff:31:
        01:a5:84:53:79:88:85:58:a5:d5:f2:fb:2b:71:1b:38:
        e0:91:c9:66:c8:e6:68:f5:0b:a9:6a:3e:da:83:b3:26
    Fingerprint (MD5):
        7D:09:1F:37:B4:F9:F4:1B:9F:19:DA:BC:39:3E:19:28
    Fingerprint (SHA1):
        46:69:C8:14:DA:BB:60:70:6B:97:7D:15:A8:D0:35:B9:14:E7:6E:D2

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:28 2012
            Not After : Tue Nov 28 16:06:28 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d5:ab:3f:4e:fc:36:b8:59:e0:45:9c:e5:b8:76:79:8c:
                    c7:9f:20:ca:23:43:51:d0:93:5e:ae:a1:6a:fb:13:bc:
                    68:d9:8d:9b:79:e0:90:3e:fa:80:23:1c:11:f7:3c:9c:
                    6f:55:16:ba:08:63:9c:c0:2e:78:84:ab:68:cc:5c:58:
                    a4:66:d4:7a:b2:1e:10:60:a2:c6:2e:87:6b:5f:4c:a2:
                    08:10:41:73:f2:2d:91:e0:d1:1c:cb:53:fc:15:41:ad:
                    d0:4c:ec:f1:b2:b4:23:2f:e4:73:d3:78:82:e6:6a:f2:
                    51:e0:6c:67:15:44:65:90:36:6c:98:ae:5d:ea:c1:19
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7d:58:b1:81:23:c5:f4:71:bd:0f:5a:1c:a9:b5:26:24:
        42:5e:10:63:41:b2:af:07:ce:6f:f0:76:6e:60:d1:d9:
        37:f8:17:51:1c:54:94:8a:ac:bb:e2:dd:9e:9d:78:29:
        5b:b3:1f:ef:c9:f7:89:de:4b:32:e9:89:2a:ad:cf:6a:
        d8:8b:7b:23:6d:bd:d5:08:97:31:fb:29:28:96:5a:f5:
        f6:4c:00:eb:3e:dc:d3:b3:ff:63:0c:37:d8:83:35:cc:
        85:0d:1a:1b:32:ab:cc:7d:49:da:28:b9:ec:71:01:f6:
        57:3c:f2:f4:33:1e:4f:7a:8c:21:88:dd:80:40:cb:71
    Fingerprint (MD5):
        7D:D4:D4:F3:18:BE:38:F3:E9:C2:97:63:FA:87:CB:5C
    Fingerprint (SHA1):
        B8:BD:BB:31:26:CF:2B:20:1A:58:35:89:6F:FD:68:BF:AE:F5:03:B8

    Friendly Name: Alice

tools.sh: #4665: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4666: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4667: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
        Parameters:
            Salt:
                70:f0:a8:6a:b6:cc:e5:bd:c8:5d:86:35:99:77:53:0b
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:20 2012
            Not After : Tue Nov 28 16:06:20 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d0:7a:19:11:89:35:7d:47:8e:d7:4d:85:b5:d0:b4:72:
                    b4:f0:24:04:30:ac:c5:8a:69:a9:d7:7a:e4:b2:96:f1:
                    a9:3d:f5:da:c9:58:87:03:80:ef:88:7c:37:16:0c:9c:
                    25:e1:70:1a:2a:28:16:d4:2d:73:88:28:8f:46:13:b4:
                    1a:28:d3:56:a2:04:a8:36:23:b8:d1:1b:05:de:83:69:
                    d6:7d:d2:6b:ce:7c:b5:86:2c:3b:51:78:be:dd:a1:e4:
                    b6:73:39:47:b6:06:a0:f3:c0:2a:95:5d:4e:46:59:0c:
                    00:bc:6a:89:34:61:e3:ed:7a:1d:1f:27:3e:da:fd:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        29:7e:a2:24:2f:69:8c:99:fa:75:2c:94:2f:ac:f1:ef:
        fb:db:99:5e:5e:e9:ea:4d:f5:c7:fb:8a:25:d8:45:da:
        ef:75:5f:03:58:05:80:4e:9b:51:4b:e2:63:53:69:44:
        5f:e4:0e:ba:82:d5:4c:f5:49:07:0a:fa:69:a2:e8:e8:
        ac:fd:2e:15:90:40:7a:2e:bd:6f:af:a9:84:7f:9d:a7:
        7b:a0:d3:7e:3b:bc:53:5d:52:53:6c:a5:c8:91:ff:31:
        01:a5:84:53:79:88:85:58:a5:d5:f2:fb:2b:71:1b:38:
        e0:91:c9:66:c8:e6:68:f5:0b:a9:6a:3e:da:83:b3:26
    Fingerprint (MD5):
        7D:09:1F:37:B4:F9:F4:1B:9F:19:DA:BC:39:3E:19:28
    Fingerprint (SHA1):
        46:69:C8:14:DA:BB:60:70:6B:97:7D:15:A8:D0:35:B9:14:E7:6E:D2

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:28 2012
            Not After : Tue Nov 28 16:06:28 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d5:ab:3f:4e:fc:36:b8:59:e0:45:9c:e5:b8:76:79:8c:
                    c7:9f:20:ca:23:43:51:d0:93:5e:ae:a1:6a:fb:13:bc:
                    68:d9:8d:9b:79:e0:90:3e:fa:80:23:1c:11:f7:3c:9c:
                    6f:55:16:ba:08:63:9c:c0:2e:78:84:ab:68:cc:5c:58:
                    a4:66:d4:7a:b2:1e:10:60:a2:c6:2e:87:6b:5f:4c:a2:
                    08:10:41:73:f2:2d:91:e0:d1:1c:cb:53:fc:15:41:ad:
                    d0:4c:ec:f1:b2:b4:23:2f:e4:73:d3:78:82:e6:6a:f2:
                    51:e0:6c:67:15:44:65:90:36:6c:98:ae:5d:ea:c1:19
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7d:58:b1:81:23:c5:f4:71:bd:0f:5a:1c:a9:b5:26:24:
        42:5e:10:63:41:b2:af:07:ce:6f:f0:76:6e:60:d1:d9:
        37:f8:17:51:1c:54:94:8a:ac:bb:e2:dd:9e:9d:78:29:
        5b:b3:1f:ef:c9:f7:89:de:4b:32:e9:89:2a:ad:cf:6a:
        d8:8b:7b:23:6d:bd:d5:08:97:31:fb:29:28:96:5a:f5:
        f6:4c:00:eb:3e:dc:d3:b3:ff:63:0c:37:d8:83:35:cc:
        85:0d:1a:1b:32:ab:cc:7d:49:da:28:b9:ec:71:01:f6:
        57:3c:f2:f4:33:1e:4f:7a:8c:21:88:dd:80:40:cb:71
    Fingerprint (MD5):
        7D:D4:D4:F3:18:BE:38:F3:E9:C2:97:63:FA:87:CB:5C
    Fingerprint (SHA1):
        B8:BD:BB:31:26:CF:2B:20:1A:58:35:89:6F:FD:68:BF:AE:F5:03:B8

    Friendly Name: Alice

tools.sh: #4668: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4669: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4670: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:20 2012
            Not After : Tue Nov 28 16:06:20 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d0:7a:19:11:89:35:7d:47:8e:d7:4d:85:b5:d0:b4:72:
                    b4:f0:24:04:30:ac:c5:8a:69:a9:d7:7a:e4:b2:96:f1:
                    a9:3d:f5:da:c9:58:87:03:80:ef:88:7c:37:16:0c:9c:
                    25:e1:70:1a:2a:28:16:d4:2d:73:88:28:8f:46:13:b4:
                    1a:28:d3:56:a2:04:a8:36:23:b8:d1:1b:05:de:83:69:
                    d6:7d:d2:6b:ce:7c:b5:86:2c:3b:51:78:be:dd:a1:e4:
                    b6:73:39:47:b6:06:a0:f3:c0:2a:95:5d:4e:46:59:0c:
                    00:bc:6a:89:34:61:e3:ed:7a:1d:1f:27:3e:da:fd:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        29:7e:a2:24:2f:69:8c:99:fa:75:2c:94:2f:ac:f1:ef:
        fb:db:99:5e:5e:e9:ea:4d:f5:c7:fb:8a:25:d8:45:da:
        ef:75:5f:03:58:05:80:4e:9b:51:4b:e2:63:53:69:44:
        5f:e4:0e:ba:82:d5:4c:f5:49:07:0a:fa:69:a2:e8:e8:
        ac:fd:2e:15:90:40:7a:2e:bd:6f:af:a9:84:7f:9d:a7:
        7b:a0:d3:7e:3b:bc:53:5d:52:53:6c:a5:c8:91:ff:31:
        01:a5:84:53:79:88:85:58:a5:d5:f2:fb:2b:71:1b:38:
        e0:91:c9:66:c8:e6:68:f5:0b:a9:6a:3e:da:83:b3:26
    Fingerprint (MD5):
        7D:09:1F:37:B4:F9:F4:1B:9F:19:DA:BC:39:3E:19:28
    Fingerprint (SHA1):
        46:69:C8:14:DA:BB:60:70:6B:97:7D:15:A8:D0:35:B9:14:E7:6E:D2

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:28 2012
            Not After : Tue Nov 28 16:06:28 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d5:ab:3f:4e:fc:36:b8:59:e0:45:9c:e5:b8:76:79:8c:
                    c7:9f:20:ca:23:43:51:d0:93:5e:ae:a1:6a:fb:13:bc:
                    68:d9:8d:9b:79:e0:90:3e:fa:80:23:1c:11:f7:3c:9c:
                    6f:55:16:ba:08:63:9c:c0:2e:78:84:ab:68:cc:5c:58:
                    a4:66:d4:7a:b2:1e:10:60:a2:c6:2e:87:6b:5f:4c:a2:
                    08:10:41:73:f2:2d:91:e0:d1:1c:cb:53:fc:15:41:ad:
                    d0:4c:ec:f1:b2:b4:23:2f:e4:73:d3:78:82:e6:6a:f2:
                    51:e0:6c:67:15:44:65:90:36:6c:98:ae:5d:ea:c1:19
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7d:58:b1:81:23:c5:f4:71:bd:0f:5a:1c:a9:b5:26:24:
        42:5e:10:63:41:b2:af:07:ce:6f:f0:76:6e:60:d1:d9:
        37:f8:17:51:1c:54:94:8a:ac:bb:e2:dd:9e:9d:78:29:
        5b:b3:1f:ef:c9:f7:89:de:4b:32:e9:89:2a:ad:cf:6a:
        d8:8b:7b:23:6d:bd:d5:08:97:31:fb:29:28:96:5a:f5:
        f6:4c:00:eb:3e:dc:d3:b3:ff:63:0c:37:d8:83:35:cc:
        85:0d:1a:1b:32:ab:cc:7d:49:da:28:b9:ec:71:01:f6:
        57:3c:f2:f4:33:1e:4f:7a:8c:21:88:dd:80:40:cb:71
    Fingerprint (MD5):
        7D:D4:D4:F3:18:BE:38:F3:E9:C2:97:63:FA:87:CB:5C
    Fingerprint (SHA1):
        B8:BD:BB:31:26:CF:2B:20:1A:58:35:89:6F:FD:68:BF:AE:F5:03:B8

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
        Parameters:
            Salt:
                21:17:49:fa:88:40:29:22:cf:bc:5e:81:51:01:ec:77
            Iteration Count: 2000 (0x7d0)
tools.sh: #4671: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4672: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4673: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
        Parameters:
            Salt:
                f1:6b:8e:da:8e:be:3b:6e:7e:7a:48:1c:a5:9f:fa:14
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:20 2012
            Not After : Tue Nov 28 16:06:20 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d0:7a:19:11:89:35:7d:47:8e:d7:4d:85:b5:d0:b4:72:
                    b4:f0:24:04:30:ac:c5:8a:69:a9:d7:7a:e4:b2:96:f1:
                    a9:3d:f5:da:c9:58:87:03:80:ef:88:7c:37:16:0c:9c:
                    25:e1:70:1a:2a:28:16:d4:2d:73:88:28:8f:46:13:b4:
                    1a:28:d3:56:a2:04:a8:36:23:b8:d1:1b:05:de:83:69:
                    d6:7d:d2:6b:ce:7c:b5:86:2c:3b:51:78:be:dd:a1:e4:
                    b6:73:39:47:b6:06:a0:f3:c0:2a:95:5d:4e:46:59:0c:
                    00:bc:6a:89:34:61:e3:ed:7a:1d:1f:27:3e:da:fd:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        29:7e:a2:24:2f:69:8c:99:fa:75:2c:94:2f:ac:f1:ef:
        fb:db:99:5e:5e:e9:ea:4d:f5:c7:fb:8a:25:d8:45:da:
        ef:75:5f:03:58:05:80:4e:9b:51:4b:e2:63:53:69:44:
        5f:e4:0e:ba:82:d5:4c:f5:49:07:0a:fa:69:a2:e8:e8:
        ac:fd:2e:15:90:40:7a:2e:bd:6f:af:a9:84:7f:9d:a7:
        7b:a0:d3:7e:3b:bc:53:5d:52:53:6c:a5:c8:91:ff:31:
        01:a5:84:53:79:88:85:58:a5:d5:f2:fb:2b:71:1b:38:
        e0:91:c9:66:c8:e6:68:f5:0b:a9:6a:3e:da:83:b3:26
    Fingerprint (MD5):
        7D:09:1F:37:B4:F9:F4:1B:9F:19:DA:BC:39:3E:19:28
    Fingerprint (SHA1):
        46:69:C8:14:DA:BB:60:70:6B:97:7D:15:A8:D0:35:B9:14:E7:6E:D2

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:28 2012
            Not After : Tue Nov 28 16:06:28 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d5:ab:3f:4e:fc:36:b8:59:e0:45:9c:e5:b8:76:79:8c:
                    c7:9f:20:ca:23:43:51:d0:93:5e:ae:a1:6a:fb:13:bc:
                    68:d9:8d:9b:79:e0:90:3e:fa:80:23:1c:11:f7:3c:9c:
                    6f:55:16:ba:08:63:9c:c0:2e:78:84:ab:68:cc:5c:58:
                    a4:66:d4:7a:b2:1e:10:60:a2:c6:2e:87:6b:5f:4c:a2:
                    08:10:41:73:f2:2d:91:e0:d1:1c:cb:53:fc:15:41:ad:
                    d0:4c:ec:f1:b2:b4:23:2f:e4:73:d3:78:82:e6:6a:f2:
                    51:e0:6c:67:15:44:65:90:36:6c:98:ae:5d:ea:c1:19
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7d:58:b1:81:23:c5:f4:71:bd:0f:5a:1c:a9:b5:26:24:
        42:5e:10:63:41:b2:af:07:ce:6f:f0:76:6e:60:d1:d9:
        37:f8:17:51:1c:54:94:8a:ac:bb:e2:dd:9e:9d:78:29:
        5b:b3:1f:ef:c9:f7:89:de:4b:32:e9:89:2a:ad:cf:6a:
        d8:8b:7b:23:6d:bd:d5:08:97:31:fb:29:28:96:5a:f5:
        f6:4c:00:eb:3e:dc:d3:b3:ff:63:0c:37:d8:83:35:cc:
        85:0d:1a:1b:32:ab:cc:7d:49:da:28:b9:ec:71:01:f6:
        57:3c:f2:f4:33:1e:4f:7a:8c:21:88:dd:80:40:cb:71
    Fingerprint (MD5):
        7D:D4:D4:F3:18:BE:38:F3:E9:C2:97:63:FA:87:CB:5C
    Fingerprint (SHA1):
        B8:BD:BB:31:26:CF:2B:20:1A:58:35:89:6F:FD:68:BF:AE:F5:03:B8

    Friendly Name: Alice

tools.sh: #4674: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4675: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4676: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
        Parameters:
            Salt:
                6c:1d:27:a0:4a:7b:4a:e7:dc:d4:42:42:eb:1a:bd:fa
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:20 2012
            Not After : Tue Nov 28 16:06:20 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d0:7a:19:11:89:35:7d:47:8e:d7:4d:85:b5:d0:b4:72:
                    b4:f0:24:04:30:ac:c5:8a:69:a9:d7:7a:e4:b2:96:f1:
                    a9:3d:f5:da:c9:58:87:03:80:ef:88:7c:37:16:0c:9c:
                    25:e1:70:1a:2a:28:16:d4:2d:73:88:28:8f:46:13:b4:
                    1a:28:d3:56:a2:04:a8:36:23:b8:d1:1b:05:de:83:69:
                    d6:7d:d2:6b:ce:7c:b5:86:2c:3b:51:78:be:dd:a1:e4:
                    b6:73:39:47:b6:06:a0:f3:c0:2a:95:5d:4e:46:59:0c:
                    00:bc:6a:89:34:61:e3:ed:7a:1d:1f:27:3e:da:fd:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        29:7e:a2:24:2f:69:8c:99:fa:75:2c:94:2f:ac:f1:ef:
        fb:db:99:5e:5e:e9:ea:4d:f5:c7:fb:8a:25:d8:45:da:
        ef:75:5f:03:58:05:80:4e:9b:51:4b:e2:63:53:69:44:
        5f:e4:0e:ba:82:d5:4c:f5:49:07:0a:fa:69:a2:e8:e8:
        ac:fd:2e:15:90:40:7a:2e:bd:6f:af:a9:84:7f:9d:a7:
        7b:a0:d3:7e:3b:bc:53:5d:52:53:6c:a5:c8:91:ff:31:
        01:a5:84:53:79:88:85:58:a5:d5:f2:fb:2b:71:1b:38:
        e0:91:c9:66:c8:e6:68:f5:0b:a9:6a:3e:da:83:b3:26
    Fingerprint (MD5):
        7D:09:1F:37:B4:F9:F4:1B:9F:19:DA:BC:39:3E:19:28
    Fingerprint (SHA1):
        46:69:C8:14:DA:BB:60:70:6B:97:7D:15:A8:D0:35:B9:14:E7:6E:D2

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:28 2012
            Not After : Tue Nov 28 16:06:28 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d5:ab:3f:4e:fc:36:b8:59:e0:45:9c:e5:b8:76:79:8c:
                    c7:9f:20:ca:23:43:51:d0:93:5e:ae:a1:6a:fb:13:bc:
                    68:d9:8d:9b:79:e0:90:3e:fa:80:23:1c:11:f7:3c:9c:
                    6f:55:16:ba:08:63:9c:c0:2e:78:84:ab:68:cc:5c:58:
                    a4:66:d4:7a:b2:1e:10:60:a2:c6:2e:87:6b:5f:4c:a2:
                    08:10:41:73:f2:2d:91:e0:d1:1c:cb:53:fc:15:41:ad:
                    d0:4c:ec:f1:b2:b4:23:2f:e4:73:d3:78:82:e6:6a:f2:
                    51:e0:6c:67:15:44:65:90:36:6c:98:ae:5d:ea:c1:19
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7d:58:b1:81:23:c5:f4:71:bd:0f:5a:1c:a9:b5:26:24:
        42:5e:10:63:41:b2:af:07:ce:6f:f0:76:6e:60:d1:d9:
        37:f8:17:51:1c:54:94:8a:ac:bb:e2:dd:9e:9d:78:29:
        5b:b3:1f:ef:c9:f7:89:de:4b:32:e9:89:2a:ad:cf:6a:
        d8:8b:7b:23:6d:bd:d5:08:97:31:fb:29:28:96:5a:f5:
        f6:4c:00:eb:3e:dc:d3:b3:ff:63:0c:37:d8:83:35:cc:
        85:0d:1a:1b:32:ab:cc:7d:49:da:28:b9:ec:71:01:f6:
        57:3c:f2:f4:33:1e:4f:7a:8c:21:88:dd:80:40:cb:71
    Fingerprint (MD5):
        7D:D4:D4:F3:18:BE:38:F3:E9:C2:97:63:FA:87:CB:5C
    Fingerprint (SHA1):
        B8:BD:BB:31:26:CF:2B:20:1A:58:35:89:6F:FD:68:BF:AE:F5:03:B8

    Friendly Name: Alice

tools.sh: #4677: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4678: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4679: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
        Parameters:
            Salt:
                85:cf:d1:0e:69:f5:27:bb:da:9e:28:b4:53:04:96:4c
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:20 2012
            Not After : Tue Nov 28 16:06:20 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d0:7a:19:11:89:35:7d:47:8e:d7:4d:85:b5:d0:b4:72:
                    b4:f0:24:04:30:ac:c5:8a:69:a9:d7:7a:e4:b2:96:f1:
                    a9:3d:f5:da:c9:58:87:03:80:ef:88:7c:37:16:0c:9c:
                    25:e1:70:1a:2a:28:16:d4:2d:73:88:28:8f:46:13:b4:
                    1a:28:d3:56:a2:04:a8:36:23:b8:d1:1b:05:de:83:69:
                    d6:7d:d2:6b:ce:7c:b5:86:2c:3b:51:78:be:dd:a1:e4:
                    b6:73:39:47:b6:06:a0:f3:c0:2a:95:5d:4e:46:59:0c:
                    00:bc:6a:89:34:61:e3:ed:7a:1d:1f:27:3e:da:fd:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        29:7e:a2:24:2f:69:8c:99:fa:75:2c:94:2f:ac:f1:ef:
        fb:db:99:5e:5e:e9:ea:4d:f5:c7:fb:8a:25:d8:45:da:
        ef:75:5f:03:58:05:80:4e:9b:51:4b:e2:63:53:69:44:
        5f:e4:0e:ba:82:d5:4c:f5:49:07:0a:fa:69:a2:e8:e8:
        ac:fd:2e:15:90:40:7a:2e:bd:6f:af:a9:84:7f:9d:a7:
        7b:a0:d3:7e:3b:bc:53:5d:52:53:6c:a5:c8:91:ff:31:
        01:a5:84:53:79:88:85:58:a5:d5:f2:fb:2b:71:1b:38:
        e0:91:c9:66:c8:e6:68:f5:0b:a9:6a:3e:da:83:b3:26
    Fingerprint (MD5):
        7D:09:1F:37:B4:F9:F4:1B:9F:19:DA:BC:39:3E:19:28
    Fingerprint (SHA1):
        46:69:C8:14:DA:BB:60:70:6B:97:7D:15:A8:D0:35:B9:14:E7:6E:D2

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:28 2012
            Not After : Tue Nov 28 16:06:28 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d5:ab:3f:4e:fc:36:b8:59:e0:45:9c:e5:b8:76:79:8c:
                    c7:9f:20:ca:23:43:51:d0:93:5e:ae:a1:6a:fb:13:bc:
                    68:d9:8d:9b:79:e0:90:3e:fa:80:23:1c:11:f7:3c:9c:
                    6f:55:16:ba:08:63:9c:c0:2e:78:84:ab:68:cc:5c:58:
                    a4:66:d4:7a:b2:1e:10:60:a2:c6:2e:87:6b:5f:4c:a2:
                    08:10:41:73:f2:2d:91:e0:d1:1c:cb:53:fc:15:41:ad:
                    d0:4c:ec:f1:b2:b4:23:2f:e4:73:d3:78:82:e6:6a:f2:
                    51:e0:6c:67:15:44:65:90:36:6c:98:ae:5d:ea:c1:19
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7d:58:b1:81:23:c5:f4:71:bd:0f:5a:1c:a9:b5:26:24:
        42:5e:10:63:41:b2:af:07:ce:6f:f0:76:6e:60:d1:d9:
        37:f8:17:51:1c:54:94:8a:ac:bb:e2:dd:9e:9d:78:29:
        5b:b3:1f:ef:c9:f7:89:de:4b:32:e9:89:2a:ad:cf:6a:
        d8:8b:7b:23:6d:bd:d5:08:97:31:fb:29:28:96:5a:f5:
        f6:4c:00:eb:3e:dc:d3:b3:ff:63:0c:37:d8:83:35:cc:
        85:0d:1a:1b:32:ab:cc:7d:49:da:28:b9:ec:71:01:f6:
        57:3c:f2:f4:33:1e:4f:7a:8c:21:88:dd:80:40:cb:71
    Fingerprint (MD5):
        7D:D4:D4:F3:18:BE:38:F3:E9:C2:97:63:FA:87:CB:5C
    Fingerprint (SHA1):
        B8:BD:BB:31:26:CF:2B:20:1A:58:35:89:6F:FD:68:BF:AE:F5:03:B8

    Friendly Name: Alice

tools.sh: #4680: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4681: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4682: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
        Parameters:
            Salt:
                14:19:9f:dd:fc:64:7b:3a:c7:47:a9:02:37:4b:27:38
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:20 2012
            Not After : Tue Nov 28 16:06:20 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d0:7a:19:11:89:35:7d:47:8e:d7:4d:85:b5:d0:b4:72:
                    b4:f0:24:04:30:ac:c5:8a:69:a9:d7:7a:e4:b2:96:f1:
                    a9:3d:f5:da:c9:58:87:03:80:ef:88:7c:37:16:0c:9c:
                    25:e1:70:1a:2a:28:16:d4:2d:73:88:28:8f:46:13:b4:
                    1a:28:d3:56:a2:04:a8:36:23:b8:d1:1b:05:de:83:69:
                    d6:7d:d2:6b:ce:7c:b5:86:2c:3b:51:78:be:dd:a1:e4:
                    b6:73:39:47:b6:06:a0:f3:c0:2a:95:5d:4e:46:59:0c:
                    00:bc:6a:89:34:61:e3:ed:7a:1d:1f:27:3e:da:fd:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        29:7e:a2:24:2f:69:8c:99:fa:75:2c:94:2f:ac:f1:ef:
        fb:db:99:5e:5e:e9:ea:4d:f5:c7:fb:8a:25:d8:45:da:
        ef:75:5f:03:58:05:80:4e:9b:51:4b:e2:63:53:69:44:
        5f:e4:0e:ba:82:d5:4c:f5:49:07:0a:fa:69:a2:e8:e8:
        ac:fd:2e:15:90:40:7a:2e:bd:6f:af:a9:84:7f:9d:a7:
        7b:a0:d3:7e:3b:bc:53:5d:52:53:6c:a5:c8:91:ff:31:
        01:a5:84:53:79:88:85:58:a5:d5:f2:fb:2b:71:1b:38:
        e0:91:c9:66:c8:e6:68:f5:0b:a9:6a:3e:da:83:b3:26
    Fingerprint (MD5):
        7D:09:1F:37:B4:F9:F4:1B:9F:19:DA:BC:39:3E:19:28
    Fingerprint (SHA1):
        46:69:C8:14:DA:BB:60:70:6B:97:7D:15:A8:D0:35:B9:14:E7:6E:D2

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:28 2012
            Not After : Tue Nov 28 16:06:28 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d5:ab:3f:4e:fc:36:b8:59:e0:45:9c:e5:b8:76:79:8c:
                    c7:9f:20:ca:23:43:51:d0:93:5e:ae:a1:6a:fb:13:bc:
                    68:d9:8d:9b:79:e0:90:3e:fa:80:23:1c:11:f7:3c:9c:
                    6f:55:16:ba:08:63:9c:c0:2e:78:84:ab:68:cc:5c:58:
                    a4:66:d4:7a:b2:1e:10:60:a2:c6:2e:87:6b:5f:4c:a2:
                    08:10:41:73:f2:2d:91:e0:d1:1c:cb:53:fc:15:41:ad:
                    d0:4c:ec:f1:b2:b4:23:2f:e4:73:d3:78:82:e6:6a:f2:
                    51:e0:6c:67:15:44:65:90:36:6c:98:ae:5d:ea:c1:19
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7d:58:b1:81:23:c5:f4:71:bd:0f:5a:1c:a9:b5:26:24:
        42:5e:10:63:41:b2:af:07:ce:6f:f0:76:6e:60:d1:d9:
        37:f8:17:51:1c:54:94:8a:ac:bb:e2:dd:9e:9d:78:29:
        5b:b3:1f:ef:c9:f7:89:de:4b:32:e9:89:2a:ad:cf:6a:
        d8:8b:7b:23:6d:bd:d5:08:97:31:fb:29:28:96:5a:f5:
        f6:4c:00:eb:3e:dc:d3:b3:ff:63:0c:37:d8:83:35:cc:
        85:0d:1a:1b:32:ab:cc:7d:49:da:28:b9:ec:71:01:f6:
        57:3c:f2:f4:33:1e:4f:7a:8c:21:88:dd:80:40:cb:71
    Fingerprint (MD5):
        7D:D4:D4:F3:18:BE:38:F3:E9:C2:97:63:FA:87:CB:5C
    Fingerprint (SHA1):
        B8:BD:BB:31:26:CF:2B:20:1A:58:35:89:6F:FD:68:BF:AE:F5:03:B8

    Friendly Name: Alice

tools.sh: #4683: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4684: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4685: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:20 2012
            Not After : Tue Nov 28 16:06:20 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d0:7a:19:11:89:35:7d:47:8e:d7:4d:85:b5:d0:b4:72:
                    b4:f0:24:04:30:ac:c5:8a:69:a9:d7:7a:e4:b2:96:f1:
                    a9:3d:f5:da:c9:58:87:03:80:ef:88:7c:37:16:0c:9c:
                    25:e1:70:1a:2a:28:16:d4:2d:73:88:28:8f:46:13:b4:
                    1a:28:d3:56:a2:04:a8:36:23:b8:d1:1b:05:de:83:69:
                    d6:7d:d2:6b:ce:7c:b5:86:2c:3b:51:78:be:dd:a1:e4:
                    b6:73:39:47:b6:06:a0:f3:c0:2a:95:5d:4e:46:59:0c:
                    00:bc:6a:89:34:61:e3:ed:7a:1d:1f:27:3e:da:fd:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        29:7e:a2:24:2f:69:8c:99:fa:75:2c:94:2f:ac:f1:ef:
        fb:db:99:5e:5e:e9:ea:4d:f5:c7:fb:8a:25:d8:45:da:
        ef:75:5f:03:58:05:80:4e:9b:51:4b:e2:63:53:69:44:
        5f:e4:0e:ba:82:d5:4c:f5:49:07:0a:fa:69:a2:e8:e8:
        ac:fd:2e:15:90:40:7a:2e:bd:6f:af:a9:84:7f:9d:a7:
        7b:a0:d3:7e:3b:bc:53:5d:52:53:6c:a5:c8:91:ff:31:
        01:a5:84:53:79:88:85:58:a5:d5:f2:fb:2b:71:1b:38:
        e0:91:c9:66:c8:e6:68:f5:0b:a9:6a:3e:da:83:b3:26
    Fingerprint (MD5):
        7D:09:1F:37:B4:F9:F4:1B:9F:19:DA:BC:39:3E:19:28
    Fingerprint (SHA1):
        46:69:C8:14:DA:BB:60:70:6B:97:7D:15:A8:D0:35:B9:14:E7:6E:D2

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:28 2012
            Not After : Tue Nov 28 16:06:28 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d5:ab:3f:4e:fc:36:b8:59:e0:45:9c:e5:b8:76:79:8c:
                    c7:9f:20:ca:23:43:51:d0:93:5e:ae:a1:6a:fb:13:bc:
                    68:d9:8d:9b:79:e0:90:3e:fa:80:23:1c:11:f7:3c:9c:
                    6f:55:16:ba:08:63:9c:c0:2e:78:84:ab:68:cc:5c:58:
                    a4:66:d4:7a:b2:1e:10:60:a2:c6:2e:87:6b:5f:4c:a2:
                    08:10:41:73:f2:2d:91:e0:d1:1c:cb:53:fc:15:41:ad:
                    d0:4c:ec:f1:b2:b4:23:2f:e4:73:d3:78:82:e6:6a:f2:
                    51:e0:6c:67:15:44:65:90:36:6c:98:ae:5d:ea:c1:19
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7d:58:b1:81:23:c5:f4:71:bd:0f:5a:1c:a9:b5:26:24:
        42:5e:10:63:41:b2:af:07:ce:6f:f0:76:6e:60:d1:d9:
        37:f8:17:51:1c:54:94:8a:ac:bb:e2:dd:9e:9d:78:29:
        5b:b3:1f:ef:c9:f7:89:de:4b:32:e9:89:2a:ad:cf:6a:
        d8:8b:7b:23:6d:bd:d5:08:97:31:fb:29:28:96:5a:f5:
        f6:4c:00:eb:3e:dc:d3:b3:ff:63:0c:37:d8:83:35:cc:
        85:0d:1a:1b:32:ab:cc:7d:49:da:28:b9:ec:71:01:f6:
        57:3c:f2:f4:33:1e:4f:7a:8c:21:88:dd:80:40:cb:71
    Fingerprint (MD5):
        7D:D4:D4:F3:18:BE:38:F3:E9:C2:97:63:FA:87:CB:5C
    Fingerprint (SHA1):
        B8:BD:BB:31:26:CF:2B:20:1A:58:35:89:6F:FD:68:BF:AE:F5:03:B8

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
        Parameters:
            Salt:
                3c:73:08:94:c6:b2:d4:47:83:53:ec:a6:9b:ba:d4:fa
            Iteration Count: 2000 (0x7d0)
tools.sh: #4686: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4687: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4688: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
        Parameters:
            Salt:
                29:88:2b:6a:bd:e6:31:39:82:cc:62:f7:3f:b3:fa:cd
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:20 2012
            Not After : Tue Nov 28 16:06:20 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d0:7a:19:11:89:35:7d:47:8e:d7:4d:85:b5:d0:b4:72:
                    b4:f0:24:04:30:ac:c5:8a:69:a9:d7:7a:e4:b2:96:f1:
                    a9:3d:f5:da:c9:58:87:03:80:ef:88:7c:37:16:0c:9c:
                    25:e1:70:1a:2a:28:16:d4:2d:73:88:28:8f:46:13:b4:
                    1a:28:d3:56:a2:04:a8:36:23:b8:d1:1b:05:de:83:69:
                    d6:7d:d2:6b:ce:7c:b5:86:2c:3b:51:78:be:dd:a1:e4:
                    b6:73:39:47:b6:06:a0:f3:c0:2a:95:5d:4e:46:59:0c:
                    00:bc:6a:89:34:61:e3:ed:7a:1d:1f:27:3e:da:fd:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        29:7e:a2:24:2f:69:8c:99:fa:75:2c:94:2f:ac:f1:ef:
        fb:db:99:5e:5e:e9:ea:4d:f5:c7:fb:8a:25:d8:45:da:
        ef:75:5f:03:58:05:80:4e:9b:51:4b:e2:63:53:69:44:
        5f:e4:0e:ba:82:d5:4c:f5:49:07:0a:fa:69:a2:e8:e8:
        ac:fd:2e:15:90:40:7a:2e:bd:6f:af:a9:84:7f:9d:a7:
        7b:a0:d3:7e:3b:bc:53:5d:52:53:6c:a5:c8:91:ff:31:
        01:a5:84:53:79:88:85:58:a5:d5:f2:fb:2b:71:1b:38:
        e0:91:c9:66:c8:e6:68:f5:0b:a9:6a:3e:da:83:b3:26
    Fingerprint (MD5):
        7D:09:1F:37:B4:F9:F4:1B:9F:19:DA:BC:39:3E:19:28
    Fingerprint (SHA1):
        46:69:C8:14:DA:BB:60:70:6B:97:7D:15:A8:D0:35:B9:14:E7:6E:D2

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:28 2012
            Not After : Tue Nov 28 16:06:28 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d5:ab:3f:4e:fc:36:b8:59:e0:45:9c:e5:b8:76:79:8c:
                    c7:9f:20:ca:23:43:51:d0:93:5e:ae:a1:6a:fb:13:bc:
                    68:d9:8d:9b:79:e0:90:3e:fa:80:23:1c:11:f7:3c:9c:
                    6f:55:16:ba:08:63:9c:c0:2e:78:84:ab:68:cc:5c:58:
                    a4:66:d4:7a:b2:1e:10:60:a2:c6:2e:87:6b:5f:4c:a2:
                    08:10:41:73:f2:2d:91:e0:d1:1c:cb:53:fc:15:41:ad:
                    d0:4c:ec:f1:b2:b4:23:2f:e4:73:d3:78:82:e6:6a:f2:
                    51:e0:6c:67:15:44:65:90:36:6c:98:ae:5d:ea:c1:19
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7d:58:b1:81:23:c5:f4:71:bd:0f:5a:1c:a9:b5:26:24:
        42:5e:10:63:41:b2:af:07:ce:6f:f0:76:6e:60:d1:d9:
        37:f8:17:51:1c:54:94:8a:ac:bb:e2:dd:9e:9d:78:29:
        5b:b3:1f:ef:c9:f7:89:de:4b:32:e9:89:2a:ad:cf:6a:
        d8:8b:7b:23:6d:bd:d5:08:97:31:fb:29:28:96:5a:f5:
        f6:4c:00:eb:3e:dc:d3:b3:ff:63:0c:37:d8:83:35:cc:
        85:0d:1a:1b:32:ab:cc:7d:49:da:28:b9:ec:71:01:f6:
        57:3c:f2:f4:33:1e:4f:7a:8c:21:88:dd:80:40:cb:71
    Fingerprint (MD5):
        7D:D4:D4:F3:18:BE:38:F3:E9:C2:97:63:FA:87:CB:5C
    Fingerprint (SHA1):
        B8:BD:BB:31:26:CF:2B:20:1A:58:35:89:6F:FD:68:BF:AE:F5:03:B8

    Friendly Name: Alice

tools.sh: #4689: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4690: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4691: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
        Parameters:
            Salt:
                d3:0f:e7:ed:f6:2f:55:2e:53:d0:76:6f:75:a3:5e:76
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:20 2012
            Not After : Tue Nov 28 16:06:20 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d0:7a:19:11:89:35:7d:47:8e:d7:4d:85:b5:d0:b4:72:
                    b4:f0:24:04:30:ac:c5:8a:69:a9:d7:7a:e4:b2:96:f1:
                    a9:3d:f5:da:c9:58:87:03:80:ef:88:7c:37:16:0c:9c:
                    25:e1:70:1a:2a:28:16:d4:2d:73:88:28:8f:46:13:b4:
                    1a:28:d3:56:a2:04:a8:36:23:b8:d1:1b:05:de:83:69:
                    d6:7d:d2:6b:ce:7c:b5:86:2c:3b:51:78:be:dd:a1:e4:
                    b6:73:39:47:b6:06:a0:f3:c0:2a:95:5d:4e:46:59:0c:
                    00:bc:6a:89:34:61:e3:ed:7a:1d:1f:27:3e:da:fd:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        29:7e:a2:24:2f:69:8c:99:fa:75:2c:94:2f:ac:f1:ef:
        fb:db:99:5e:5e:e9:ea:4d:f5:c7:fb:8a:25:d8:45:da:
        ef:75:5f:03:58:05:80:4e:9b:51:4b:e2:63:53:69:44:
        5f:e4:0e:ba:82:d5:4c:f5:49:07:0a:fa:69:a2:e8:e8:
        ac:fd:2e:15:90:40:7a:2e:bd:6f:af:a9:84:7f:9d:a7:
        7b:a0:d3:7e:3b:bc:53:5d:52:53:6c:a5:c8:91:ff:31:
        01:a5:84:53:79:88:85:58:a5:d5:f2:fb:2b:71:1b:38:
        e0:91:c9:66:c8:e6:68:f5:0b:a9:6a:3e:da:83:b3:26
    Fingerprint (MD5):
        7D:09:1F:37:B4:F9:F4:1B:9F:19:DA:BC:39:3E:19:28
    Fingerprint (SHA1):
        46:69:C8:14:DA:BB:60:70:6B:97:7D:15:A8:D0:35:B9:14:E7:6E:D2

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:28 2012
            Not After : Tue Nov 28 16:06:28 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d5:ab:3f:4e:fc:36:b8:59:e0:45:9c:e5:b8:76:79:8c:
                    c7:9f:20:ca:23:43:51:d0:93:5e:ae:a1:6a:fb:13:bc:
                    68:d9:8d:9b:79:e0:90:3e:fa:80:23:1c:11:f7:3c:9c:
                    6f:55:16:ba:08:63:9c:c0:2e:78:84:ab:68:cc:5c:58:
                    a4:66:d4:7a:b2:1e:10:60:a2:c6:2e:87:6b:5f:4c:a2:
                    08:10:41:73:f2:2d:91:e0:d1:1c:cb:53:fc:15:41:ad:
                    d0:4c:ec:f1:b2:b4:23:2f:e4:73:d3:78:82:e6:6a:f2:
                    51:e0:6c:67:15:44:65:90:36:6c:98:ae:5d:ea:c1:19
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7d:58:b1:81:23:c5:f4:71:bd:0f:5a:1c:a9:b5:26:24:
        42:5e:10:63:41:b2:af:07:ce:6f:f0:76:6e:60:d1:d9:
        37:f8:17:51:1c:54:94:8a:ac:bb:e2:dd:9e:9d:78:29:
        5b:b3:1f:ef:c9:f7:89:de:4b:32:e9:89:2a:ad:cf:6a:
        d8:8b:7b:23:6d:bd:d5:08:97:31:fb:29:28:96:5a:f5:
        f6:4c:00:eb:3e:dc:d3:b3:ff:63:0c:37:d8:83:35:cc:
        85:0d:1a:1b:32:ab:cc:7d:49:da:28:b9:ec:71:01:f6:
        57:3c:f2:f4:33:1e:4f:7a:8c:21:88:dd:80:40:cb:71
    Fingerprint (MD5):
        7D:D4:D4:F3:18:BE:38:F3:E9:C2:97:63:FA:87:CB:5C
    Fingerprint (SHA1):
        B8:BD:BB:31:26:CF:2B:20:1A:58:35:89:6F:FD:68:BF:AE:F5:03:B8

    Friendly Name: Alice

tools.sh: #4692: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4693: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4694: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
        Parameters:
            Salt:
                b6:15:23:49:27:00:2a:ca:67:1a:cc:3b:68:d0:77:5d
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:20 2012
            Not After : Tue Nov 28 16:06:20 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d0:7a:19:11:89:35:7d:47:8e:d7:4d:85:b5:d0:b4:72:
                    b4:f0:24:04:30:ac:c5:8a:69:a9:d7:7a:e4:b2:96:f1:
                    a9:3d:f5:da:c9:58:87:03:80:ef:88:7c:37:16:0c:9c:
                    25:e1:70:1a:2a:28:16:d4:2d:73:88:28:8f:46:13:b4:
                    1a:28:d3:56:a2:04:a8:36:23:b8:d1:1b:05:de:83:69:
                    d6:7d:d2:6b:ce:7c:b5:86:2c:3b:51:78:be:dd:a1:e4:
                    b6:73:39:47:b6:06:a0:f3:c0:2a:95:5d:4e:46:59:0c:
                    00:bc:6a:89:34:61:e3:ed:7a:1d:1f:27:3e:da:fd:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        29:7e:a2:24:2f:69:8c:99:fa:75:2c:94:2f:ac:f1:ef:
        fb:db:99:5e:5e:e9:ea:4d:f5:c7:fb:8a:25:d8:45:da:
        ef:75:5f:03:58:05:80:4e:9b:51:4b:e2:63:53:69:44:
        5f:e4:0e:ba:82:d5:4c:f5:49:07:0a:fa:69:a2:e8:e8:
        ac:fd:2e:15:90:40:7a:2e:bd:6f:af:a9:84:7f:9d:a7:
        7b:a0:d3:7e:3b:bc:53:5d:52:53:6c:a5:c8:91:ff:31:
        01:a5:84:53:79:88:85:58:a5:d5:f2:fb:2b:71:1b:38:
        e0:91:c9:66:c8:e6:68:f5:0b:a9:6a:3e:da:83:b3:26
    Fingerprint (MD5):
        7D:09:1F:37:B4:F9:F4:1B:9F:19:DA:BC:39:3E:19:28
    Fingerprint (SHA1):
        46:69:C8:14:DA:BB:60:70:6B:97:7D:15:A8:D0:35:B9:14:E7:6E:D2

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:28 2012
            Not After : Tue Nov 28 16:06:28 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d5:ab:3f:4e:fc:36:b8:59:e0:45:9c:e5:b8:76:79:8c:
                    c7:9f:20:ca:23:43:51:d0:93:5e:ae:a1:6a:fb:13:bc:
                    68:d9:8d:9b:79:e0:90:3e:fa:80:23:1c:11:f7:3c:9c:
                    6f:55:16:ba:08:63:9c:c0:2e:78:84:ab:68:cc:5c:58:
                    a4:66:d4:7a:b2:1e:10:60:a2:c6:2e:87:6b:5f:4c:a2:
                    08:10:41:73:f2:2d:91:e0:d1:1c:cb:53:fc:15:41:ad:
                    d0:4c:ec:f1:b2:b4:23:2f:e4:73:d3:78:82:e6:6a:f2:
                    51:e0:6c:67:15:44:65:90:36:6c:98:ae:5d:ea:c1:19
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7d:58:b1:81:23:c5:f4:71:bd:0f:5a:1c:a9:b5:26:24:
        42:5e:10:63:41:b2:af:07:ce:6f:f0:76:6e:60:d1:d9:
        37:f8:17:51:1c:54:94:8a:ac:bb:e2:dd:9e:9d:78:29:
        5b:b3:1f:ef:c9:f7:89:de:4b:32:e9:89:2a:ad:cf:6a:
        d8:8b:7b:23:6d:bd:d5:08:97:31:fb:29:28:96:5a:f5:
        f6:4c:00:eb:3e:dc:d3:b3:ff:63:0c:37:d8:83:35:cc:
        85:0d:1a:1b:32:ab:cc:7d:49:da:28:b9:ec:71:01:f6:
        57:3c:f2:f4:33:1e:4f:7a:8c:21:88:dd:80:40:cb:71
    Fingerprint (MD5):
        7D:D4:D4:F3:18:BE:38:F3:E9:C2:97:63:FA:87:CB:5C
    Fingerprint (SHA1):
        B8:BD:BB:31:26:CF:2B:20:1A:58:35:89:6F:FD:68:BF:AE:F5:03:B8

    Friendly Name: Alice

tools.sh: #4695: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4696: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4697: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
        Parameters:
            Salt:
                48:04:df:86:b2:b9:c0:7a:11:88:b7:c2:c9:bf:ca:ba
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:20 2012
            Not After : Tue Nov 28 16:06:20 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d0:7a:19:11:89:35:7d:47:8e:d7:4d:85:b5:d0:b4:72:
                    b4:f0:24:04:30:ac:c5:8a:69:a9:d7:7a:e4:b2:96:f1:
                    a9:3d:f5:da:c9:58:87:03:80:ef:88:7c:37:16:0c:9c:
                    25:e1:70:1a:2a:28:16:d4:2d:73:88:28:8f:46:13:b4:
                    1a:28:d3:56:a2:04:a8:36:23:b8:d1:1b:05:de:83:69:
                    d6:7d:d2:6b:ce:7c:b5:86:2c:3b:51:78:be:dd:a1:e4:
                    b6:73:39:47:b6:06:a0:f3:c0:2a:95:5d:4e:46:59:0c:
                    00:bc:6a:89:34:61:e3:ed:7a:1d:1f:27:3e:da:fd:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        29:7e:a2:24:2f:69:8c:99:fa:75:2c:94:2f:ac:f1:ef:
        fb:db:99:5e:5e:e9:ea:4d:f5:c7:fb:8a:25:d8:45:da:
        ef:75:5f:03:58:05:80:4e:9b:51:4b:e2:63:53:69:44:
        5f:e4:0e:ba:82:d5:4c:f5:49:07:0a:fa:69:a2:e8:e8:
        ac:fd:2e:15:90:40:7a:2e:bd:6f:af:a9:84:7f:9d:a7:
        7b:a0:d3:7e:3b:bc:53:5d:52:53:6c:a5:c8:91:ff:31:
        01:a5:84:53:79:88:85:58:a5:d5:f2:fb:2b:71:1b:38:
        e0:91:c9:66:c8:e6:68:f5:0b:a9:6a:3e:da:83:b3:26
    Fingerprint (MD5):
        7D:09:1F:37:B4:F9:F4:1B:9F:19:DA:BC:39:3E:19:28
    Fingerprint (SHA1):
        46:69:C8:14:DA:BB:60:70:6B:97:7D:15:A8:D0:35:B9:14:E7:6E:D2

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:28 2012
            Not After : Tue Nov 28 16:06:28 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d5:ab:3f:4e:fc:36:b8:59:e0:45:9c:e5:b8:76:79:8c:
                    c7:9f:20:ca:23:43:51:d0:93:5e:ae:a1:6a:fb:13:bc:
                    68:d9:8d:9b:79:e0:90:3e:fa:80:23:1c:11:f7:3c:9c:
                    6f:55:16:ba:08:63:9c:c0:2e:78:84:ab:68:cc:5c:58:
                    a4:66:d4:7a:b2:1e:10:60:a2:c6:2e:87:6b:5f:4c:a2:
                    08:10:41:73:f2:2d:91:e0:d1:1c:cb:53:fc:15:41:ad:
                    d0:4c:ec:f1:b2:b4:23:2f:e4:73:d3:78:82:e6:6a:f2:
                    51:e0:6c:67:15:44:65:90:36:6c:98:ae:5d:ea:c1:19
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7d:58:b1:81:23:c5:f4:71:bd:0f:5a:1c:a9:b5:26:24:
        42:5e:10:63:41:b2:af:07:ce:6f:f0:76:6e:60:d1:d9:
        37:f8:17:51:1c:54:94:8a:ac:bb:e2:dd:9e:9d:78:29:
        5b:b3:1f:ef:c9:f7:89:de:4b:32:e9:89:2a:ad:cf:6a:
        d8:8b:7b:23:6d:bd:d5:08:97:31:fb:29:28:96:5a:f5:
        f6:4c:00:eb:3e:dc:d3:b3:ff:63:0c:37:d8:83:35:cc:
        85:0d:1a:1b:32:ab:cc:7d:49:da:28:b9:ec:71:01:f6:
        57:3c:f2:f4:33:1e:4f:7a:8c:21:88:dd:80:40:cb:71
    Fingerprint (MD5):
        7D:D4:D4:F3:18:BE:38:F3:E9:C2:97:63:FA:87:CB:5C
    Fingerprint (SHA1):
        B8:BD:BB:31:26:CF:2B:20:1A:58:35:89:6F:FD:68:BF:AE:F5:03:B8

    Friendly Name: Alice

tools.sh: #4698: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4699: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4700: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:20 2012
            Not After : Tue Nov 28 16:06:20 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d0:7a:19:11:89:35:7d:47:8e:d7:4d:85:b5:d0:b4:72:
                    b4:f0:24:04:30:ac:c5:8a:69:a9:d7:7a:e4:b2:96:f1:
                    a9:3d:f5:da:c9:58:87:03:80:ef:88:7c:37:16:0c:9c:
                    25:e1:70:1a:2a:28:16:d4:2d:73:88:28:8f:46:13:b4:
                    1a:28:d3:56:a2:04:a8:36:23:b8:d1:1b:05:de:83:69:
                    d6:7d:d2:6b:ce:7c:b5:86:2c:3b:51:78:be:dd:a1:e4:
                    b6:73:39:47:b6:06:a0:f3:c0:2a:95:5d:4e:46:59:0c:
                    00:bc:6a:89:34:61:e3:ed:7a:1d:1f:27:3e:da:fd:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        29:7e:a2:24:2f:69:8c:99:fa:75:2c:94:2f:ac:f1:ef:
        fb:db:99:5e:5e:e9:ea:4d:f5:c7:fb:8a:25:d8:45:da:
        ef:75:5f:03:58:05:80:4e:9b:51:4b:e2:63:53:69:44:
        5f:e4:0e:ba:82:d5:4c:f5:49:07:0a:fa:69:a2:e8:e8:
        ac:fd:2e:15:90:40:7a:2e:bd:6f:af:a9:84:7f:9d:a7:
        7b:a0:d3:7e:3b:bc:53:5d:52:53:6c:a5:c8:91:ff:31:
        01:a5:84:53:79:88:85:58:a5:d5:f2:fb:2b:71:1b:38:
        e0:91:c9:66:c8:e6:68:f5:0b:a9:6a:3e:da:83:b3:26
    Fingerprint (MD5):
        7D:09:1F:37:B4:F9:F4:1B:9F:19:DA:BC:39:3E:19:28
    Fingerprint (SHA1):
        46:69:C8:14:DA:BB:60:70:6B:97:7D:15:A8:D0:35:B9:14:E7:6E:D2

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:28 2012
            Not After : Tue Nov 28 16:06:28 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d5:ab:3f:4e:fc:36:b8:59:e0:45:9c:e5:b8:76:79:8c:
                    c7:9f:20:ca:23:43:51:d0:93:5e:ae:a1:6a:fb:13:bc:
                    68:d9:8d:9b:79:e0:90:3e:fa:80:23:1c:11:f7:3c:9c:
                    6f:55:16:ba:08:63:9c:c0:2e:78:84:ab:68:cc:5c:58:
                    a4:66:d4:7a:b2:1e:10:60:a2:c6:2e:87:6b:5f:4c:a2:
                    08:10:41:73:f2:2d:91:e0:d1:1c:cb:53:fc:15:41:ad:
                    d0:4c:ec:f1:b2:b4:23:2f:e4:73:d3:78:82:e6:6a:f2:
                    51:e0:6c:67:15:44:65:90:36:6c:98:ae:5d:ea:c1:19
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7d:58:b1:81:23:c5:f4:71:bd:0f:5a:1c:a9:b5:26:24:
        42:5e:10:63:41:b2:af:07:ce:6f:f0:76:6e:60:d1:d9:
        37:f8:17:51:1c:54:94:8a:ac:bb:e2:dd:9e:9d:78:29:
        5b:b3:1f:ef:c9:f7:89:de:4b:32:e9:89:2a:ad:cf:6a:
        d8:8b:7b:23:6d:bd:d5:08:97:31:fb:29:28:96:5a:f5:
        f6:4c:00:eb:3e:dc:d3:b3:ff:63:0c:37:d8:83:35:cc:
        85:0d:1a:1b:32:ab:cc:7d:49:da:28:b9:ec:71:01:f6:
        57:3c:f2:f4:33:1e:4f:7a:8c:21:88:dd:80:40:cb:71
    Fingerprint (MD5):
        7D:D4:D4:F3:18:BE:38:F3:E9:C2:97:63:FA:87:CB:5C
    Fingerprint (SHA1):
        B8:BD:BB:31:26:CF:2B:20:1A:58:35:89:6F:FD:68:BF:AE:F5:03:B8

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
        Parameters:
            Salt:
                eb:10:48:b1:98:31:42:d3:95:08:8c:41:57:20:13:cc
            Iteration Count: 2000 (0x7d0)
tools.sh: #4701: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4702: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4703: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                7a:01:f7:12:e6:b8:64:de:38:62:85:3a:70:1f:ca:ed
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:20 2012
            Not After : Tue Nov 28 16:06:20 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d0:7a:19:11:89:35:7d:47:8e:d7:4d:85:b5:d0:b4:72:
                    b4:f0:24:04:30:ac:c5:8a:69:a9:d7:7a:e4:b2:96:f1:
                    a9:3d:f5:da:c9:58:87:03:80:ef:88:7c:37:16:0c:9c:
                    25:e1:70:1a:2a:28:16:d4:2d:73:88:28:8f:46:13:b4:
                    1a:28:d3:56:a2:04:a8:36:23:b8:d1:1b:05:de:83:69:
                    d6:7d:d2:6b:ce:7c:b5:86:2c:3b:51:78:be:dd:a1:e4:
                    b6:73:39:47:b6:06:a0:f3:c0:2a:95:5d:4e:46:59:0c:
                    00:bc:6a:89:34:61:e3:ed:7a:1d:1f:27:3e:da:fd:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        29:7e:a2:24:2f:69:8c:99:fa:75:2c:94:2f:ac:f1:ef:
        fb:db:99:5e:5e:e9:ea:4d:f5:c7:fb:8a:25:d8:45:da:
        ef:75:5f:03:58:05:80:4e:9b:51:4b:e2:63:53:69:44:
        5f:e4:0e:ba:82:d5:4c:f5:49:07:0a:fa:69:a2:e8:e8:
        ac:fd:2e:15:90:40:7a:2e:bd:6f:af:a9:84:7f:9d:a7:
        7b:a0:d3:7e:3b:bc:53:5d:52:53:6c:a5:c8:91:ff:31:
        01:a5:84:53:79:88:85:58:a5:d5:f2:fb:2b:71:1b:38:
        e0:91:c9:66:c8:e6:68:f5:0b:a9:6a:3e:da:83:b3:26
    Fingerprint (MD5):
        7D:09:1F:37:B4:F9:F4:1B:9F:19:DA:BC:39:3E:19:28
    Fingerprint (SHA1):
        46:69:C8:14:DA:BB:60:70:6B:97:7D:15:A8:D0:35:B9:14:E7:6E:D2

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:28 2012
            Not After : Tue Nov 28 16:06:28 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d5:ab:3f:4e:fc:36:b8:59:e0:45:9c:e5:b8:76:79:8c:
                    c7:9f:20:ca:23:43:51:d0:93:5e:ae:a1:6a:fb:13:bc:
                    68:d9:8d:9b:79:e0:90:3e:fa:80:23:1c:11:f7:3c:9c:
                    6f:55:16:ba:08:63:9c:c0:2e:78:84:ab:68:cc:5c:58:
                    a4:66:d4:7a:b2:1e:10:60:a2:c6:2e:87:6b:5f:4c:a2:
                    08:10:41:73:f2:2d:91:e0:d1:1c:cb:53:fc:15:41:ad:
                    d0:4c:ec:f1:b2:b4:23:2f:e4:73:d3:78:82:e6:6a:f2:
                    51:e0:6c:67:15:44:65:90:36:6c:98:ae:5d:ea:c1:19
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7d:58:b1:81:23:c5:f4:71:bd:0f:5a:1c:a9:b5:26:24:
        42:5e:10:63:41:b2:af:07:ce:6f:f0:76:6e:60:d1:d9:
        37:f8:17:51:1c:54:94:8a:ac:bb:e2:dd:9e:9d:78:29:
        5b:b3:1f:ef:c9:f7:89:de:4b:32:e9:89:2a:ad:cf:6a:
        d8:8b:7b:23:6d:bd:d5:08:97:31:fb:29:28:96:5a:f5:
        f6:4c:00:eb:3e:dc:d3:b3:ff:63:0c:37:d8:83:35:cc:
        85:0d:1a:1b:32:ab:cc:7d:49:da:28:b9:ec:71:01:f6:
        57:3c:f2:f4:33:1e:4f:7a:8c:21:88:dd:80:40:cb:71
    Fingerprint (MD5):
        7D:D4:D4:F3:18:BE:38:F3:E9:C2:97:63:FA:87:CB:5C
    Fingerprint (SHA1):
        B8:BD:BB:31:26:CF:2B:20:1A:58:35:89:6F:FD:68:BF:AE:F5:03:B8

    Friendly Name: Alice

tools.sh: #4704: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4705: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4706: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                b7:93:e6:e7:6d:3d:90:1b:f3:71:5f:33:6a:4f:52:37
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:20 2012
            Not After : Tue Nov 28 16:06:20 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d0:7a:19:11:89:35:7d:47:8e:d7:4d:85:b5:d0:b4:72:
                    b4:f0:24:04:30:ac:c5:8a:69:a9:d7:7a:e4:b2:96:f1:
                    a9:3d:f5:da:c9:58:87:03:80:ef:88:7c:37:16:0c:9c:
                    25:e1:70:1a:2a:28:16:d4:2d:73:88:28:8f:46:13:b4:
                    1a:28:d3:56:a2:04:a8:36:23:b8:d1:1b:05:de:83:69:
                    d6:7d:d2:6b:ce:7c:b5:86:2c:3b:51:78:be:dd:a1:e4:
                    b6:73:39:47:b6:06:a0:f3:c0:2a:95:5d:4e:46:59:0c:
                    00:bc:6a:89:34:61:e3:ed:7a:1d:1f:27:3e:da:fd:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        29:7e:a2:24:2f:69:8c:99:fa:75:2c:94:2f:ac:f1:ef:
        fb:db:99:5e:5e:e9:ea:4d:f5:c7:fb:8a:25:d8:45:da:
        ef:75:5f:03:58:05:80:4e:9b:51:4b:e2:63:53:69:44:
        5f:e4:0e:ba:82:d5:4c:f5:49:07:0a:fa:69:a2:e8:e8:
        ac:fd:2e:15:90:40:7a:2e:bd:6f:af:a9:84:7f:9d:a7:
        7b:a0:d3:7e:3b:bc:53:5d:52:53:6c:a5:c8:91:ff:31:
        01:a5:84:53:79:88:85:58:a5:d5:f2:fb:2b:71:1b:38:
        e0:91:c9:66:c8:e6:68:f5:0b:a9:6a:3e:da:83:b3:26
    Fingerprint (MD5):
        7D:09:1F:37:B4:F9:F4:1B:9F:19:DA:BC:39:3E:19:28
    Fingerprint (SHA1):
        46:69:C8:14:DA:BB:60:70:6B:97:7D:15:A8:D0:35:B9:14:E7:6E:D2

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:28 2012
            Not After : Tue Nov 28 16:06:28 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d5:ab:3f:4e:fc:36:b8:59:e0:45:9c:e5:b8:76:79:8c:
                    c7:9f:20:ca:23:43:51:d0:93:5e:ae:a1:6a:fb:13:bc:
                    68:d9:8d:9b:79:e0:90:3e:fa:80:23:1c:11:f7:3c:9c:
                    6f:55:16:ba:08:63:9c:c0:2e:78:84:ab:68:cc:5c:58:
                    a4:66:d4:7a:b2:1e:10:60:a2:c6:2e:87:6b:5f:4c:a2:
                    08:10:41:73:f2:2d:91:e0:d1:1c:cb:53:fc:15:41:ad:
                    d0:4c:ec:f1:b2:b4:23:2f:e4:73:d3:78:82:e6:6a:f2:
                    51:e0:6c:67:15:44:65:90:36:6c:98:ae:5d:ea:c1:19
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7d:58:b1:81:23:c5:f4:71:bd:0f:5a:1c:a9:b5:26:24:
        42:5e:10:63:41:b2:af:07:ce:6f:f0:76:6e:60:d1:d9:
        37:f8:17:51:1c:54:94:8a:ac:bb:e2:dd:9e:9d:78:29:
        5b:b3:1f:ef:c9:f7:89:de:4b:32:e9:89:2a:ad:cf:6a:
        d8:8b:7b:23:6d:bd:d5:08:97:31:fb:29:28:96:5a:f5:
        f6:4c:00:eb:3e:dc:d3:b3:ff:63:0c:37:d8:83:35:cc:
        85:0d:1a:1b:32:ab:cc:7d:49:da:28:b9:ec:71:01:f6:
        57:3c:f2:f4:33:1e:4f:7a:8c:21:88:dd:80:40:cb:71
    Fingerprint (MD5):
        7D:D4:D4:F3:18:BE:38:F3:E9:C2:97:63:FA:87:CB:5C
    Fingerprint (SHA1):
        B8:BD:BB:31:26:CF:2B:20:1A:58:35:89:6F:FD:68:BF:AE:F5:03:B8

    Friendly Name: Alice

tools.sh: #4707: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4708: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4709: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                dd:6e:b6:ad:09:da:05:bb:56:38:6f:82:79:df:c3:c3
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:20 2012
            Not After : Tue Nov 28 16:06:20 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d0:7a:19:11:89:35:7d:47:8e:d7:4d:85:b5:d0:b4:72:
                    b4:f0:24:04:30:ac:c5:8a:69:a9:d7:7a:e4:b2:96:f1:
                    a9:3d:f5:da:c9:58:87:03:80:ef:88:7c:37:16:0c:9c:
                    25:e1:70:1a:2a:28:16:d4:2d:73:88:28:8f:46:13:b4:
                    1a:28:d3:56:a2:04:a8:36:23:b8:d1:1b:05:de:83:69:
                    d6:7d:d2:6b:ce:7c:b5:86:2c:3b:51:78:be:dd:a1:e4:
                    b6:73:39:47:b6:06:a0:f3:c0:2a:95:5d:4e:46:59:0c:
                    00:bc:6a:89:34:61:e3:ed:7a:1d:1f:27:3e:da:fd:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        29:7e:a2:24:2f:69:8c:99:fa:75:2c:94:2f:ac:f1:ef:
        fb:db:99:5e:5e:e9:ea:4d:f5:c7:fb:8a:25:d8:45:da:
        ef:75:5f:03:58:05:80:4e:9b:51:4b:e2:63:53:69:44:
        5f:e4:0e:ba:82:d5:4c:f5:49:07:0a:fa:69:a2:e8:e8:
        ac:fd:2e:15:90:40:7a:2e:bd:6f:af:a9:84:7f:9d:a7:
        7b:a0:d3:7e:3b:bc:53:5d:52:53:6c:a5:c8:91:ff:31:
        01:a5:84:53:79:88:85:58:a5:d5:f2:fb:2b:71:1b:38:
        e0:91:c9:66:c8:e6:68:f5:0b:a9:6a:3e:da:83:b3:26
    Fingerprint (MD5):
        7D:09:1F:37:B4:F9:F4:1B:9F:19:DA:BC:39:3E:19:28
    Fingerprint (SHA1):
        46:69:C8:14:DA:BB:60:70:6B:97:7D:15:A8:D0:35:B9:14:E7:6E:D2

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:28 2012
            Not After : Tue Nov 28 16:06:28 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d5:ab:3f:4e:fc:36:b8:59:e0:45:9c:e5:b8:76:79:8c:
                    c7:9f:20:ca:23:43:51:d0:93:5e:ae:a1:6a:fb:13:bc:
                    68:d9:8d:9b:79:e0:90:3e:fa:80:23:1c:11:f7:3c:9c:
                    6f:55:16:ba:08:63:9c:c0:2e:78:84:ab:68:cc:5c:58:
                    a4:66:d4:7a:b2:1e:10:60:a2:c6:2e:87:6b:5f:4c:a2:
                    08:10:41:73:f2:2d:91:e0:d1:1c:cb:53:fc:15:41:ad:
                    d0:4c:ec:f1:b2:b4:23:2f:e4:73:d3:78:82:e6:6a:f2:
                    51:e0:6c:67:15:44:65:90:36:6c:98:ae:5d:ea:c1:19
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7d:58:b1:81:23:c5:f4:71:bd:0f:5a:1c:a9:b5:26:24:
        42:5e:10:63:41:b2:af:07:ce:6f:f0:76:6e:60:d1:d9:
        37:f8:17:51:1c:54:94:8a:ac:bb:e2:dd:9e:9d:78:29:
        5b:b3:1f:ef:c9:f7:89:de:4b:32:e9:89:2a:ad:cf:6a:
        d8:8b:7b:23:6d:bd:d5:08:97:31:fb:29:28:96:5a:f5:
        f6:4c:00:eb:3e:dc:d3:b3:ff:63:0c:37:d8:83:35:cc:
        85:0d:1a:1b:32:ab:cc:7d:49:da:28:b9:ec:71:01:f6:
        57:3c:f2:f4:33:1e:4f:7a:8c:21:88:dd:80:40:cb:71
    Fingerprint (MD5):
        7D:D4:D4:F3:18:BE:38:F3:E9:C2:97:63:FA:87:CB:5C
    Fingerprint (SHA1):
        B8:BD:BB:31:26:CF:2B:20:1A:58:35:89:6F:FD:68:BF:AE:F5:03:B8

    Friendly Name: Alice

tools.sh: #4710: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4711: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4712: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                d0:1b:a7:2d:48:3b:5e:00:1f:83:5a:89:d8:d7:69:ec
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:20 2012
            Not After : Tue Nov 28 16:06:20 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d0:7a:19:11:89:35:7d:47:8e:d7:4d:85:b5:d0:b4:72:
                    b4:f0:24:04:30:ac:c5:8a:69:a9:d7:7a:e4:b2:96:f1:
                    a9:3d:f5:da:c9:58:87:03:80:ef:88:7c:37:16:0c:9c:
                    25:e1:70:1a:2a:28:16:d4:2d:73:88:28:8f:46:13:b4:
                    1a:28:d3:56:a2:04:a8:36:23:b8:d1:1b:05:de:83:69:
                    d6:7d:d2:6b:ce:7c:b5:86:2c:3b:51:78:be:dd:a1:e4:
                    b6:73:39:47:b6:06:a0:f3:c0:2a:95:5d:4e:46:59:0c:
                    00:bc:6a:89:34:61:e3:ed:7a:1d:1f:27:3e:da:fd:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        29:7e:a2:24:2f:69:8c:99:fa:75:2c:94:2f:ac:f1:ef:
        fb:db:99:5e:5e:e9:ea:4d:f5:c7:fb:8a:25:d8:45:da:
        ef:75:5f:03:58:05:80:4e:9b:51:4b:e2:63:53:69:44:
        5f:e4:0e:ba:82:d5:4c:f5:49:07:0a:fa:69:a2:e8:e8:
        ac:fd:2e:15:90:40:7a:2e:bd:6f:af:a9:84:7f:9d:a7:
        7b:a0:d3:7e:3b:bc:53:5d:52:53:6c:a5:c8:91:ff:31:
        01:a5:84:53:79:88:85:58:a5:d5:f2:fb:2b:71:1b:38:
        e0:91:c9:66:c8:e6:68:f5:0b:a9:6a:3e:da:83:b3:26
    Fingerprint (MD5):
        7D:09:1F:37:B4:F9:F4:1B:9F:19:DA:BC:39:3E:19:28
    Fingerprint (SHA1):
        46:69:C8:14:DA:BB:60:70:6B:97:7D:15:A8:D0:35:B9:14:E7:6E:D2

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:28 2012
            Not After : Tue Nov 28 16:06:28 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d5:ab:3f:4e:fc:36:b8:59:e0:45:9c:e5:b8:76:79:8c:
                    c7:9f:20:ca:23:43:51:d0:93:5e:ae:a1:6a:fb:13:bc:
                    68:d9:8d:9b:79:e0:90:3e:fa:80:23:1c:11:f7:3c:9c:
                    6f:55:16:ba:08:63:9c:c0:2e:78:84:ab:68:cc:5c:58:
                    a4:66:d4:7a:b2:1e:10:60:a2:c6:2e:87:6b:5f:4c:a2:
                    08:10:41:73:f2:2d:91:e0:d1:1c:cb:53:fc:15:41:ad:
                    d0:4c:ec:f1:b2:b4:23:2f:e4:73:d3:78:82:e6:6a:f2:
                    51:e0:6c:67:15:44:65:90:36:6c:98:ae:5d:ea:c1:19
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7d:58:b1:81:23:c5:f4:71:bd:0f:5a:1c:a9:b5:26:24:
        42:5e:10:63:41:b2:af:07:ce:6f:f0:76:6e:60:d1:d9:
        37:f8:17:51:1c:54:94:8a:ac:bb:e2:dd:9e:9d:78:29:
        5b:b3:1f:ef:c9:f7:89:de:4b:32:e9:89:2a:ad:cf:6a:
        d8:8b:7b:23:6d:bd:d5:08:97:31:fb:29:28:96:5a:f5:
        f6:4c:00:eb:3e:dc:d3:b3:ff:63:0c:37:d8:83:35:cc:
        85:0d:1a:1b:32:ab:cc:7d:49:da:28:b9:ec:71:01:f6:
        57:3c:f2:f4:33:1e:4f:7a:8c:21:88:dd:80:40:cb:71
    Fingerprint (MD5):
        7D:D4:D4:F3:18:BE:38:F3:E9:C2:97:63:FA:87:CB:5C
    Fingerprint (SHA1):
        B8:BD:BB:31:26:CF:2B:20:1A:58:35:89:6F:FD:68:BF:AE:F5:03:B8

    Friendly Name: Alice

tools.sh: #4713: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4714: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [default:null]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4715: Exporting with [default:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:20 2012
            Not After : Tue Nov 28 16:06:20 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d0:7a:19:11:89:35:7d:47:8e:d7:4d:85:b5:d0:b4:72:
                    b4:f0:24:04:30:ac:c5:8a:69:a9:d7:7a:e4:b2:96:f1:
                    a9:3d:f5:da:c9:58:87:03:80:ef:88:7c:37:16:0c:9c:
                    25:e1:70:1a:2a:28:16:d4:2d:73:88:28:8f:46:13:b4:
                    1a:28:d3:56:a2:04:a8:36:23:b8:d1:1b:05:de:83:69:
                    d6:7d:d2:6b:ce:7c:b5:86:2c:3b:51:78:be:dd:a1:e4:
                    b6:73:39:47:b6:06:a0:f3:c0:2a:95:5d:4e:46:59:0c:
                    00:bc:6a:89:34:61:e3:ed:7a:1d:1f:27:3e:da:fd:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        29:7e:a2:24:2f:69:8c:99:fa:75:2c:94:2f:ac:f1:ef:
        fb:db:99:5e:5e:e9:ea:4d:f5:c7:fb:8a:25:d8:45:da:
        ef:75:5f:03:58:05:80:4e:9b:51:4b:e2:63:53:69:44:
        5f:e4:0e:ba:82:d5:4c:f5:49:07:0a:fa:69:a2:e8:e8:
        ac:fd:2e:15:90:40:7a:2e:bd:6f:af:a9:84:7f:9d:a7:
        7b:a0:d3:7e:3b:bc:53:5d:52:53:6c:a5:c8:91:ff:31:
        01:a5:84:53:79:88:85:58:a5:d5:f2:fb:2b:71:1b:38:
        e0:91:c9:66:c8:e6:68:f5:0b:a9:6a:3e:da:83:b3:26
    Fingerprint (MD5):
        7D:09:1F:37:B4:F9:F4:1B:9F:19:DA:BC:39:3E:19:28
    Fingerprint (SHA1):
        46:69:C8:14:DA:BB:60:70:6B:97:7D:15:A8:D0:35:B9:14:E7:6E:D2

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:28 2012
            Not After : Tue Nov 28 16:06:28 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d5:ab:3f:4e:fc:36:b8:59:e0:45:9c:e5:b8:76:79:8c:
                    c7:9f:20:ca:23:43:51:d0:93:5e:ae:a1:6a:fb:13:bc:
                    68:d9:8d:9b:79:e0:90:3e:fa:80:23:1c:11:f7:3c:9c:
                    6f:55:16:ba:08:63:9c:c0:2e:78:84:ab:68:cc:5c:58:
                    a4:66:d4:7a:b2:1e:10:60:a2:c6:2e:87:6b:5f:4c:a2:
                    08:10:41:73:f2:2d:91:e0:d1:1c:cb:53:fc:15:41:ad:
                    d0:4c:ec:f1:b2:b4:23:2f:e4:73:d3:78:82:e6:6a:f2:
                    51:e0:6c:67:15:44:65:90:36:6c:98:ae:5d:ea:c1:19
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7d:58:b1:81:23:c5:f4:71:bd:0f:5a:1c:a9:b5:26:24:
        42:5e:10:63:41:b2:af:07:ce:6f:f0:76:6e:60:d1:d9:
        37:f8:17:51:1c:54:94:8a:ac:bb:e2:dd:9e:9d:78:29:
        5b:b3:1f:ef:c9:f7:89:de:4b:32:e9:89:2a:ad:cf:6a:
        d8:8b:7b:23:6d:bd:d5:08:97:31:fb:29:28:96:5a:f5:
        f6:4c:00:eb:3e:dc:d3:b3:ff:63:0c:37:d8:83:35:cc:
        85:0d:1a:1b:32:ab:cc:7d:49:da:28:b9:ec:71:01:f6:
        57:3c:f2:f4:33:1e:4f:7a:8c:21:88:dd:80:40:cb:71
    Fingerprint (MD5):
        7D:D4:D4:F3:18:BE:38:F3:E9:C2:97:63:FA:87:CB:5C
    Fingerprint (SHA1):
        B8:BD:BB:31:26:CF:2B:20:1A:58:35:89:6F:FD:68:BF:AE:F5:03:B8

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                a1:e8:79:36:7d:aa:eb:08:97:73:d0:e7:8d:08:35:2a
            Iteration Count: 2000 (0x7d0)
tools.sh: #4716: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4717: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4718: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                b9:61:4e:c7:97:7f:e5:eb:52:d5:72:84:53:bf:fd:2d
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:20 2012
            Not After : Tue Nov 28 16:06:20 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d0:7a:19:11:89:35:7d:47:8e:d7:4d:85:b5:d0:b4:72:
                    b4:f0:24:04:30:ac:c5:8a:69:a9:d7:7a:e4:b2:96:f1:
                    a9:3d:f5:da:c9:58:87:03:80:ef:88:7c:37:16:0c:9c:
                    25:e1:70:1a:2a:28:16:d4:2d:73:88:28:8f:46:13:b4:
                    1a:28:d3:56:a2:04:a8:36:23:b8:d1:1b:05:de:83:69:
                    d6:7d:d2:6b:ce:7c:b5:86:2c:3b:51:78:be:dd:a1:e4:
                    b6:73:39:47:b6:06:a0:f3:c0:2a:95:5d:4e:46:59:0c:
                    00:bc:6a:89:34:61:e3:ed:7a:1d:1f:27:3e:da:fd:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        29:7e:a2:24:2f:69:8c:99:fa:75:2c:94:2f:ac:f1:ef:
        fb:db:99:5e:5e:e9:ea:4d:f5:c7:fb:8a:25:d8:45:da:
        ef:75:5f:03:58:05:80:4e:9b:51:4b:e2:63:53:69:44:
        5f:e4:0e:ba:82:d5:4c:f5:49:07:0a:fa:69:a2:e8:e8:
        ac:fd:2e:15:90:40:7a:2e:bd:6f:af:a9:84:7f:9d:a7:
        7b:a0:d3:7e:3b:bc:53:5d:52:53:6c:a5:c8:91:ff:31:
        01:a5:84:53:79:88:85:58:a5:d5:f2:fb:2b:71:1b:38:
        e0:91:c9:66:c8:e6:68:f5:0b:a9:6a:3e:da:83:b3:26
    Fingerprint (MD5):
        7D:09:1F:37:B4:F9:F4:1B:9F:19:DA:BC:39:3E:19:28
    Fingerprint (SHA1):
        46:69:C8:14:DA:BB:60:70:6B:97:7D:15:A8:D0:35:B9:14:E7:6E:D2

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:28 2012
            Not After : Tue Nov 28 16:06:28 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d5:ab:3f:4e:fc:36:b8:59:e0:45:9c:e5:b8:76:79:8c:
                    c7:9f:20:ca:23:43:51:d0:93:5e:ae:a1:6a:fb:13:bc:
                    68:d9:8d:9b:79:e0:90:3e:fa:80:23:1c:11:f7:3c:9c:
                    6f:55:16:ba:08:63:9c:c0:2e:78:84:ab:68:cc:5c:58:
                    a4:66:d4:7a:b2:1e:10:60:a2:c6:2e:87:6b:5f:4c:a2:
                    08:10:41:73:f2:2d:91:e0:d1:1c:cb:53:fc:15:41:ad:
                    d0:4c:ec:f1:b2:b4:23:2f:e4:73:d3:78:82:e6:6a:f2:
                    51:e0:6c:67:15:44:65:90:36:6c:98:ae:5d:ea:c1:19
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7d:58:b1:81:23:c5:f4:71:bd:0f:5a:1c:a9:b5:26:24:
        42:5e:10:63:41:b2:af:07:ce:6f:f0:76:6e:60:d1:d9:
        37:f8:17:51:1c:54:94:8a:ac:bb:e2:dd:9e:9d:78:29:
        5b:b3:1f:ef:c9:f7:89:de:4b:32:e9:89:2a:ad:cf:6a:
        d8:8b:7b:23:6d:bd:d5:08:97:31:fb:29:28:96:5a:f5:
        f6:4c:00:eb:3e:dc:d3:b3:ff:63:0c:37:d8:83:35:cc:
        85:0d:1a:1b:32:ab:cc:7d:49:da:28:b9:ec:71:01:f6:
        57:3c:f2:f4:33:1e:4f:7a:8c:21:88:dd:80:40:cb:71
    Fingerprint (MD5):
        7D:D4:D4:F3:18:BE:38:F3:E9:C2:97:63:FA:87:CB:5C
    Fingerprint (SHA1):
        B8:BD:BB:31:26:CF:2B:20:1A:58:35:89:6F:FD:68:BF:AE:F5:03:B8

    Friendly Name: Alice

tools.sh: #4719: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4720: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4721: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                0e:1e:84:80:e9:7f:c5:54:97:09:da:ed:2d:e9:9b:4c
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:20 2012
            Not After : Tue Nov 28 16:06:20 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d0:7a:19:11:89:35:7d:47:8e:d7:4d:85:b5:d0:b4:72:
                    b4:f0:24:04:30:ac:c5:8a:69:a9:d7:7a:e4:b2:96:f1:
                    a9:3d:f5:da:c9:58:87:03:80:ef:88:7c:37:16:0c:9c:
                    25:e1:70:1a:2a:28:16:d4:2d:73:88:28:8f:46:13:b4:
                    1a:28:d3:56:a2:04:a8:36:23:b8:d1:1b:05:de:83:69:
                    d6:7d:d2:6b:ce:7c:b5:86:2c:3b:51:78:be:dd:a1:e4:
                    b6:73:39:47:b6:06:a0:f3:c0:2a:95:5d:4e:46:59:0c:
                    00:bc:6a:89:34:61:e3:ed:7a:1d:1f:27:3e:da:fd:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        29:7e:a2:24:2f:69:8c:99:fa:75:2c:94:2f:ac:f1:ef:
        fb:db:99:5e:5e:e9:ea:4d:f5:c7:fb:8a:25:d8:45:da:
        ef:75:5f:03:58:05:80:4e:9b:51:4b:e2:63:53:69:44:
        5f:e4:0e:ba:82:d5:4c:f5:49:07:0a:fa:69:a2:e8:e8:
        ac:fd:2e:15:90:40:7a:2e:bd:6f:af:a9:84:7f:9d:a7:
        7b:a0:d3:7e:3b:bc:53:5d:52:53:6c:a5:c8:91:ff:31:
        01:a5:84:53:79:88:85:58:a5:d5:f2:fb:2b:71:1b:38:
        e0:91:c9:66:c8:e6:68:f5:0b:a9:6a:3e:da:83:b3:26
    Fingerprint (MD5):
        7D:09:1F:37:B4:F9:F4:1B:9F:19:DA:BC:39:3E:19:28
    Fingerprint (SHA1):
        46:69:C8:14:DA:BB:60:70:6B:97:7D:15:A8:D0:35:B9:14:E7:6E:D2

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:28 2012
            Not After : Tue Nov 28 16:06:28 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d5:ab:3f:4e:fc:36:b8:59:e0:45:9c:e5:b8:76:79:8c:
                    c7:9f:20:ca:23:43:51:d0:93:5e:ae:a1:6a:fb:13:bc:
                    68:d9:8d:9b:79:e0:90:3e:fa:80:23:1c:11:f7:3c:9c:
                    6f:55:16:ba:08:63:9c:c0:2e:78:84:ab:68:cc:5c:58:
                    a4:66:d4:7a:b2:1e:10:60:a2:c6:2e:87:6b:5f:4c:a2:
                    08:10:41:73:f2:2d:91:e0:d1:1c:cb:53:fc:15:41:ad:
                    d0:4c:ec:f1:b2:b4:23:2f:e4:73:d3:78:82:e6:6a:f2:
                    51:e0:6c:67:15:44:65:90:36:6c:98:ae:5d:ea:c1:19
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7d:58:b1:81:23:c5:f4:71:bd:0f:5a:1c:a9:b5:26:24:
        42:5e:10:63:41:b2:af:07:ce:6f:f0:76:6e:60:d1:d9:
        37:f8:17:51:1c:54:94:8a:ac:bb:e2:dd:9e:9d:78:29:
        5b:b3:1f:ef:c9:f7:89:de:4b:32:e9:89:2a:ad:cf:6a:
        d8:8b:7b:23:6d:bd:d5:08:97:31:fb:29:28:96:5a:f5:
        f6:4c:00:eb:3e:dc:d3:b3:ff:63:0c:37:d8:83:35:cc:
        85:0d:1a:1b:32:ab:cc:7d:49:da:28:b9:ec:71:01:f6:
        57:3c:f2:f4:33:1e:4f:7a:8c:21:88:dd:80:40:cb:71
    Fingerprint (MD5):
        7D:D4:D4:F3:18:BE:38:F3:E9:C2:97:63:FA:87:CB:5C
    Fingerprint (SHA1):
        B8:BD:BB:31:26:CF:2B:20:1A:58:35:89:6F:FD:68:BF:AE:F5:03:B8

    Friendly Name: Alice

tools.sh: #4722: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4723: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4724: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                d7:04:d6:5d:c9:ac:81:96:9b:50:e8:33:50:0c:27:21
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:20 2012
            Not After : Tue Nov 28 16:06:20 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d0:7a:19:11:89:35:7d:47:8e:d7:4d:85:b5:d0:b4:72:
                    b4:f0:24:04:30:ac:c5:8a:69:a9:d7:7a:e4:b2:96:f1:
                    a9:3d:f5:da:c9:58:87:03:80:ef:88:7c:37:16:0c:9c:
                    25:e1:70:1a:2a:28:16:d4:2d:73:88:28:8f:46:13:b4:
                    1a:28:d3:56:a2:04:a8:36:23:b8:d1:1b:05:de:83:69:
                    d6:7d:d2:6b:ce:7c:b5:86:2c:3b:51:78:be:dd:a1:e4:
                    b6:73:39:47:b6:06:a0:f3:c0:2a:95:5d:4e:46:59:0c:
                    00:bc:6a:89:34:61:e3:ed:7a:1d:1f:27:3e:da:fd:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        29:7e:a2:24:2f:69:8c:99:fa:75:2c:94:2f:ac:f1:ef:
        fb:db:99:5e:5e:e9:ea:4d:f5:c7:fb:8a:25:d8:45:da:
        ef:75:5f:03:58:05:80:4e:9b:51:4b:e2:63:53:69:44:
        5f:e4:0e:ba:82:d5:4c:f5:49:07:0a:fa:69:a2:e8:e8:
        ac:fd:2e:15:90:40:7a:2e:bd:6f:af:a9:84:7f:9d:a7:
        7b:a0:d3:7e:3b:bc:53:5d:52:53:6c:a5:c8:91:ff:31:
        01:a5:84:53:79:88:85:58:a5:d5:f2:fb:2b:71:1b:38:
        e0:91:c9:66:c8:e6:68:f5:0b:a9:6a:3e:da:83:b3:26
    Fingerprint (MD5):
        7D:09:1F:37:B4:F9:F4:1B:9F:19:DA:BC:39:3E:19:28
    Fingerprint (SHA1):
        46:69:C8:14:DA:BB:60:70:6B:97:7D:15:A8:D0:35:B9:14:E7:6E:D2

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:28 2012
            Not After : Tue Nov 28 16:06:28 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d5:ab:3f:4e:fc:36:b8:59:e0:45:9c:e5:b8:76:79:8c:
                    c7:9f:20:ca:23:43:51:d0:93:5e:ae:a1:6a:fb:13:bc:
                    68:d9:8d:9b:79:e0:90:3e:fa:80:23:1c:11:f7:3c:9c:
                    6f:55:16:ba:08:63:9c:c0:2e:78:84:ab:68:cc:5c:58:
                    a4:66:d4:7a:b2:1e:10:60:a2:c6:2e:87:6b:5f:4c:a2:
                    08:10:41:73:f2:2d:91:e0:d1:1c:cb:53:fc:15:41:ad:
                    d0:4c:ec:f1:b2:b4:23:2f:e4:73:d3:78:82:e6:6a:f2:
                    51:e0:6c:67:15:44:65:90:36:6c:98:ae:5d:ea:c1:19
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7d:58:b1:81:23:c5:f4:71:bd:0f:5a:1c:a9:b5:26:24:
        42:5e:10:63:41:b2:af:07:ce:6f:f0:76:6e:60:d1:d9:
        37:f8:17:51:1c:54:94:8a:ac:bb:e2:dd:9e:9d:78:29:
        5b:b3:1f:ef:c9:f7:89:de:4b:32:e9:89:2a:ad:cf:6a:
        d8:8b:7b:23:6d:bd:d5:08:97:31:fb:29:28:96:5a:f5:
        f6:4c:00:eb:3e:dc:d3:b3:ff:63:0c:37:d8:83:35:cc:
        85:0d:1a:1b:32:ab:cc:7d:49:da:28:b9:ec:71:01:f6:
        57:3c:f2:f4:33:1e:4f:7a:8c:21:88:dd:80:40:cb:71
    Fingerprint (MD5):
        7D:D4:D4:F3:18:BE:38:F3:E9:C2:97:63:FA:87:CB:5C
    Fingerprint (SHA1):
        B8:BD:BB:31:26:CF:2B:20:1A:58:35:89:6F:FD:68:BF:AE:F5:03:B8

    Friendly Name: Alice

tools.sh: #4725: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4726: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4727: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                9f:a2:e7:f2:e4:01:f0:ca:03:47:45:57:ba:3d:fb:06
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:20 2012
            Not After : Tue Nov 28 16:06:20 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d0:7a:19:11:89:35:7d:47:8e:d7:4d:85:b5:d0:b4:72:
                    b4:f0:24:04:30:ac:c5:8a:69:a9:d7:7a:e4:b2:96:f1:
                    a9:3d:f5:da:c9:58:87:03:80:ef:88:7c:37:16:0c:9c:
                    25:e1:70:1a:2a:28:16:d4:2d:73:88:28:8f:46:13:b4:
                    1a:28:d3:56:a2:04:a8:36:23:b8:d1:1b:05:de:83:69:
                    d6:7d:d2:6b:ce:7c:b5:86:2c:3b:51:78:be:dd:a1:e4:
                    b6:73:39:47:b6:06:a0:f3:c0:2a:95:5d:4e:46:59:0c:
                    00:bc:6a:89:34:61:e3:ed:7a:1d:1f:27:3e:da:fd:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        29:7e:a2:24:2f:69:8c:99:fa:75:2c:94:2f:ac:f1:ef:
        fb:db:99:5e:5e:e9:ea:4d:f5:c7:fb:8a:25:d8:45:da:
        ef:75:5f:03:58:05:80:4e:9b:51:4b:e2:63:53:69:44:
        5f:e4:0e:ba:82:d5:4c:f5:49:07:0a:fa:69:a2:e8:e8:
        ac:fd:2e:15:90:40:7a:2e:bd:6f:af:a9:84:7f:9d:a7:
        7b:a0:d3:7e:3b:bc:53:5d:52:53:6c:a5:c8:91:ff:31:
        01:a5:84:53:79:88:85:58:a5:d5:f2:fb:2b:71:1b:38:
        e0:91:c9:66:c8:e6:68:f5:0b:a9:6a:3e:da:83:b3:26
    Fingerprint (MD5):
        7D:09:1F:37:B4:F9:F4:1B:9F:19:DA:BC:39:3E:19:28
    Fingerprint (SHA1):
        46:69:C8:14:DA:BB:60:70:6B:97:7D:15:A8:D0:35:B9:14:E7:6E:D2

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:28 2012
            Not After : Tue Nov 28 16:06:28 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d5:ab:3f:4e:fc:36:b8:59:e0:45:9c:e5:b8:76:79:8c:
                    c7:9f:20:ca:23:43:51:d0:93:5e:ae:a1:6a:fb:13:bc:
                    68:d9:8d:9b:79:e0:90:3e:fa:80:23:1c:11:f7:3c:9c:
                    6f:55:16:ba:08:63:9c:c0:2e:78:84:ab:68:cc:5c:58:
                    a4:66:d4:7a:b2:1e:10:60:a2:c6:2e:87:6b:5f:4c:a2:
                    08:10:41:73:f2:2d:91:e0:d1:1c:cb:53:fc:15:41:ad:
                    d0:4c:ec:f1:b2:b4:23:2f:e4:73:d3:78:82:e6:6a:f2:
                    51:e0:6c:67:15:44:65:90:36:6c:98:ae:5d:ea:c1:19
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7d:58:b1:81:23:c5:f4:71:bd:0f:5a:1c:a9:b5:26:24:
        42:5e:10:63:41:b2:af:07:ce:6f:f0:76:6e:60:d1:d9:
        37:f8:17:51:1c:54:94:8a:ac:bb:e2:dd:9e:9d:78:29:
        5b:b3:1f:ef:c9:f7:89:de:4b:32:e9:89:2a:ad:cf:6a:
        d8:8b:7b:23:6d:bd:d5:08:97:31:fb:29:28:96:5a:f5:
        f6:4c:00:eb:3e:dc:d3:b3:ff:63:0c:37:d8:83:35:cc:
        85:0d:1a:1b:32:ab:cc:7d:49:da:28:b9:ec:71:01:f6:
        57:3c:f2:f4:33:1e:4f:7a:8c:21:88:dd:80:40:cb:71
    Fingerprint (MD5):
        7D:D4:D4:F3:18:BE:38:F3:E9:C2:97:63:FA:87:CB:5C
    Fingerprint (SHA1):
        B8:BD:BB:31:26:CF:2B:20:1A:58:35:89:6F:FD:68:BF:AE:F5:03:B8

    Friendly Name: Alice

tools.sh: #4728: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4729: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4730: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                91:8b:52:aa:06:9e:b8:2f:d2:ac:75:eb:ff:71:48:61
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:20 2012
            Not After : Tue Nov 28 16:06:20 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d0:7a:19:11:89:35:7d:47:8e:d7:4d:85:b5:d0:b4:72:
                    b4:f0:24:04:30:ac:c5:8a:69:a9:d7:7a:e4:b2:96:f1:
                    a9:3d:f5:da:c9:58:87:03:80:ef:88:7c:37:16:0c:9c:
                    25:e1:70:1a:2a:28:16:d4:2d:73:88:28:8f:46:13:b4:
                    1a:28:d3:56:a2:04:a8:36:23:b8:d1:1b:05:de:83:69:
                    d6:7d:d2:6b:ce:7c:b5:86:2c:3b:51:78:be:dd:a1:e4:
                    b6:73:39:47:b6:06:a0:f3:c0:2a:95:5d:4e:46:59:0c:
                    00:bc:6a:89:34:61:e3:ed:7a:1d:1f:27:3e:da:fd:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        29:7e:a2:24:2f:69:8c:99:fa:75:2c:94:2f:ac:f1:ef:
        fb:db:99:5e:5e:e9:ea:4d:f5:c7:fb:8a:25:d8:45:da:
        ef:75:5f:03:58:05:80:4e:9b:51:4b:e2:63:53:69:44:
        5f:e4:0e:ba:82:d5:4c:f5:49:07:0a:fa:69:a2:e8:e8:
        ac:fd:2e:15:90:40:7a:2e:bd:6f:af:a9:84:7f:9d:a7:
        7b:a0:d3:7e:3b:bc:53:5d:52:53:6c:a5:c8:91:ff:31:
        01:a5:84:53:79:88:85:58:a5:d5:f2:fb:2b:71:1b:38:
        e0:91:c9:66:c8:e6:68:f5:0b:a9:6a:3e:da:83:b3:26
    Fingerprint (MD5):
        7D:09:1F:37:B4:F9:F4:1B:9F:19:DA:BC:39:3E:19:28
    Fingerprint (SHA1):
        46:69:C8:14:DA:BB:60:70:6B:97:7D:15:A8:D0:35:B9:14:E7:6E:D2

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:28 2012
            Not After : Tue Nov 28 16:06:28 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d5:ab:3f:4e:fc:36:b8:59:e0:45:9c:e5:b8:76:79:8c:
                    c7:9f:20:ca:23:43:51:d0:93:5e:ae:a1:6a:fb:13:bc:
                    68:d9:8d:9b:79:e0:90:3e:fa:80:23:1c:11:f7:3c:9c:
                    6f:55:16:ba:08:63:9c:c0:2e:78:84:ab:68:cc:5c:58:
                    a4:66:d4:7a:b2:1e:10:60:a2:c6:2e:87:6b:5f:4c:a2:
                    08:10:41:73:f2:2d:91:e0:d1:1c:cb:53:fc:15:41:ad:
                    d0:4c:ec:f1:b2:b4:23:2f:e4:73:d3:78:82:e6:6a:f2:
                    51:e0:6c:67:15:44:65:90:36:6c:98:ae:5d:ea:c1:19
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7d:58:b1:81:23:c5:f4:71:bd:0f:5a:1c:a9:b5:26:24:
        42:5e:10:63:41:b2:af:07:ce:6f:f0:76:6e:60:d1:d9:
        37:f8:17:51:1c:54:94:8a:ac:bb:e2:dd:9e:9d:78:29:
        5b:b3:1f:ef:c9:f7:89:de:4b:32:e9:89:2a:ad:cf:6a:
        d8:8b:7b:23:6d:bd:d5:08:97:31:fb:29:28:96:5a:f5:
        f6:4c:00:eb:3e:dc:d3:b3:ff:63:0c:37:d8:83:35:cc:
        85:0d:1a:1b:32:ab:cc:7d:49:da:28:b9:ec:71:01:f6:
        57:3c:f2:f4:33:1e:4f:7a:8c:21:88:dd:80:40:cb:71
    Fingerprint (MD5):
        7D:D4:D4:F3:18:BE:38:F3:E9:C2:97:63:FA:87:CB:5C
    Fingerprint (SHA1):
        B8:BD:BB:31:26:CF:2B:20:1A:58:35:89:6F:FD:68:BF:AE:F5:03:B8

    Friendly Name: Alice

tools.sh: #4731: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4732: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4733: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                de:c0:01:ee:4c:66:98:52:88:bb:4f:db:74:e5:27:0f
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:20 2012
            Not After : Tue Nov 28 16:06:20 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d0:7a:19:11:89:35:7d:47:8e:d7:4d:85:b5:d0:b4:72:
                    b4:f0:24:04:30:ac:c5:8a:69:a9:d7:7a:e4:b2:96:f1:
                    a9:3d:f5:da:c9:58:87:03:80:ef:88:7c:37:16:0c:9c:
                    25:e1:70:1a:2a:28:16:d4:2d:73:88:28:8f:46:13:b4:
                    1a:28:d3:56:a2:04:a8:36:23:b8:d1:1b:05:de:83:69:
                    d6:7d:d2:6b:ce:7c:b5:86:2c:3b:51:78:be:dd:a1:e4:
                    b6:73:39:47:b6:06:a0:f3:c0:2a:95:5d:4e:46:59:0c:
                    00:bc:6a:89:34:61:e3:ed:7a:1d:1f:27:3e:da:fd:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        29:7e:a2:24:2f:69:8c:99:fa:75:2c:94:2f:ac:f1:ef:
        fb:db:99:5e:5e:e9:ea:4d:f5:c7:fb:8a:25:d8:45:da:
        ef:75:5f:03:58:05:80:4e:9b:51:4b:e2:63:53:69:44:
        5f:e4:0e:ba:82:d5:4c:f5:49:07:0a:fa:69:a2:e8:e8:
        ac:fd:2e:15:90:40:7a:2e:bd:6f:af:a9:84:7f:9d:a7:
        7b:a0:d3:7e:3b:bc:53:5d:52:53:6c:a5:c8:91:ff:31:
        01:a5:84:53:79:88:85:58:a5:d5:f2:fb:2b:71:1b:38:
        e0:91:c9:66:c8:e6:68:f5:0b:a9:6a:3e:da:83:b3:26
    Fingerprint (MD5):
        7D:09:1F:37:B4:F9:F4:1B:9F:19:DA:BC:39:3E:19:28
    Fingerprint (SHA1):
        46:69:C8:14:DA:BB:60:70:6B:97:7D:15:A8:D0:35:B9:14:E7:6E:D2

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:28 2012
            Not After : Tue Nov 28 16:06:28 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d5:ab:3f:4e:fc:36:b8:59:e0:45:9c:e5:b8:76:79:8c:
                    c7:9f:20:ca:23:43:51:d0:93:5e:ae:a1:6a:fb:13:bc:
                    68:d9:8d:9b:79:e0:90:3e:fa:80:23:1c:11:f7:3c:9c:
                    6f:55:16:ba:08:63:9c:c0:2e:78:84:ab:68:cc:5c:58:
                    a4:66:d4:7a:b2:1e:10:60:a2:c6:2e:87:6b:5f:4c:a2:
                    08:10:41:73:f2:2d:91:e0:d1:1c:cb:53:fc:15:41:ad:
                    d0:4c:ec:f1:b2:b4:23:2f:e4:73:d3:78:82:e6:6a:f2:
                    51:e0:6c:67:15:44:65:90:36:6c:98:ae:5d:ea:c1:19
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7d:58:b1:81:23:c5:f4:71:bd:0f:5a:1c:a9:b5:26:24:
        42:5e:10:63:41:b2:af:07:ce:6f:f0:76:6e:60:d1:d9:
        37:f8:17:51:1c:54:94:8a:ac:bb:e2:dd:9e:9d:78:29:
        5b:b3:1f:ef:c9:f7:89:de:4b:32:e9:89:2a:ad:cf:6a:
        d8:8b:7b:23:6d:bd:d5:08:97:31:fb:29:28:96:5a:f5:
        f6:4c:00:eb:3e:dc:d3:b3:ff:63:0c:37:d8:83:35:cc:
        85:0d:1a:1b:32:ab:cc:7d:49:da:28:b9:ec:71:01:f6:
        57:3c:f2:f4:33:1e:4f:7a:8c:21:88:dd:80:40:cb:71
    Fingerprint (MD5):
        7D:D4:D4:F3:18:BE:38:F3:E9:C2:97:63:FA:87:CB:5C
    Fingerprint (SHA1):
        B8:BD:BB:31:26:CF:2B:20:1A:58:35:89:6F:FD:68:BF:AE:F5:03:B8

    Friendly Name: Alice

tools.sh: #4734: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4735: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4736: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                98:a5:a8:8e:07:ff:f4:1b:a0:d1:01:e1:c0:ee:d9:9f
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:20 2012
            Not After : Tue Nov 28 16:06:20 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d0:7a:19:11:89:35:7d:47:8e:d7:4d:85:b5:d0:b4:72:
                    b4:f0:24:04:30:ac:c5:8a:69:a9:d7:7a:e4:b2:96:f1:
                    a9:3d:f5:da:c9:58:87:03:80:ef:88:7c:37:16:0c:9c:
                    25:e1:70:1a:2a:28:16:d4:2d:73:88:28:8f:46:13:b4:
                    1a:28:d3:56:a2:04:a8:36:23:b8:d1:1b:05:de:83:69:
                    d6:7d:d2:6b:ce:7c:b5:86:2c:3b:51:78:be:dd:a1:e4:
                    b6:73:39:47:b6:06:a0:f3:c0:2a:95:5d:4e:46:59:0c:
                    00:bc:6a:89:34:61:e3:ed:7a:1d:1f:27:3e:da:fd:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        29:7e:a2:24:2f:69:8c:99:fa:75:2c:94:2f:ac:f1:ef:
        fb:db:99:5e:5e:e9:ea:4d:f5:c7:fb:8a:25:d8:45:da:
        ef:75:5f:03:58:05:80:4e:9b:51:4b:e2:63:53:69:44:
        5f:e4:0e:ba:82:d5:4c:f5:49:07:0a:fa:69:a2:e8:e8:
        ac:fd:2e:15:90:40:7a:2e:bd:6f:af:a9:84:7f:9d:a7:
        7b:a0:d3:7e:3b:bc:53:5d:52:53:6c:a5:c8:91:ff:31:
        01:a5:84:53:79:88:85:58:a5:d5:f2:fb:2b:71:1b:38:
        e0:91:c9:66:c8:e6:68:f5:0b:a9:6a:3e:da:83:b3:26
    Fingerprint (MD5):
        7D:09:1F:37:B4:F9:F4:1B:9F:19:DA:BC:39:3E:19:28
    Fingerprint (SHA1):
        46:69:C8:14:DA:BB:60:70:6B:97:7D:15:A8:D0:35:B9:14:E7:6E:D2

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:28 2012
            Not After : Tue Nov 28 16:06:28 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d5:ab:3f:4e:fc:36:b8:59:e0:45:9c:e5:b8:76:79:8c:
                    c7:9f:20:ca:23:43:51:d0:93:5e:ae:a1:6a:fb:13:bc:
                    68:d9:8d:9b:79:e0:90:3e:fa:80:23:1c:11:f7:3c:9c:
                    6f:55:16:ba:08:63:9c:c0:2e:78:84:ab:68:cc:5c:58:
                    a4:66:d4:7a:b2:1e:10:60:a2:c6:2e:87:6b:5f:4c:a2:
                    08:10:41:73:f2:2d:91:e0:d1:1c:cb:53:fc:15:41:ad:
                    d0:4c:ec:f1:b2:b4:23:2f:e4:73:d3:78:82:e6:6a:f2:
                    51:e0:6c:67:15:44:65:90:36:6c:98:ae:5d:ea:c1:19
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7d:58:b1:81:23:c5:f4:71:bd:0f:5a:1c:a9:b5:26:24:
        42:5e:10:63:41:b2:af:07:ce:6f:f0:76:6e:60:d1:d9:
        37:f8:17:51:1c:54:94:8a:ac:bb:e2:dd:9e:9d:78:29:
        5b:b3:1f:ef:c9:f7:89:de:4b:32:e9:89:2a:ad:cf:6a:
        d8:8b:7b:23:6d:bd:d5:08:97:31:fb:29:28:96:5a:f5:
        f6:4c:00:eb:3e:dc:d3:b3:ff:63:0c:37:d8:83:35:cc:
        85:0d:1a:1b:32:ab:cc:7d:49:da:28:b9:ec:71:01:f6:
        57:3c:f2:f4:33:1e:4f:7a:8c:21:88:dd:80:40:cb:71
    Fingerprint (MD5):
        7D:D4:D4:F3:18:BE:38:F3:E9:C2:97:63:FA:87:CB:5C
    Fingerprint (SHA1):
        B8:BD:BB:31:26:CF:2B:20:1A:58:35:89:6F:FD:68:BF:AE:F5:03:B8

    Friendly Name: Alice

tools.sh: #4737: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4738: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4739: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                8d:92:bb:b7:5b:85:70:cf:b2:03:42:a1:46:c2:76:97
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:20 2012
            Not After : Tue Nov 28 16:06:20 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d0:7a:19:11:89:35:7d:47:8e:d7:4d:85:b5:d0:b4:72:
                    b4:f0:24:04:30:ac:c5:8a:69:a9:d7:7a:e4:b2:96:f1:
                    a9:3d:f5:da:c9:58:87:03:80:ef:88:7c:37:16:0c:9c:
                    25:e1:70:1a:2a:28:16:d4:2d:73:88:28:8f:46:13:b4:
                    1a:28:d3:56:a2:04:a8:36:23:b8:d1:1b:05:de:83:69:
                    d6:7d:d2:6b:ce:7c:b5:86:2c:3b:51:78:be:dd:a1:e4:
                    b6:73:39:47:b6:06:a0:f3:c0:2a:95:5d:4e:46:59:0c:
                    00:bc:6a:89:34:61:e3:ed:7a:1d:1f:27:3e:da:fd:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        29:7e:a2:24:2f:69:8c:99:fa:75:2c:94:2f:ac:f1:ef:
        fb:db:99:5e:5e:e9:ea:4d:f5:c7:fb:8a:25:d8:45:da:
        ef:75:5f:03:58:05:80:4e:9b:51:4b:e2:63:53:69:44:
        5f:e4:0e:ba:82:d5:4c:f5:49:07:0a:fa:69:a2:e8:e8:
        ac:fd:2e:15:90:40:7a:2e:bd:6f:af:a9:84:7f:9d:a7:
        7b:a0:d3:7e:3b:bc:53:5d:52:53:6c:a5:c8:91:ff:31:
        01:a5:84:53:79:88:85:58:a5:d5:f2:fb:2b:71:1b:38:
        e0:91:c9:66:c8:e6:68:f5:0b:a9:6a:3e:da:83:b3:26
    Fingerprint (MD5):
        7D:09:1F:37:B4:F9:F4:1B:9F:19:DA:BC:39:3E:19:28
    Fingerprint (SHA1):
        46:69:C8:14:DA:BB:60:70:6B:97:7D:15:A8:D0:35:B9:14:E7:6E:D2

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:28 2012
            Not After : Tue Nov 28 16:06:28 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d5:ab:3f:4e:fc:36:b8:59:e0:45:9c:e5:b8:76:79:8c:
                    c7:9f:20:ca:23:43:51:d0:93:5e:ae:a1:6a:fb:13:bc:
                    68:d9:8d:9b:79:e0:90:3e:fa:80:23:1c:11:f7:3c:9c:
                    6f:55:16:ba:08:63:9c:c0:2e:78:84:ab:68:cc:5c:58:
                    a4:66:d4:7a:b2:1e:10:60:a2:c6:2e:87:6b:5f:4c:a2:
                    08:10:41:73:f2:2d:91:e0:d1:1c:cb:53:fc:15:41:ad:
                    d0:4c:ec:f1:b2:b4:23:2f:e4:73:d3:78:82:e6:6a:f2:
                    51:e0:6c:67:15:44:65:90:36:6c:98:ae:5d:ea:c1:19
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7d:58:b1:81:23:c5:f4:71:bd:0f:5a:1c:a9:b5:26:24:
        42:5e:10:63:41:b2:af:07:ce:6f:f0:76:6e:60:d1:d9:
        37:f8:17:51:1c:54:94:8a:ac:bb:e2:dd:9e:9d:78:29:
        5b:b3:1f:ef:c9:f7:89:de:4b:32:e9:89:2a:ad:cf:6a:
        d8:8b:7b:23:6d:bd:d5:08:97:31:fb:29:28:96:5a:f5:
        f6:4c:00:eb:3e:dc:d3:b3:ff:63:0c:37:d8:83:35:cc:
        85:0d:1a:1b:32:ab:cc:7d:49:da:28:b9:ec:71:01:f6:
        57:3c:f2:f4:33:1e:4f:7a:8c:21:88:dd:80:40:cb:71
    Fingerprint (MD5):
        7D:D4:D4:F3:18:BE:38:F3:E9:C2:97:63:FA:87:CB:5C
    Fingerprint (SHA1):
        B8:BD:BB:31:26:CF:2B:20:1A:58:35:89:6F:FD:68:BF:AE:F5:03:B8

    Friendly Name: Alice

tools.sh: #4740: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4741: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4742: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                92:96:73:9d:c8:b7:a9:97:a1:15:76:40:2e:ce:97:d6
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:20 2012
            Not After : Tue Nov 28 16:06:20 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d0:7a:19:11:89:35:7d:47:8e:d7:4d:85:b5:d0:b4:72:
                    b4:f0:24:04:30:ac:c5:8a:69:a9:d7:7a:e4:b2:96:f1:
                    a9:3d:f5:da:c9:58:87:03:80:ef:88:7c:37:16:0c:9c:
                    25:e1:70:1a:2a:28:16:d4:2d:73:88:28:8f:46:13:b4:
                    1a:28:d3:56:a2:04:a8:36:23:b8:d1:1b:05:de:83:69:
                    d6:7d:d2:6b:ce:7c:b5:86:2c:3b:51:78:be:dd:a1:e4:
                    b6:73:39:47:b6:06:a0:f3:c0:2a:95:5d:4e:46:59:0c:
                    00:bc:6a:89:34:61:e3:ed:7a:1d:1f:27:3e:da:fd:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        29:7e:a2:24:2f:69:8c:99:fa:75:2c:94:2f:ac:f1:ef:
        fb:db:99:5e:5e:e9:ea:4d:f5:c7:fb:8a:25:d8:45:da:
        ef:75:5f:03:58:05:80:4e:9b:51:4b:e2:63:53:69:44:
        5f:e4:0e:ba:82:d5:4c:f5:49:07:0a:fa:69:a2:e8:e8:
        ac:fd:2e:15:90:40:7a:2e:bd:6f:af:a9:84:7f:9d:a7:
        7b:a0:d3:7e:3b:bc:53:5d:52:53:6c:a5:c8:91:ff:31:
        01:a5:84:53:79:88:85:58:a5:d5:f2:fb:2b:71:1b:38:
        e0:91:c9:66:c8:e6:68:f5:0b:a9:6a:3e:da:83:b3:26
    Fingerprint (MD5):
        7D:09:1F:37:B4:F9:F4:1B:9F:19:DA:BC:39:3E:19:28
    Fingerprint (SHA1):
        46:69:C8:14:DA:BB:60:70:6B:97:7D:15:A8:D0:35:B9:14:E7:6E:D2

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:28 2012
            Not After : Tue Nov 28 16:06:28 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d5:ab:3f:4e:fc:36:b8:59:e0:45:9c:e5:b8:76:79:8c:
                    c7:9f:20:ca:23:43:51:d0:93:5e:ae:a1:6a:fb:13:bc:
                    68:d9:8d:9b:79:e0:90:3e:fa:80:23:1c:11:f7:3c:9c:
                    6f:55:16:ba:08:63:9c:c0:2e:78:84:ab:68:cc:5c:58:
                    a4:66:d4:7a:b2:1e:10:60:a2:c6:2e:87:6b:5f:4c:a2:
                    08:10:41:73:f2:2d:91:e0:d1:1c:cb:53:fc:15:41:ad:
                    d0:4c:ec:f1:b2:b4:23:2f:e4:73:d3:78:82:e6:6a:f2:
                    51:e0:6c:67:15:44:65:90:36:6c:98:ae:5d:ea:c1:19
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7d:58:b1:81:23:c5:f4:71:bd:0f:5a:1c:a9:b5:26:24:
        42:5e:10:63:41:b2:af:07:ce:6f:f0:76:6e:60:d1:d9:
        37:f8:17:51:1c:54:94:8a:ac:bb:e2:dd:9e:9d:78:29:
        5b:b3:1f:ef:c9:f7:89:de:4b:32:e9:89:2a:ad:cf:6a:
        d8:8b:7b:23:6d:bd:d5:08:97:31:fb:29:28:96:5a:f5:
        f6:4c:00:eb:3e:dc:d3:b3:ff:63:0c:37:d8:83:35:cc:
        85:0d:1a:1b:32:ab:cc:7d:49:da:28:b9:ec:71:01:f6:
        57:3c:f2:f4:33:1e:4f:7a:8c:21:88:dd:80:40:cb:71
    Fingerprint (MD5):
        7D:D4:D4:F3:18:BE:38:F3:E9:C2:97:63:FA:87:CB:5C
    Fingerprint (SHA1):
        B8:BD:BB:31:26:CF:2B:20:1A:58:35:89:6F:FD:68:BF:AE:F5:03:B8

    Friendly Name: Alice

tools.sh: #4743: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4744: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4745: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                35:01:9d:9d:df:9e:60:43:68:f0:9f:79:55:16:23:b9
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:20 2012
            Not After : Tue Nov 28 16:06:20 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d0:7a:19:11:89:35:7d:47:8e:d7:4d:85:b5:d0:b4:72:
                    b4:f0:24:04:30:ac:c5:8a:69:a9:d7:7a:e4:b2:96:f1:
                    a9:3d:f5:da:c9:58:87:03:80:ef:88:7c:37:16:0c:9c:
                    25:e1:70:1a:2a:28:16:d4:2d:73:88:28:8f:46:13:b4:
                    1a:28:d3:56:a2:04:a8:36:23:b8:d1:1b:05:de:83:69:
                    d6:7d:d2:6b:ce:7c:b5:86:2c:3b:51:78:be:dd:a1:e4:
                    b6:73:39:47:b6:06:a0:f3:c0:2a:95:5d:4e:46:59:0c:
                    00:bc:6a:89:34:61:e3:ed:7a:1d:1f:27:3e:da:fd:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        29:7e:a2:24:2f:69:8c:99:fa:75:2c:94:2f:ac:f1:ef:
        fb:db:99:5e:5e:e9:ea:4d:f5:c7:fb:8a:25:d8:45:da:
        ef:75:5f:03:58:05:80:4e:9b:51:4b:e2:63:53:69:44:
        5f:e4:0e:ba:82:d5:4c:f5:49:07:0a:fa:69:a2:e8:e8:
        ac:fd:2e:15:90:40:7a:2e:bd:6f:af:a9:84:7f:9d:a7:
        7b:a0:d3:7e:3b:bc:53:5d:52:53:6c:a5:c8:91:ff:31:
        01:a5:84:53:79:88:85:58:a5:d5:f2:fb:2b:71:1b:38:
        e0:91:c9:66:c8:e6:68:f5:0b:a9:6a:3e:da:83:b3:26
    Fingerprint (MD5):
        7D:09:1F:37:B4:F9:F4:1B:9F:19:DA:BC:39:3E:19:28
    Fingerprint (SHA1):
        46:69:C8:14:DA:BB:60:70:6B:97:7D:15:A8:D0:35:B9:14:E7:6E:D2

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:06:28 2012
            Not After : Tue Nov 28 16:06:28 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d5:ab:3f:4e:fc:36:b8:59:e0:45:9c:e5:b8:76:79:8c:
                    c7:9f:20:ca:23:43:51:d0:93:5e:ae:a1:6a:fb:13:bc:
                    68:d9:8d:9b:79:e0:90:3e:fa:80:23:1c:11:f7:3c:9c:
                    6f:55:16:ba:08:63:9c:c0:2e:78:84:ab:68:cc:5c:58:
                    a4:66:d4:7a:b2:1e:10:60:a2:c6:2e:87:6b:5f:4c:a2:
                    08:10:41:73:f2:2d:91:e0:d1:1c:cb:53:fc:15:41:ad:
                    d0:4c:ec:f1:b2:b4:23:2f:e4:73:d3:78:82:e6:6a:f2:
                    51:e0:6c:67:15:44:65:90:36:6c:98:ae:5d:ea:c1:19
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7d:58:b1:81:23:c5:f4:71:bd:0f:5a:1c:a9:b5:26:24:
        42:5e:10:63:41:b2:af:07:ce:6f:f0:76:6e:60:d1:d9:
        37:f8:17:51:1c:54:94:8a:ac:bb:e2:dd:9e:9d:78:29:
        5b:b3:1f:ef:c9:f7:89:de:4b:32:e9:89:2a:ad:cf:6a:
        d8:8b:7b:23:6d:bd:d5:08:97:31:fb:29:28:96:5a:f5:
        f6:4c:00:eb:3e:dc:d3:b3:ff:63:0c:37:d8:83:35:cc:
        85:0d:1a:1b:32:ab:cc:7d:49:da:28:b9:ec:71:01:f6:
        57:3c:f2:f4:33:1e:4f:7a:8c:21:88:dd:80:40:cb:71
    Fingerprint (MD5):
        7D:D4:D4:F3:18:BE:38:F3:E9:C2:97:63:FA:87:CB:5C
    Fingerprint (SHA1):
        B8:BD:BB:31:26:CF:2B:20:1A:58:35:89:6F:FD:68:BF:AE:F5:03:B8

    Friendly Name: Alice

tools.sh: #4746: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4747: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c null
pk12util: Algorithm: "null": security library: invalid algorithm.
tools.sh: #4748: Exporting with [null:default] (pk12util -o)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4749: Exporting with [default:null] (pk12util -o)  - PASSED
tools.sh: Create objsign cert -------------------------------
signtool -G "objectsigner" -d ../tools/signdir -p "nss"

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit the browser before continuing this operation. Enter 
"y" to continue, or anything else to abort: 

Enter certificate information.  All fields are optional. Acceptable
characters are numbers, letters, spaces, and apostrophes.
certificate common name: organization: organization unit: state or province: country (must be exactly 2 characters): username: email address: generated public/private key pair
certificate request generated
certificate has been signed
certificate "objsigner" added to database
Exported certificate to x509.raw and x509.cacert.
tools.sh: #4750: Create objsign cert (signtool -G)  - PASSED
tools.sh: Signing a jar of files ----------------------------
signtool -Z nojs.jar -d ../tools/signdir -p "nss" -k objsigner \
         ../tools/html
Generating ../tools/html/META-INF/manifest.mf file..
--> signjs.html
adding ../tools/html/signjs.html to nojs.jar...(deflated 28%)
--> sign.html
adding ../tools/html/sign.html to nojs.jar...(deflated 26%)
Generating zigbert.sf file..
adding ../tools/html/META-INF/manifest.mf to nojs.jar...(deflated 30%)
adding ../tools/html/META-INF/zigbert.sf to nojs.jar...(deflated 36%)
adding ../tools/html/META-INF/zigbert.rsa to nojs.jar...(deflated 32%)
tree "../tools/html" signed successfully
tools.sh: #4751: Signing a jar of files (signtool -Z)  - PASSED
tools.sh: Listing signed files in jar ----------------------
signtool -v nojs.jar -d ../tools/signdir -p nss -k objsigner
archive "nojs.jar" has passed crypto verification.
found a MF master manifest file: META-INF/manifest.mf
found a SF signature manifest file: META-INF/zigbert.sf
  md5 digest on global metainfo: match
  sha digest on global metainfo: match
found a RSA signature file: META-INF/zigbert.rsa

          status   path
    ------------   -------------------
        verified   signjs.html
        verified   sign.html
tools.sh: #4752: Listing signed files in jar (signtool -v)  - PASSED
tools.sh: Show who signed jar ------------------------------
signtool -w nojs.jar -d ../tools/signdir

Signer information:

nickname: objsigner
subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org
issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org
tools.sh: #4753: Show who signed jar (signtool -w)  - PASSED
tools.sh: Signing a xpi of files ----------------------------
signtool -Z nojs.xpi -X -d ../tools/signdir -p "nss" -k objsigner \
         ../tools/html
Generating ../tools/html/META-INF/manifest.mf file..
--> signjs.html
--> sign.html
Generating zigbert.sf file..
Creating XPI Compatible Archive 
adding ../tools/html/META-INF/zigbert.rsa to nojs.xpi...(deflated 32%)
--> signjs.html
adding ../tools/html/signjs.html to nojs.xpi...(deflated 28%)
--> sign.html
adding ../tools/html/sign.html to nojs.xpi...(deflated 26%)
adding ../tools/html/META-INF/manifest.mf to nojs.xpi...(deflated 30%)
adding ../tools/html/META-INF/zigbert.sf to nojs.xpi...(deflated 36%)
tree "../tools/html" signed successfully
tools.sh: #4754: Signing a xpi of files (signtool -Z -X)  - PASSED
tools.sh: Listing signed files in xpi ----------------------
signtool -v nojs.xpi -d ../tools/signdir -p nss -k objsigner
archive "nojs.xpi" has passed crypto verification.
found a RSA signature file: META-INF/zigbert.rsa
found a MF master manifest file: META-INF/manifest.mf
found a SF signature manifest file: META-INF/zigbert.sf
  md5 digest on global metainfo: match
  sha digest on global metainfo: match

          status   path
    ------------   -------------------
        verified   signjs.html
        verified   sign.html
tools.sh: #4755: Listing signed files in xpi (signtool -v)  - PASSED
tools.sh: Show who signed xpi ------------------------------
signtool -w nojs.xpi -d ../tools/signdir

Signer information:

nickname: objsigner
subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org
issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org
tools.sh: #4756: Show who signed xpi (signtool -w)  - PASSED
TIMESTAMP tools END: Wed Nov 28 11:07:17 EST 2012
Running tests for fips
TIMESTAMP fips BEGIN: Wed Nov 28 11:07:17 EST 2012
fips.sh: FIPS 140 Compliance Tests ===============================
fips.sh: Verify this module is in FIPS mode  -----------------
modutil -dbdir ../fips -list

Listing of PKCS #11 Modules
-----------------------------------------------------------
  1. NSS Internal FIPS PKCS #11 Module
 slots: 1 slot attached
status: loaded

 slot: NSS FIPS 140-2 User Private Key Services
token: NSS FIPS 140-2 Certificate DB

  2. RootCerts
library name: /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so
 slots: 1 slot attached
status: loaded

 slot: NSS Builtin Objects
token: Builtin Object Token
-----------------------------------------------------------
FIPS mode enabled.
fips.sh: #4757: Verify this module is in FIPS mode (modutil -chkfips true) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

FIPS_PUB_140_Test_Certificate                                Cu,Cu,Cu
fips.sh: #4758: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: List the FIPS module keys -------------------------
certutil -d ../fips -K -f ../tests.fipspw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
< 0> dsa      22deb6ea184411a49a3eea743a73e573e42c4b2d   NSS FIPS 140-2 Certificate DB:FIPS_PUB_140_Test_Certificate
fips.sh: #4759: List the FIPS module keys (certutil -K) . - PASSED
fips.sh: Attempt to list FIPS module keys with incorrect password
certutil -d ../fips -K -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests.fipsbadpw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
Incorrect password/PIN entered.
certutil: could not authenticate to token NSS FIPS 140-2 Certificate DB.: The security password entered is incorrect.
fips.sh: #4760: Attempt to list FIPS module keys with incorrect password (certutil -K) . - PASSED
certutil -K returned 255
fips.sh: Validate the certificate --------------------------
certutil -d ../fips -V -n FIPS_PUB_140_Test_Certificate -u SR -e -f ../tests.fipspw
certutil: certificate is valid
fips.sh: #4761: Validate the certificate (certutil -V -e) . - PASSED
fips.sh: Export the certificate and key as a PKCS#12 file --
pk12util -d ../fips -o fips140.p12 -n FIPS_PUB_140_Test_Certificate -w ../tests.fipsp12pw -k ../tests.fipspw
pk12util: PKCS12 EXPORT SUCCESSFUL
fips.sh: #4762: Export the certificate and key as a PKCS#12 file (pk12util -o) . - PASSED
fips.sh: Export the certificate as a DER-encoded file ------
certutil -d ../fips -L -n FIPS_PUB_140_Test_Certificate -r -o fips140.crt
fips.sh: #4763: Export the certificate as a DER (certutil -L -r) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

FIPS_PUB_140_Test_Certificate                                Cu,Cu,Cu
fips.sh: #4764: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: Delete the certificate and key from the FIPS module
certutil -d ../fips -F -n FIPS_PUB_140_Test_Certificate -f ../tests.fipspw
fips.sh: #4765: Delete the certificate and key from the FIPS module (certutil -F) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI
fips.sh: #4766: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: List the FIPS module keys.
certutil -d ../fips -K -f ../tests.fipspw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
certutil: no keys found
fips.sh: #4767: List the FIPS module keys (certutil -K) . - PASSED
fips.sh: Import the certificate and key from the PKCS#12 file
pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw
pk12util: PKCS12 IMPORT SUCCESSFUL
fips.sh: #4768: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

FIPS_PUB_140_Test_Certificate                                u,u,u
fips.sh: #4769: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: List the FIPS module keys --------------------------
certutil -d ../fips -K -f ../tests.fipspw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
< 0> dsa      22deb6ea184411a49a3eea743a73e573e42c4b2d   FIPS_PUB_140_Test_Certificate
fips.sh: #4770: List the FIPS module keys (certutil -K) . - PASSED
fips.sh: Delete the certificate from the FIPS module
certutil -d ../fips -D -n FIPS_PUB_140_Test_Certificate
fips.sh: #4771: Delete the certificate from the FIPS module (certutil -D) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI
fips.sh: #4772: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: Import the certificate and key from the PKCS#12 file
pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw
pk12util: PKCS12 IMPORT SUCCESSFUL
fips.sh: #4773: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

FIPS_PUB_140_Test_Certificate                                u,u,u
fips.sh: #4774: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: List the FIPS module keys --------------------------
certutil -d ../fips -K -f ../tests.fipspw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
< 0> dsa      22deb6ea184411a49a3eea743a73e573e42c4b2d   FIPS_PUB_140_Test_Certificate
fips.sh: #4775: List the FIPS module keys (certutil -K) . - PASSED
fips.sh: Run PK11MODE in FIPSMODE  -----------------
pk11mode -d ../fips -p fips- -f ../tests.fipspw
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
**** Total number of TESTS ran in FIPS MODE is 106. ****
**** ALL TESTS PASSED ****
fips.sh: #4776: Run PK11MODE in FIPS mode (pk11mode) . - PASSED
fips.sh: Run PK11MODE in Non FIPSMODE  -----------------
pk11mode -d ../fips -p nonfips- -f ../tests.fipspw -n
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
**** Total number of TESTS ran in NON FIPS MODE is 104. ****
**** ALL TESTS PASSED ****
fips.sh: #4777: Run PK11MODE in Non FIPS mode (pk11mode -n) . - PASSED
mkdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libcertdb.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libcerthi.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libcrmf.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libcryptohi.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libdbm.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libfreebl3.chk /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libfreebl3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libfreebl.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libjar.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnspr4.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnspr4.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnss3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnss.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssb.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckfw.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssdbm3.chk /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssdbm3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssdbm.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssdev.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnsspki.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnsssysinit.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnsssysinit.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssutil3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssutil.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkcs12.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkcs7.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixparams.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixpki.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixresults.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixstore.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixtop.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixutil.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libplc4.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libplc4.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libplds4.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libplds4.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsmime3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsmime.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsoftokn3.chk /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsoftokn3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsoftokn.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsqlite3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsqlite.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libssl3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libssl.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
fips.sh: Detect mangled softoken--------------------------
mangling /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle/libsoftokn3.so
mangle -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle/libsoftokn3.so -o -8 -b 5
Changing byte 0x0004e9cd (321997): from 5f (95) to 7f (127)
LD_LIBRARY_PATH=/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle dbtest -r -d ../fips
fips.sh: #4778: Init NSS with a corrupted library (dbtest -r) . - PASSED
fips.sh done
TIMESTAMP fips END: Wed Nov 28 11:07:38 EST 2012
Running tests for ssl
TIMESTAMP ssl BEGIN: Wed Nov 28 11:07:38 EST 2012
ssl.sh: SSL tests ===============================
ssl.sh: CRL SSL Client Tests   - with ECC ===============================
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:07:38 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 18674 >/dev/null 2>/dev/null
selfserv with PID 18674 found at Wed Nov 28 11:07:38 EST 2012
selfserv with PID 18674 started at Wed Nov 28 11:07:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4779: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18674 at Wed Nov 28 11:07:38 EST 2012
kill -USR1 18674
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 18674 killed at Wed Nov 28 11:07:38 EST 2012
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:07:38 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 18730 >/dev/null 2>/dev/null
selfserv with PID 18730 found at Wed Nov 28 11:07:38 EST 2012
selfserv with PID 18730 started at Wed Nov 28 11:07:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4780: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18730 at Wed Nov 28 11:07:38 EST 2012
kill -USR1 18730
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 18730 killed at Wed Nov 28 11:07:38 EST 2012
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:07:38 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 18786 >/dev/null 2>/dev/null
selfserv with PID 18786 found at Wed Nov 28 11:07:38 EST 2012
selfserv with PID 18786 started at Wed Nov 28 11:07:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4781: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18786 at Wed Nov 28 11:07:38 EST 2012
kill -USR1 18786
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 18786 killed at Wed Nov 28 11:07:38 EST 2012
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Wed Nov 28 11:07:38 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 18854 >/dev/null 2>/dev/null
selfserv with PID 18854 found at Wed Nov 28 11:07:38 EST 2012
selfserv with PID 18854 started at Wed Nov 28 11:07:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4782: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18854 at Wed Nov 28 11:07:38 EST 2012
kill -USR1 18854
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 18854 killed at Wed Nov 28 11:07:38 EST 2012
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Wed Nov 28 11:07:38 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 18910 >/dev/null 2>/dev/null
selfserv with PID 18910 found at Wed Nov 28 11:07:38 EST 2012
selfserv with PID 18910 started at Wed Nov 28 11:07:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4783: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18910 at Wed Nov 28 11:07:38 EST 2012
kill -USR1 18910
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 18910 killed at Wed Nov 28 11:07:38 EST 2012
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Wed Nov 28 11:07:39 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 18966 >/dev/null 2>/dev/null
selfserv with PID 18966 found at Wed Nov 28 11:07:39 EST 2012
selfserv with PID 18966 started at Wed Nov 28 11:07:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4784: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18966 at Wed Nov 28 11:07:39 EST 2012
kill -USR1 18966
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 18966 killed at Wed Nov 28 11:07:39 EST 2012
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Wed Nov 28 11:07:39 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 19034 >/dev/null 2>/dev/null
selfserv with PID 19034 found at Wed Nov 28 11:07:39 EST 2012
selfserv with PID 19034 started at Wed Nov 28 11:07:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #4785: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 19034 at Wed Nov 28 11:07:39 EST 2012
kill -USR1 19034
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 19034 killed at Wed Nov 28 11:07:39 EST 2012
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Wed Nov 28 11:07:39 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 19090 >/dev/null 2>/dev/null
selfserv with PID 19090 found at Wed Nov 28 11:07:39 EST 2012
selfserv with PID 19090 started at Wed Nov 28 11:07:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4786: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19090 at Wed Nov 28 11:07:39 EST 2012
kill -USR1 19090
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 19090 killed at Wed Nov 28 11:07:39 EST 2012
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Wed Nov 28 11:07:39 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 19146 >/dev/null 2>/dev/null
selfserv with PID 19146 found at Wed Nov 28 11:07:39 EST 2012
selfserv with PID 19146 started at Wed Nov 28 11:07:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #4787: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 19146 at Wed Nov 28 11:07:39 EST 2012
kill -USR1 19146
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 19146 killed at Wed Nov 28 11:07:39 EST 2012
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:07:39 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 19214 >/dev/null 2>/dev/null
selfserv with PID 19214 found at Wed Nov 28 11:07:39 EST 2012
selfserv with PID 19214 started at Wed Nov 28 11:07:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #4788: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 19214 at Wed Nov 28 11:07:39 EST 2012
kill -USR1 19214
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 19214 killed at Wed Nov 28 11:07:39 EST 2012
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:07:39 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 19270 >/dev/null 2>/dev/null
selfserv with PID 19270 found at Wed Nov 28 11:07:39 EST 2012
selfserv with PID 19270 started at Wed Nov 28 11:07:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #4789: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 19270 at Wed Nov 28 11:07:39 EST 2012
kill -USR1 19270
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 19270 killed at Wed Nov 28 11:07:39 EST 2012
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:07:39 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 19326 >/dev/null 2>/dev/null
selfserv with PID 19326 found at Wed Nov 28 11:07:39 EST 2012
selfserv with PID 19326 started at Wed Nov 28 11:07:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #4790: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 19326 at Wed Nov 28 11:07:40 EST 2012
kill -USR1 19326
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 19326 killed at Wed Nov 28 11:07:40 EST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Wed Nov 28 11:07:40 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 19394 >/dev/null 2>/dev/null
selfserv with PID 19394 found at Wed Nov 28 11:07:40 EST 2012
selfserv with PID 19394 started at Wed Nov 28 11:07:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #4791: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 19394 at Wed Nov 28 11:07:40 EST 2012
kill -USR1 19394
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 19394 killed at Wed Nov 28 11:07:40 EST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Wed Nov 28 11:07:40 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 19450 >/dev/null 2>/dev/null
selfserv with PID 19450 found at Wed Nov 28 11:07:40 EST 2012
selfserv with PID 19450 started at Wed Nov 28 11:07:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #4792: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 19450 at Wed Nov 28 11:07:40 EST 2012
kill -USR1 19450
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 19450 killed at Wed Nov 28 11:07:40 EST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Wed Nov 28 11:07:40 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 19506 >/dev/null 2>/dev/null
selfserv with PID 19506 found at Wed Nov 28 11:07:40 EST 2012
selfserv with PID 19506 started at Wed Nov 28 11:07:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #4793: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 19506 at Wed Nov 28 11:07:40 EST 2012
kill -USR1 19506
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 19506 killed at Wed Nov 28 11:07:40 EST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Wed Nov 28 11:07:40 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 19574 >/dev/null 2>/dev/null
selfserv with PID 19574 found at Wed Nov 28 11:07:40 EST 2012
selfserv with PID 19574 started at Wed Nov 28 11:07:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #4794: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 19574 at Wed Nov 28 11:07:40 EST 2012
kill -USR1 19574
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 19574 killed at Wed Nov 28 11:07:40 EST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Wed Nov 28 11:07:40 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 19630 >/dev/null 2>/dev/null
selfserv with PID 19630 found at Wed Nov 28 11:07:40 EST 2012
selfserv with PID 19630 started at Wed Nov 28 11:07:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4795: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19630 at Wed Nov 28 11:07:40 EST 2012
kill -USR1 19630
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 19630 killed at Wed Nov 28 11:07:40 EST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Wed Nov 28 11:07:41 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 19686 >/dev/null 2>/dev/null
selfserv with PID 19686 found at Wed Nov 28 11:07:41 EST 2012
selfserv with PID 19686 started at Wed Nov 28 11:07:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #4796: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 19686 at Wed Nov 28 11:07:41 EST 2012
kill -USR1 19686
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 19686 killed at Wed Nov 28 11:07:41 EST 2012
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:07:41 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 19754 >/dev/null 2>/dev/null
selfserv with PID 19754 found at Wed Nov 28 11:07:41 EST 2012
selfserv with PID 19754 started at Wed Nov 28 11:07:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4797: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19754 at Wed Nov 28 11:07:41 EST 2012
kill -USR1 19754
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 19754 killed at Wed Nov 28 11:07:41 EST 2012
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:07:41 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 19810 >/dev/null 2>/dev/null
selfserv with PID 19810 found at Wed Nov 28 11:07:41 EST 2012
selfserv with PID 19810 started at Wed Nov 28 11:07:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4798: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19810 at Wed Nov 28 11:07:41 EST 2012
kill -USR1 19810
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 19810 killed at Wed Nov 28 11:07:41 EST 2012
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:07:41 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 19866 >/dev/null 2>/dev/null
selfserv with PID 19866 found at Wed Nov 28 11:07:41 EST 2012
selfserv with PID 19866 started at Wed Nov 28 11:07:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4799: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19866 at Wed Nov 28 11:07:41 EST 2012
kill -USR1 19866
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 19866 killed at Wed Nov 28 11:07:41 EST 2012
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Wed Nov 28 11:07:41 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 19935 >/dev/null 2>/dev/null
selfserv with PID 19935 found at Wed Nov 28 11:07:41 EST 2012
selfserv with PID 19935 started at Wed Nov 28 11:07:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4800: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19935 at Wed Nov 28 11:07:41 EST 2012
kill -USR1 19935
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 19935 killed at Wed Nov 28 11:07:41 EST 2012
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Wed Nov 28 11:07:41 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 19991 >/dev/null 2>/dev/null
selfserv with PID 19991 found at Wed Nov 28 11:07:41 EST 2012
selfserv with PID 19991 started at Wed Nov 28 11:07:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4801: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19991 at Wed Nov 28 11:07:41 EST 2012
kill -USR1 19991
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 19991 killed at Wed Nov 28 11:07:41 EST 2012
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Wed Nov 28 11:07:42 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 20047 >/dev/null 2>/dev/null
selfserv with PID 20047 found at Wed Nov 28 11:07:42 EST 2012
selfserv with PID 20047 started at Wed Nov 28 11:07:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4802: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 20047 at Wed Nov 28 11:07:42 EST 2012
kill -USR1 20047
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 20047 killed at Wed Nov 28 11:07:42 EST 2012
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Wed Nov 28 11:07:42 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 20115 >/dev/null 2>/dev/null
selfserv with PID 20115 found at Wed Nov 28 11:07:42 EST 2012
selfserv with PID 20115 started at Wed Nov 28 11:07:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #4803: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 20115 at Wed Nov 28 11:07:42 EST 2012
kill -USR1 20115
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 20115 killed at Wed Nov 28 11:07:42 EST 2012
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Wed Nov 28 11:07:42 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 20171 >/dev/null 2>/dev/null
selfserv with PID 20171 found at Wed Nov 28 11:07:42 EST 2012
selfserv with PID 20171 started at Wed Nov 28 11:07:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4804: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 20171 at Wed Nov 28 11:07:42 EST 2012
kill -USR1 20171
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 20171 killed at Wed Nov 28 11:07:42 EST 2012
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Wed Nov 28 11:07:42 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 20228 >/dev/null 2>/dev/null
selfserv with PID 20228 found at Wed Nov 28 11:07:42 EST 2012
selfserv with PID 20228 started at Wed Nov 28 11:07:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #4805: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 20228 at Wed Nov 28 11:07:42 EST 2012
kill -USR1 20228
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 20228 killed at Wed Nov 28 11:07:42 EST 2012
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:07:42 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 20296 >/dev/null 2>/dev/null
selfserv with PID 20296 found at Wed Nov 28 11:07:42 EST 2012
selfserv with PID 20296 started at Wed Nov 28 11:07:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #4806: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 20296 at Wed Nov 28 11:07:42 EST 2012
kill -USR1 20296
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 20296 killed at Wed Nov 28 11:07:42 EST 2012
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:07:42 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 20352 >/dev/null 2>/dev/null
selfserv with PID 20352 found at Wed Nov 28 11:07:42 EST 2012
selfserv with PID 20352 started at Wed Nov 28 11:07:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #4807: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 20352 at Wed Nov 28 11:07:42 EST 2012
kill -USR1 20352
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 20352 killed at Wed Nov 28 11:07:42 EST 2012
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:07:42 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 20408 >/dev/null 2>/dev/null
selfserv with PID 20408 found at Wed Nov 28 11:07:42 EST 2012
selfserv with PID 20408 started at Wed Nov 28 11:07:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #4808: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 20408 at Wed Nov 28 11:07:43 EST 2012
kill -USR1 20408
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 20408 killed at Wed Nov 28 11:07:43 EST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Wed Nov 28 11:07:43 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 20477 >/dev/null 2>/dev/null
selfserv with PID 20477 found at Wed Nov 28 11:07:43 EST 2012
selfserv with PID 20477 started at Wed Nov 28 11:07:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #4809: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 20477 at Wed Nov 28 11:07:43 EST 2012
kill -USR1 20477
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 20477 killed at Wed Nov 28 11:07:43 EST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Wed Nov 28 11:07:43 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 20533 >/dev/null 2>/dev/null
selfserv with PID 20533 found at Wed Nov 28 11:07:43 EST 2012
selfserv with PID 20533 started at Wed Nov 28 11:07:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #4810: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 20533 at Wed Nov 28 11:07:43 EST 2012
kill -USR1 20533
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 20533 killed at Wed Nov 28 11:07:43 EST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Wed Nov 28 11:07:43 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 20589 >/dev/null 2>/dev/null
selfserv with PID 20589 found at Wed Nov 28 11:07:43 EST 2012
selfserv with PID 20589 started at Wed Nov 28 11:07:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #4811: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 20589 at Wed Nov 28 11:07:43 EST 2012
kill -USR1 20589
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 20589 killed at Wed Nov 28 11:07:43 EST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Wed Nov 28 11:07:43 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 20657 >/dev/null 2>/dev/null
selfserv with PID 20657 found at Wed Nov 28 11:07:43 EST 2012
selfserv with PID 20657 started at Wed Nov 28 11:07:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #4812: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 20657 at Wed Nov 28 11:07:43 EST 2012
kill -USR1 20657
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 20657 killed at Wed Nov 28 11:07:43 EST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Wed Nov 28 11:07:43 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 20713 >/dev/null 2>/dev/null
selfserv with PID 20713 found at Wed Nov 28 11:07:43 EST 2012
selfserv with PID 20713 started at Wed Nov 28 11:07:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4813: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 20713 at Wed Nov 28 11:07:43 EST 2012
kill -USR1 20713
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 20713 killed at Wed Nov 28 11:07:43 EST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Wed Nov 28 11:07:43 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 20769 >/dev/null 2>/dev/null
selfserv with PID 20769 found at Wed Nov 28 11:07:43 EST 2012
selfserv with PID 20769 started at Wed Nov 28 11:07:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #4814: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 20769 at Wed Nov 28 11:07:44 EST 2012
kill -USR1 20769
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 20769 killed at Wed Nov 28 11:07:44 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:07:44 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 20837 >/dev/null 2>/dev/null
selfserv with PID 20837 found at Wed Nov 28 11:07:44 EST 2012
selfserv with PID 20837 started at Wed Nov 28 11:07:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4815: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 20837 at Wed Nov 28 11:07:44 EST 2012
kill -USR1 20837
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 20837 killed at Wed Nov 28 11:07:44 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:07:44 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 20893 >/dev/null 2>/dev/null
selfserv with PID 20893 found at Wed Nov 28 11:07:44 EST 2012
selfserv with PID 20893 started at Wed Nov 28 11:07:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4816: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 20893 at Wed Nov 28 11:07:44 EST 2012
kill -USR1 20893
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 20893 killed at Wed Nov 28 11:07:44 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:07:44 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 20949 >/dev/null 2>/dev/null
selfserv with PID 20949 found at Wed Nov 28 11:07:44 EST 2012
selfserv with PID 20949 started at Wed Nov 28 11:07:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4817: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 20949 at Wed Nov 28 11:07:44 EST 2012
kill -USR1 20949
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 20949 killed at Wed Nov 28 11:07:44 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:07:44 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 21017 >/dev/null 2>/dev/null
selfserv with PID 21017 found at Wed Nov 28 11:07:44 EST 2012
selfserv with PID 21017 started at Wed Nov 28 11:07:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4818: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 21017 at Wed Nov 28 11:07:44 EST 2012
kill -USR1 21017
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 21017 killed at Wed Nov 28 11:07:44 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:07:44 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 21073 >/dev/null 2>/dev/null
selfserv with PID 21073 found at Wed Nov 28 11:07:44 EST 2012
selfserv with PID 21073 started at Wed Nov 28 11:07:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4819: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 21073 at Wed Nov 28 11:07:44 EST 2012
kill -USR1 21073
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 21073 killed at Wed Nov 28 11:07:44 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:07:44 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 21129 >/dev/null 2>/dev/null
selfserv with PID 21129 found at Wed Nov 28 11:07:44 EST 2012
selfserv with PID 21129 started at Wed Nov 28 11:07:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4820: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 21129 at Wed Nov 28 11:07:45 EST 2012
kill -USR1 21129
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 21129 killed at Wed Nov 28 11:07:45 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:07:45 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:45 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 21197 >/dev/null 2>/dev/null
selfserv with PID 21197 found at Wed Nov 28 11:07:45 EST 2012
selfserv with PID 21197 started at Wed Nov 28 11:07:45 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4821: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 21197 at Wed Nov 28 11:07:45 EST 2012
kill -USR1 21197
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 21197 killed at Wed Nov 28 11:07:45 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:07:45 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:45 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 21253 >/dev/null 2>/dev/null
selfserv with PID 21253 found at Wed Nov 28 11:07:45 EST 2012
selfserv with PID 21253 started at Wed Nov 28 11:07:45 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4822: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 21253 at Wed Nov 28 11:07:45 EST 2012
kill -USR1 21253
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 21253 killed at Wed Nov 28 11:07:45 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:07:45 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:45 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 21309 >/dev/null 2>/dev/null
selfserv with PID 21309 found at Wed Nov 28 11:07:45 EST 2012
selfserv with PID 21309 started at Wed Nov 28 11:07:45 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4823: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 21309 at Wed Nov 28 11:07:45 EST 2012
kill -USR1 21309
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 21309 killed at Wed Nov 28 11:07:45 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:07:45 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:45 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 21377 >/dev/null 2>/dev/null
selfserv with PID 21377 found at Wed Nov 28 11:07:45 EST 2012
selfserv with PID 21377 started at Wed Nov 28 11:07:45 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4824: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 21377 at Wed Nov 28 11:07:45 EST 2012
kill -USR1 21377
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 21377 killed at Wed Nov 28 11:07:45 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:07:45 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:45 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 21433 >/dev/null 2>/dev/null
selfserv with PID 21433 found at Wed Nov 28 11:07:45 EST 2012
selfserv with PID 21433 started at Wed Nov 28 11:07:45 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4825: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 21433 at Wed Nov 28 11:07:45 EST 2012
kill -USR1 21433
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 21433 killed at Wed Nov 28 11:07:45 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:07:46 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 21489 >/dev/null 2>/dev/null
selfserv with PID 21489 found at Wed Nov 28 11:07:46 EST 2012
selfserv with PID 21489 started at Wed Nov 28 11:07:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4826: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 21489 at Wed Nov 28 11:07:46 EST 2012
kill -USR1 21489
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 21489 killed at Wed Nov 28 11:07:46 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:07:46 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 21557 >/dev/null 2>/dev/null
selfserv with PID 21557 found at Wed Nov 28 11:07:46 EST 2012
selfserv with PID 21557 started at Wed Nov 28 11:07:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4827: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 21557 at Wed Nov 28 11:07:46 EST 2012
kill -USR1 21557
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 21557 killed at Wed Nov 28 11:07:46 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:07:46 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 21613 >/dev/null 2>/dev/null
selfserv with PID 21613 found at Wed Nov 28 11:07:46 EST 2012
selfserv with PID 21613 started at Wed Nov 28 11:07:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4828: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 21613 at Wed Nov 28 11:07:46 EST 2012
kill -USR1 21613
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 21613 killed at Wed Nov 28 11:07:46 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:07:46 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 21669 >/dev/null 2>/dev/null
selfserv with PID 21669 found at Wed Nov 28 11:07:46 EST 2012
selfserv with PID 21669 started at Wed Nov 28 11:07:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4829: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 21669 at Wed Nov 28 11:07:46 EST 2012
kill -USR1 21669
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 21669 killed at Wed Nov 28 11:07:46 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:07:46 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 21737 >/dev/null 2>/dev/null
selfserv with PID 21737 found at Wed Nov 28 11:07:46 EST 2012
selfserv with PID 21737 started at Wed Nov 28 11:07:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4830: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 21737 at Wed Nov 28 11:07:46 EST 2012
kill -USR1 21737
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 21737 killed at Wed Nov 28 11:07:46 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:07:46 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 21793 >/dev/null 2>/dev/null
selfserv with PID 21793 found at Wed Nov 28 11:07:46 EST 2012
selfserv with PID 21793 started at Wed Nov 28 11:07:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4831: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 21793 at Wed Nov 28 11:07:46 EST 2012
kill -USR1 21793
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 21793 killed at Wed Nov 28 11:07:46 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:07:46 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 21849 >/dev/null 2>/dev/null
selfserv with PID 21849 found at Wed Nov 28 11:07:46 EST 2012
selfserv with PID 21849 started at Wed Nov 28 11:07:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4832: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 21849 at Wed Nov 28 11:07:47 EST 2012
kill -USR1 21849
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 21849 killed at Wed Nov 28 11:07:47 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:07:47 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 21917 >/dev/null 2>/dev/null
selfserv with PID 21917 found at Wed Nov 28 11:07:47 EST 2012
selfserv with PID 21917 started at Wed Nov 28 11:07:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4833: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 21917 at Wed Nov 28 11:07:47 EST 2012
kill -USR1 21917
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 21917 killed at Wed Nov 28 11:07:47 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:07:47 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 21973 >/dev/null 2>/dev/null
selfserv with PID 21973 found at Wed Nov 28 11:07:47 EST 2012
selfserv with PID 21973 started at Wed Nov 28 11:07:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4834: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 21973 at Wed Nov 28 11:07:47 EST 2012
kill -USR1 21973
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 21973 killed at Wed Nov 28 11:07:47 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:07:47 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 22029 >/dev/null 2>/dev/null
selfserv with PID 22029 found at Wed Nov 28 11:07:47 EST 2012
selfserv with PID 22029 started at Wed Nov 28 11:07:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4835: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 22029 at Wed Nov 28 11:07:47 EST 2012
kill -USR1 22029
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 22029 killed at Wed Nov 28 11:07:47 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:07:47 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 22097 >/dev/null 2>/dev/null
selfserv with PID 22097 found at Wed Nov 28 11:07:47 EST 2012
selfserv with PID 22097 started at Wed Nov 28 11:07:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4836: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 22097 at Wed Nov 28 11:07:47 EST 2012
kill -USR1 22097
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 22097 killed at Wed Nov 28 11:07:47 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:07:47 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 22153 >/dev/null 2>/dev/null
selfserv with PID 22153 found at Wed Nov 28 11:07:47 EST 2012
selfserv with PID 22153 started at Wed Nov 28 11:07:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4837: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 22153 at Wed Nov 28 11:07:47 EST 2012
kill -USR1 22153
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 22153 killed at Wed Nov 28 11:07:47 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:07:48 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 22209 >/dev/null 2>/dev/null
selfserv with PID 22209 found at Wed Nov 28 11:07:48 EST 2012
selfserv with PID 22209 started at Wed Nov 28 11:07:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4838: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 22209 at Wed Nov 28 11:07:48 EST 2012
kill -USR1 22209
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 22209 killed at Wed Nov 28 11:07:48 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:07:48 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 22277 >/dev/null 2>/dev/null
selfserv with PID 22277 found at Wed Nov 28 11:07:48 EST 2012
selfserv with PID 22277 started at Wed Nov 28 11:07:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4839: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 22277 at Wed Nov 28 11:07:48 EST 2012
kill -USR1 22277
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 22277 killed at Wed Nov 28 11:07:48 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:07:48 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 22333 >/dev/null 2>/dev/null
selfserv with PID 22333 found at Wed Nov 28 11:07:48 EST 2012
selfserv with PID 22333 started at Wed Nov 28 11:07:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4840: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 22333 at Wed Nov 28 11:07:48 EST 2012
kill -USR1 22333
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 22333 killed at Wed Nov 28 11:07:48 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:07:48 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 22389 >/dev/null 2>/dev/null
selfserv with PID 22389 found at Wed Nov 28 11:07:48 EST 2012
selfserv with PID 22389 started at Wed Nov 28 11:07:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4841: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 22389 at Wed Nov 28 11:07:48 EST 2012
kill -USR1 22389
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 22389 killed at Wed Nov 28 11:07:48 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:07:48 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 22457 >/dev/null 2>/dev/null
selfserv with PID 22457 found at Wed Nov 28 11:07:48 EST 2012
selfserv with PID 22457 started at Wed Nov 28 11:07:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4842: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 22457 at Wed Nov 28 11:07:48 EST 2012
kill -USR1 22457
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 22457 killed at Wed Nov 28 11:07:48 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:07:48 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 22513 >/dev/null 2>/dev/null
selfserv with PID 22513 found at Wed Nov 28 11:07:48 EST 2012
selfserv with PID 22513 started at Wed Nov 28 11:07:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4843: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 22513 at Wed Nov 28 11:07:49 EST 2012
kill -USR1 22513
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 22513 killed at Wed Nov 28 11:07:49 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:07:49 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:49 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 22569 >/dev/null 2>/dev/null
selfserv with PID 22569 found at Wed Nov 28 11:07:49 EST 2012
selfserv with PID 22569 started at Wed Nov 28 11:07:49 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4844: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 22569 at Wed Nov 28 11:07:49 EST 2012
kill -USR1 22569
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 22569 killed at Wed Nov 28 11:07:49 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:07:49 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:49 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 22637 >/dev/null 2>/dev/null
selfserv with PID 22637 found at Wed Nov 28 11:07:49 EST 2012
selfserv with PID 22637 started at Wed Nov 28 11:07:49 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4845: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 22637 at Wed Nov 28 11:07:49 EST 2012
kill -USR1 22637
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 22637 killed at Wed Nov 28 11:07:49 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:07:49 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:49 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 22693 >/dev/null 2>/dev/null
selfserv with PID 22693 found at Wed Nov 28 11:07:49 EST 2012
selfserv with PID 22693 started at Wed Nov 28 11:07:49 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4846: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 22693 at Wed Nov 28 11:07:49 EST 2012
kill -USR1 22693
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 22693 killed at Wed Nov 28 11:07:49 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:07:49 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:49 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 22749 >/dev/null 2>/dev/null
selfserv with PID 22749 found at Wed Nov 28 11:07:49 EST 2012
selfserv with PID 22749 started at Wed Nov 28 11:07:49 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4847: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 22749 at Wed Nov 28 11:07:49 EST 2012
kill -USR1 22749
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 22749 killed at Wed Nov 28 11:07:49 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:07:49 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:49 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 22817 >/dev/null 2>/dev/null
selfserv with PID 22817 found at Wed Nov 28 11:07:49 EST 2012
selfserv with PID 22817 started at Wed Nov 28 11:07:49 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4848: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 22817 at Wed Nov 28 11:07:49 EST 2012
kill -USR1 22817
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 22817 killed at Wed Nov 28 11:07:49 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:07:49 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:49 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 22873 >/dev/null 2>/dev/null
selfserv with PID 22873 found at Wed Nov 28 11:07:49 EST 2012
selfserv with PID 22873 started at Wed Nov 28 11:07:49 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4849: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 22873 at Wed Nov 28 11:07:50 EST 2012
kill -USR1 22873
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 22873 killed at Wed Nov 28 11:07:50 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:07:50 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:50 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 22929 >/dev/null 2>/dev/null
selfserv with PID 22929 found at Wed Nov 28 11:07:50 EST 2012
selfserv with PID 22929 started at Wed Nov 28 11:07:50 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4850: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 22929 at Wed Nov 28 11:07:50 EST 2012
kill -USR1 22929
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 22929 killed at Wed Nov 28 11:07:50 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:07:50 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:50 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 22997 >/dev/null 2>/dev/null
selfserv with PID 22997 found at Wed Nov 28 11:07:50 EST 2012
selfserv with PID 22997 started at Wed Nov 28 11:07:50 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4851: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 22997 at Wed Nov 28 11:07:50 EST 2012
kill -USR1 22997
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 22997 killed at Wed Nov 28 11:07:50 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:07:50 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:50 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23053 >/dev/null 2>/dev/null
selfserv with PID 23053 found at Wed Nov 28 11:07:50 EST 2012
selfserv with PID 23053 started at Wed Nov 28 11:07:50 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4852: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23053 at Wed Nov 28 11:07:50 EST 2012
kill -USR1 23053
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23053 killed at Wed Nov 28 11:07:50 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:07:50 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:50 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23109 >/dev/null 2>/dev/null
selfserv with PID 23109 found at Wed Nov 28 11:07:50 EST 2012
selfserv with PID 23109 started at Wed Nov 28 11:07:50 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4853: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23109 at Wed Nov 28 11:07:50 EST 2012
kill -USR1 23109
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23109 killed at Wed Nov 28 11:07:50 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:07:50 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:50 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23177 >/dev/null 2>/dev/null
selfserv with PID 23177 found at Wed Nov 28 11:07:50 EST 2012
selfserv with PID 23177 started at Wed Nov 28 11:07:50 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4854: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23177 at Wed Nov 28 11:07:50 EST 2012
kill -USR1 23177
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23177 killed at Wed Nov 28 11:07:50 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:07:50 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:50 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23233 >/dev/null 2>/dev/null
selfserv with PID 23233 found at Wed Nov 28 11:07:50 EST 2012
selfserv with PID 23233 started at Wed Nov 28 11:07:50 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4855: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23233 at Wed Nov 28 11:07:51 EST 2012
kill -USR1 23233
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23233 killed at Wed Nov 28 11:07:51 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:07:51 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:51 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23289 >/dev/null 2>/dev/null
selfserv with PID 23289 found at Wed Nov 28 11:07:51 EST 2012
selfserv with PID 23289 started at Wed Nov 28 11:07:51 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4856: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23289 at Wed Nov 28 11:07:51 EST 2012
kill -USR1 23289
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23289 killed at Wed Nov 28 11:07:51 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:07:51 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:51 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23357 >/dev/null 2>/dev/null
selfserv with PID 23357 found at Wed Nov 28 11:07:51 EST 2012
selfserv with PID 23357 started at Wed Nov 28 11:07:51 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4857: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 23357 at Wed Nov 28 11:07:51 EST 2012
kill -USR1 23357
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23357 killed at Wed Nov 28 11:07:51 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:07:51 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:51 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23413 >/dev/null 2>/dev/null
selfserv with PID 23413 found at Wed Nov 28 11:07:51 EST 2012
selfserv with PID 23413 started at Wed Nov 28 11:07:51 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4858: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23413 at Wed Nov 28 11:07:51 EST 2012
kill -USR1 23413
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23413 killed at Wed Nov 28 11:07:51 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:07:51 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:51 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23469 >/dev/null 2>/dev/null
selfserv with PID 23469 found at Wed Nov 28 11:07:51 EST 2012
selfserv with PID 23469 started at Wed Nov 28 11:07:51 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4859: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 23469 at Wed Nov 28 11:07:51 EST 2012
kill -USR1 23469
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23469 killed at Wed Nov 28 11:07:51 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:07:51 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:51 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23537 >/dev/null 2>/dev/null
selfserv with PID 23537 found at Wed Nov 28 11:07:51 EST 2012
selfserv with PID 23537 started at Wed Nov 28 11:07:51 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4860: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 23537 at Wed Nov 28 11:07:51 EST 2012
kill -USR1 23537
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23537 killed at Wed Nov 28 11:07:51 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:07:51 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:51 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23593 >/dev/null 2>/dev/null
selfserv with PID 23593 found at Wed Nov 28 11:07:51 EST 2012
selfserv with PID 23593 started at Wed Nov 28 11:07:51 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4861: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 23593 at Wed Nov 28 11:07:52 EST 2012
kill -USR1 23593
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23593 killed at Wed Nov 28 11:07:52 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:07:52 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:52 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23649 >/dev/null 2>/dev/null
selfserv with PID 23649 found at Wed Nov 28 11:07:52 EST 2012
selfserv with PID 23649 started at Wed Nov 28 11:07:52 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4862: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 23649 at Wed Nov 28 11:07:52 EST 2012
kill -USR1 23649
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23649 killed at Wed Nov 28 11:07:52 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:07:52 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:52 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23717 >/dev/null 2>/dev/null
selfserv with PID 23717 found at Wed Nov 28 11:07:52 EST 2012
selfserv with PID 23717 started at Wed Nov 28 11:07:52 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4863: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 23717 at Wed Nov 28 11:07:52 EST 2012
kill -USR1 23717
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23717 killed at Wed Nov 28 11:07:52 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:07:52 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:52 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23773 >/dev/null 2>/dev/null
selfserv with PID 23773 found at Wed Nov 28 11:07:52 EST 2012
selfserv with PID 23773 started at Wed Nov 28 11:07:52 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4864: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 23773 at Wed Nov 28 11:07:52 EST 2012
kill -USR1 23773
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23773 killed at Wed Nov 28 11:07:52 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:07:52 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:52 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23829 >/dev/null 2>/dev/null
selfserv with PID 23829 found at Wed Nov 28 11:07:52 EST 2012
selfserv with PID 23829 started at Wed Nov 28 11:07:52 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4865: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 23829 at Wed Nov 28 11:07:52 EST 2012
kill -USR1 23829
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23829 killed at Wed Nov 28 11:07:52 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:07:52 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:52 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23897 >/dev/null 2>/dev/null
selfserv with PID 23897 found at Wed Nov 28 11:07:52 EST 2012
selfserv with PID 23897 started at Wed Nov 28 11:07:52 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4866: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 23897 at Wed Nov 28 11:07:52 EST 2012
kill -USR1 23897
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23897 killed at Wed Nov 28 11:07:52 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:07:52 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:52 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23953 >/dev/null 2>/dev/null
selfserv with PID 23953 found at Wed Nov 28 11:07:52 EST 2012
selfserv with PID 23953 started at Wed Nov 28 11:07:52 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4867: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23953 at Wed Nov 28 11:07:53 EST 2012
kill -USR1 23953
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23953 killed at Wed Nov 28 11:07:53 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:07:53 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:53 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24009 >/dev/null 2>/dev/null
selfserv with PID 24009 found at Wed Nov 28 11:07:53 EST 2012
selfserv with PID 24009 started at Wed Nov 28 11:07:53 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4868: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24009 at Wed Nov 28 11:07:53 EST 2012
kill -USR1 24009
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24009 killed at Wed Nov 28 11:07:53 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:07:53 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:53 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24086 >/dev/null 2>/dev/null
selfserv with PID 24086 found at Wed Nov 28 11:07:53 EST 2012
selfserv with PID 24086 started at Wed Nov 28 11:07:53 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4869: TLS Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24086 at Wed Nov 28 11:07:53 EST 2012
kill -USR1 24086
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24086 killed at Wed Nov 28 11:07:53 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:07:53 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:53 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24142 >/dev/null 2>/dev/null
selfserv with PID 24142 found at Wed Nov 28 11:07:53 EST 2012
selfserv with PID 24142 started at Wed Nov 28 11:07:53 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4870: TLS Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24142 at Wed Nov 28 11:07:53 EST 2012
kill -USR1 24142
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24142 killed at Wed Nov 28 11:07:53 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:07:53 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:53 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24198 >/dev/null 2>/dev/null
selfserv with PID 24198 found at Wed Nov 28 11:07:53 EST 2012
selfserv with PID 24198 started at Wed Nov 28 11:07:53 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4871: TLS Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24198 at Wed Nov 28 11:07:53 EST 2012
kill -USR1 24198
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24198 killed at Wed Nov 28 11:07:53 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:07:53 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:53 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24266 >/dev/null 2>/dev/null
selfserv with PID 24266 found at Wed Nov 28 11:07:53 EST 2012
selfserv with PID 24266 started at Wed Nov 28 11:07:53 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #4872: TLS Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 24266 at Wed Nov 28 11:07:53 EST 2012
kill -USR1 24266
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24266 killed at Wed Nov 28 11:07:53 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:07:53 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:53 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24322 >/dev/null 2>/dev/null
selfserv with PID 24322 found at Wed Nov 28 11:07:54 EST 2012
selfserv with PID 24322 started at Wed Nov 28 11:07:54 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4873: TLS Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24322 at Wed Nov 28 11:07:54 EST 2012
kill -USR1 24322
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24322 killed at Wed Nov 28 11:07:54 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:07:54 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:54 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24378 >/dev/null 2>/dev/null
selfserv with PID 24378 found at Wed Nov 28 11:07:54 EST 2012
selfserv with PID 24378 started at Wed Nov 28 11:07:54 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #4874: TLS Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 24378 at Wed Nov 28 11:07:54 EST 2012
kill -USR1 24378
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24378 killed at Wed Nov 28 11:07:54 EST 2012
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:07:54 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:54 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24446 >/dev/null 2>/dev/null
selfserv with PID 24446 found at Wed Nov 28 11:07:54 EST 2012
selfserv with PID 24446 started at Wed Nov 28 11:07:54 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #4875: TLS Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 24446 at Wed Nov 28 11:07:54 EST 2012
kill -USR1 24446
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24446 killed at Wed Nov 28 11:07:54 EST 2012
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:07:54 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:54 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24502 >/dev/null 2>/dev/null
selfserv with PID 24502 found at Wed Nov 28 11:07:54 EST 2012
selfserv with PID 24502 started at Wed Nov 28 11:07:54 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #4876: TLS Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 24502 at Wed Nov 28 11:07:54 EST 2012
kill -USR1 24502
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24502 killed at Wed Nov 28 11:07:54 EST 2012
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:07:54 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:54 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24558 >/dev/null 2>/dev/null
selfserv with PID 24558 found at Wed Nov 28 11:07:54 EST 2012
selfserv with PID 24558 started at Wed Nov 28 11:07:54 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #4877: TLS Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 24558 at Wed Nov 28 11:07:54 EST 2012
kill -USR1 24558
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24558 killed at Wed Nov 28 11:07:54 EST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:07:54 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:54 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24626 >/dev/null 2>/dev/null
selfserv with PID 24626 found at Wed Nov 28 11:07:54 EST 2012
selfserv with PID 24626 started at Wed Nov 28 11:07:54 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #4878: TLS Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 24626 at Wed Nov 28 11:07:55 EST 2012
kill -USR1 24626
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24626 killed at Wed Nov 28 11:07:55 EST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:07:55 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:55 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24682 >/dev/null 2>/dev/null
selfserv with PID 24682 found at Wed Nov 28 11:07:55 EST 2012
selfserv with PID 24682 started at Wed Nov 28 11:07:55 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4879: TLS Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24682 at Wed Nov 28 11:07:55 EST 2012
kill -USR1 24682
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24682 killed at Wed Nov 28 11:07:55 EST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:07:55 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:55 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24738 >/dev/null 2>/dev/null
selfserv with PID 24738 found at Wed Nov 28 11:07:55 EST 2012
selfserv with PID 24738 started at Wed Nov 28 11:07:55 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #4880: TLS Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 24738 at Wed Nov 28 11:07:55 EST 2012
kill -USR1 24738
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24738 killed at Wed Nov 28 11:07:55 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:07:55 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:55 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24806 >/dev/null 2>/dev/null
selfserv with PID 24806 found at Wed Nov 28 11:07:55 EST 2012
selfserv with PID 24806 started at Wed Nov 28 11:07:55 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4881: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24806 at Wed Nov 28 11:07:55 EST 2012
kill -USR1 24806
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24806 killed at Wed Nov 28 11:07:55 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:07:55 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:55 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24862 >/dev/null 2>/dev/null
selfserv with PID 24862 found at Wed Nov 28 11:07:55 EST 2012
selfserv with PID 24862 started at Wed Nov 28 11:07:55 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4882: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24862 at Wed Nov 28 11:07:55 EST 2012
kill -USR1 24862
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24862 killed at Wed Nov 28 11:07:55 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:07:55 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:55 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24918 >/dev/null 2>/dev/null
selfserv with PID 24918 found at Wed Nov 28 11:07:55 EST 2012
selfserv with PID 24918 started at Wed Nov 28 11:07:55 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4883: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24918 at Wed Nov 28 11:07:56 EST 2012
kill -USR1 24918
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24918 killed at Wed Nov 28 11:07:56 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:07:56 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:56 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24986 >/dev/null 2>/dev/null
selfserv with PID 24986 found at Wed Nov 28 11:07:56 EST 2012
selfserv with PID 24986 started at Wed Nov 28 11:07:56 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #4884: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 24986 at Wed Nov 28 11:07:56 EST 2012
kill -USR1 24986
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24986 killed at Wed Nov 28 11:07:56 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:07:56 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:56 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25042 >/dev/null 2>/dev/null
selfserv with PID 25042 found at Wed Nov 28 11:07:56 EST 2012
selfserv with PID 25042 started at Wed Nov 28 11:07:56 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4885: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25042 at Wed Nov 28 11:07:56 EST 2012
kill -USR1 25042
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25042 killed at Wed Nov 28 11:07:56 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:07:56 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:56 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25098 >/dev/null 2>/dev/null
selfserv with PID 25098 found at Wed Nov 28 11:07:56 EST 2012
selfserv with PID 25098 started at Wed Nov 28 11:07:56 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #4886: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 25098 at Wed Nov 28 11:07:56 EST 2012
kill -USR1 25098
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25098 killed at Wed Nov 28 11:07:56 EST 2012
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:07:56 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:56 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25166 >/dev/null 2>/dev/null
selfserv with PID 25166 found at Wed Nov 28 11:07:56 EST 2012
selfserv with PID 25166 started at Wed Nov 28 11:07:56 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #4887: SSL3 Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 25166 at Wed Nov 28 11:07:56 EST 2012
kill -USR1 25166
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25166 killed at Wed Nov 28 11:07:56 EST 2012
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:07:56 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:56 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25222 >/dev/null 2>/dev/null
selfserv with PID 25222 found at Wed Nov 28 11:07:56 EST 2012
selfserv with PID 25222 started at Wed Nov 28 11:07:56 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #4888: SSL3 Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 25222 at Wed Nov 28 11:07:57 EST 2012
kill -USR1 25222
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25222 killed at Wed Nov 28 11:07:57 EST 2012
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:07:57 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:57 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25278 >/dev/null 2>/dev/null
selfserv with PID 25278 found at Wed Nov 28 11:07:57 EST 2012
selfserv with PID 25278 started at Wed Nov 28 11:07:57 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #4889: SSL3 Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 25278 at Wed Nov 28 11:07:57 EST 2012
kill -USR1 25278
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25278 killed at Wed Nov 28 11:07:57 EST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:07:57 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:57 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25346 >/dev/null 2>/dev/null
selfserv with PID 25346 found at Wed Nov 28 11:07:57 EST 2012
selfserv with PID 25346 started at Wed Nov 28 11:07:57 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #4890: SSL3 Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 25346 at Wed Nov 28 11:07:57 EST 2012
kill -USR1 25346
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25346 killed at Wed Nov 28 11:07:57 EST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:07:57 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:57 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25402 >/dev/null 2>/dev/null
selfserv with PID 25402 found at Wed Nov 28 11:07:57 EST 2012
selfserv with PID 25402 started at Wed Nov 28 11:07:57 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4891: SSL3 Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25402 at Wed Nov 28 11:07:57 EST 2012
kill -USR1 25402
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25402 killed at Wed Nov 28 11:07:57 EST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:07:57 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:57 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25458 >/dev/null 2>/dev/null
selfserv with PID 25458 found at Wed Nov 28 11:07:57 EST 2012
selfserv with PID 25458 started at Wed Nov 28 11:07:57 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #4892: SSL3 Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 25458 at Wed Nov 28 11:07:57 EST 2012
kill -USR1 25458
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25458 killed at Wed Nov 28 11:07:57 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:07:57 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:57 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25526 >/dev/null 2>/dev/null
selfserv with PID 25526 found at Wed Nov 28 11:07:57 EST 2012
selfserv with PID 25526 started at Wed Nov 28 11:07:57 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4893: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25526 at Wed Nov 28 11:07:57 EST 2012
kill -USR1 25526
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25526 killed at Wed Nov 28 11:07:58 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:07:58 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:58 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25582 >/dev/null 2>/dev/null
selfserv with PID 25582 found at Wed Nov 28 11:07:58 EST 2012
selfserv with PID 25582 started at Wed Nov 28 11:07:58 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4894: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25582 at Wed Nov 28 11:07:58 EST 2012
kill -USR1 25582
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25582 killed at Wed Nov 28 11:07:58 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:07:58 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:58 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25638 >/dev/null 2>/dev/null
selfserv with PID 25638 found at Wed Nov 28 11:07:58 EST 2012
selfserv with PID 25638 started at Wed Nov 28 11:07:58 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4895: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25638 at Wed Nov 28 11:07:58 EST 2012
kill -USR1 25638
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25638 killed at Wed Nov 28 11:07:58 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:07:58 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:58 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25706 >/dev/null 2>/dev/null
selfserv with PID 25706 found at Wed Nov 28 11:07:58 EST 2012
selfserv with PID 25706 started at Wed Nov 28 11:07:58 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4896: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25706 at Wed Nov 28 11:07:58 EST 2012
kill -USR1 25706
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25706 killed at Wed Nov 28 11:07:58 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:07:58 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:58 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25762 >/dev/null 2>/dev/null
selfserv with PID 25762 found at Wed Nov 28 11:07:58 EST 2012
selfserv with PID 25762 started at Wed Nov 28 11:07:58 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4897: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25762 at Wed Nov 28 11:07:58 EST 2012
kill -USR1 25762
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25762 killed at Wed Nov 28 11:07:58 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:07:58 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:58 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25818 >/dev/null 2>/dev/null
selfserv with PID 25818 found at Wed Nov 28 11:07:58 EST 2012
selfserv with PID 25818 started at Wed Nov 28 11:07:58 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4898: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25818 at Wed Nov 28 11:07:58 EST 2012
kill -USR1 25818
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25818 killed at Wed Nov 28 11:07:58 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:07:58 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:58 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25886 >/dev/null 2>/dev/null
selfserv with PID 25886 found at Wed Nov 28 11:07:58 EST 2012
selfserv with PID 25886 started at Wed Nov 28 11:07:58 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4899: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25886 at Wed Nov 28 11:07:59 EST 2012
kill -USR1 25886
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25886 killed at Wed Nov 28 11:07:59 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:07:59 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:59 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25942 >/dev/null 2>/dev/null
selfserv with PID 25942 found at Wed Nov 28 11:07:59 EST 2012
selfserv with PID 25942 started at Wed Nov 28 11:07:59 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4900: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25942 at Wed Nov 28 11:07:59 EST 2012
kill -USR1 25942
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25942 killed at Wed Nov 28 11:07:59 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:07:59 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:59 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25998 >/dev/null 2>/dev/null
selfserv with PID 25998 found at Wed Nov 28 11:07:59 EST 2012
selfserv with PID 25998 started at Wed Nov 28 11:07:59 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4901: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25998 at Wed Nov 28 11:07:59 EST 2012
kill -USR1 25998
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25998 killed at Wed Nov 28 11:07:59 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:07:59 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:59 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 26066 >/dev/null 2>/dev/null
selfserv with PID 26066 found at Wed Nov 28 11:07:59 EST 2012
selfserv with PID 26066 started at Wed Nov 28 11:07:59 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4902: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26066 at Wed Nov 28 11:07:59 EST 2012
kill -USR1 26066
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 26066 killed at Wed Nov 28 11:07:59 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:07:59 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:59 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 26122 >/dev/null 2>/dev/null
selfserv with PID 26122 found at Wed Nov 28 11:07:59 EST 2012
selfserv with PID 26122 started at Wed Nov 28 11:07:59 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4903: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26122 at Wed Nov 28 11:07:59 EST 2012
kill -USR1 26122
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 26122 killed at Wed Nov 28 11:07:59 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:07:59 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:07:59 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 26178 >/dev/null 2>/dev/null
selfserv with PID 26178 found at Wed Nov 28 11:07:59 EST 2012
selfserv with PID 26178 started at Wed Nov 28 11:07:59 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4904: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26178 at Wed Nov 28 11:07:59 EST 2012
kill -USR1 26178
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 26178 killed at Wed Nov 28 11:07:59 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:08:00 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:08:00 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 26246 >/dev/null 2>/dev/null
selfserv with PID 26246 found at Wed Nov 28 11:08:00 EST 2012
selfserv with PID 26246 started at Wed Nov 28 11:08:00 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4905: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26246 at Wed Nov 28 11:08:00 EST 2012
kill -USR1 26246
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 26246 killed at Wed Nov 28 11:08:00 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:08:00 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:08:00 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 26302 >/dev/null 2>/dev/null
selfserv with PID 26302 found at Wed Nov 28 11:08:00 EST 2012
selfserv with PID 26302 started at Wed Nov 28 11:08:00 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4906: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26302 at Wed Nov 28 11:08:00 EST 2012
kill -USR1 26302
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 26302 killed at Wed Nov 28 11:08:00 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:08:00 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:08:00 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 26358 >/dev/null 2>/dev/null
selfserv with PID 26358 found at Wed Nov 28 11:08:00 EST 2012
selfserv with PID 26358 started at Wed Nov 28 11:08:00 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4907: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26358 at Wed Nov 28 11:08:00 EST 2012
kill -USR1 26358
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 26358 killed at Wed Nov 28 11:08:00 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:08:00 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:08:00 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 26426 >/dev/null 2>/dev/null
selfserv with PID 26426 found at Wed Nov 28 11:08:00 EST 2012
selfserv with PID 26426 started at Wed Nov 28 11:08:00 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4908: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26426 at Wed Nov 28 11:08:00 EST 2012
kill -USR1 26426
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 26426 killed at Wed Nov 28 11:08:00 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:08:00 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:08:00 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 26482 >/dev/null 2>/dev/null
selfserv with PID 26482 found at Wed Nov 28 11:08:00 EST 2012
selfserv with PID 26482 started at Wed Nov 28 11:08:00 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4909: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26482 at Wed Nov 28 11:08:00 EST 2012
kill -USR1 26482
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 26482 killed at Wed Nov 28 11:08:00 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:08:00 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:08:00 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 26539 >/dev/null 2>/dev/null
selfserv with PID 26539 found at Wed Nov 28 11:08:00 EST 2012
selfserv with PID 26539 started at Wed Nov 28 11:08:00 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4910: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26539 at Wed Nov 28 11:08:01 EST 2012
kill -USR1 26539
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 26539 killed at Wed Nov 28 11:08:01 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:08:01 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:08:01 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 26607 >/dev/null 2>/dev/null
selfserv with PID 26607 found at Wed Nov 28 11:08:01 EST 2012
selfserv with PID 26607 started at Wed Nov 28 11:08:01 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4911: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26607 at Wed Nov 28 11:08:01 EST 2012
kill -USR1 26607
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 26607 killed at Wed Nov 28 11:08:01 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:08:01 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:08:01 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 26673 >/dev/null 2>/dev/null
selfserv with PID 26673 found at Wed Nov 28 11:08:01 EST 2012
selfserv with PID 26673 started at Wed Nov 28 11:08:01 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4912: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26673 at Wed Nov 28 11:08:01 EST 2012
kill -USR1 26673
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 26673 killed at Wed Nov 28 11:08:01 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:08:01 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:08:01 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 26729 >/dev/null 2>/dev/null
selfserv with PID 26729 found at Wed Nov 28 11:08:01 EST 2012
selfserv with PID 26729 started at Wed Nov 28 11:08:01 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4913: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26729 at Wed Nov 28 11:08:01 EST 2012
kill -USR1 26729
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 26729 killed at Wed Nov 28 11:08:01 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:08:01 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:08:01 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 26797 >/dev/null 2>/dev/null
selfserv with PID 26797 found at Wed Nov 28 11:08:01 EST 2012
selfserv with PID 26797 started at Wed Nov 28 11:08:01 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4914: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26797 at Wed Nov 28 11:08:01 EST 2012
kill -USR1 26797
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 26797 killed at Wed Nov 28 11:08:01 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:08:01 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:08:01 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 26853 >/dev/null 2>/dev/null
selfserv with PID 26853 found at Wed Nov 28 11:08:01 EST 2012
selfserv with PID 26853 started at Wed Nov 28 11:08:01 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4915: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26853 at Wed Nov 28 11:08:02 EST 2012
kill -USR1 26853
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 26853 killed at Wed Nov 28 11:08:02 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:08:02 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:08:02 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 26909 >/dev/null 2>/dev/null
selfserv with PID 26909 found at Wed Nov 28 11:08:02 EST 2012
selfserv with PID 26909 started at Wed Nov 28 11:08:02 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4916: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26909 at Wed Nov 28 11:08:02 EST 2012
kill -USR1 26909
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 26909 killed at Wed Nov 28 11:08:02 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:08:02 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:08:02 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 26977 >/dev/null 2>/dev/null
selfserv with PID 26977 found at Wed Nov 28 11:08:02 EST 2012
selfserv with PID 26977 started at Wed Nov 28 11:08:02 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4917: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26977 at Wed Nov 28 11:08:02 EST 2012
kill -USR1 26977
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 26977 killed at Wed Nov 28 11:08:02 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:08:02 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:08:02 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 27033 >/dev/null 2>/dev/null
selfserv with PID 27033 found at Wed Nov 28 11:08:02 EST 2012
selfserv with PID 27033 started at Wed Nov 28 11:08:02 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4918: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27033 at Wed Nov 28 11:08:02 EST 2012
kill -USR1 27033
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 27033 killed at Wed Nov 28 11:08:02 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:08:02 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:08:02 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 27089 >/dev/null 2>/dev/null
selfserv with PID 27089 found at Wed Nov 28 11:08:02 EST 2012
selfserv with PID 27089 started at Wed Nov 28 11:08:02 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4919: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27089 at Wed Nov 28 11:08:02 EST 2012
kill -USR1 27089
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 27089 killed at Wed Nov 28 11:08:02 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:08:02 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:08:02 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 27157 >/dev/null 2>/dev/null
selfserv with PID 27157 found at Wed Nov 28 11:08:02 EST 2012
selfserv with PID 27157 started at Wed Nov 28 11:08:02 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4920: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 27157 at Wed Nov 28 11:08:03 EST 2012
kill -USR1 27157
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 27157 killed at Wed Nov 28 11:08:03 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:08:03 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:08:03 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 27213 >/dev/null 2>/dev/null
selfserv with PID 27213 found at Wed Nov 28 11:08:03 EST 2012
selfserv with PID 27213 started at Wed Nov 28 11:08:03 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4921: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27213 at Wed Nov 28 11:08:03 EST 2012
kill -USR1 27213
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 27213 killed at Wed Nov 28 11:08:03 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:08:03 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:08:03 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 27269 >/dev/null 2>/dev/null
selfserv with PID 27269 found at Wed Nov 28 11:08:03 EST 2012
selfserv with PID 27269 started at Wed Nov 28 11:08:03 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4922: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 27269 at Wed Nov 28 11:08:03 EST 2012
kill -USR1 27269
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 27269 killed at Wed Nov 28 11:08:03 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:08:03 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:08:03 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 27337 >/dev/null 2>/dev/null
selfserv with PID 27337 found at Wed Nov 28 11:08:03 EST 2012
selfserv with PID 27337 started at Wed Nov 28 11:08:03 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4923: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 27337 at Wed Nov 28 11:08:03 EST 2012
kill -USR1 27337
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 27337 killed at Wed Nov 28 11:08:03 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:08:03 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:08:03 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 27393 >/dev/null 2>/dev/null
selfserv with PID 27393 found at Wed Nov 28 11:08:03 EST 2012
selfserv with PID 27393 started at Wed Nov 28 11:08:03 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4924: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 27393 at Wed Nov 28 11:08:03 EST 2012
kill -USR1 27393
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 27393 killed at Wed Nov 28 11:08:03 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:08:03 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:08:03 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 27449 >/dev/null 2>/dev/null
selfserv with PID 27449 found at Wed Nov 28 11:08:03 EST 2012
selfserv with PID 27449 started at Wed Nov 28 11:08:03 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4925: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 27449 at Wed Nov 28 11:08:03 EST 2012
kill -USR1 27449
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 27449 killed at Wed Nov 28 11:08:03 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:08:04 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:08:04 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 27517 >/dev/null 2>/dev/null
selfserv with PID 27517 found at Wed Nov 28 11:08:04 EST 2012
selfserv with PID 27517 started at Wed Nov 28 11:08:04 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4926: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 27517 at Wed Nov 28 11:08:04 EST 2012
kill -USR1 27517
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 27517 killed at Wed Nov 28 11:08:04 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:08:04 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:08:04 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 27573 >/dev/null 2>/dev/null
selfserv with PID 27573 found at Wed Nov 28 11:08:04 EST 2012
selfserv with PID 27573 started at Wed Nov 28 11:08:04 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4927: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27573 at Wed Nov 28 11:08:04 EST 2012
kill -USR1 27573
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 27573 killed at Wed Nov 28 11:08:04 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:08:04 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:08:04 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 27629 >/dev/null 2>/dev/null
selfserv with PID 27629 found at Wed Nov 28 11:08:04 EST 2012
selfserv with PID 27629 started at Wed Nov 28 11:08:04 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4928: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 27629 at Wed Nov 28 11:08:04 EST 2012
kill -USR1 27629
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 27629 killed at Wed Nov 28 11:08:04 EST 2012
ssl.sh: Cache CRL SSL Client Tests   - with ECC ===============================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/authin.tl.tmp
0
selfserv starting at Wed Nov 28 11:08:04 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:08:04 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 27692 >/dev/null 2>/dev/null
selfserv with PID 27692 found at Wed Nov 28 11:08:04 EST 2012
selfserv with PID 27692 started at Wed Nov 28 11:08:04 EST 2012
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 27692 >/dev/null 2>/dev/null
selfserv with PID 27692 found at Wed Nov 28 11:08:04 EST 2012
ssl.sh: #4929: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27692 >/dev/null 2>/dev/null
selfserv with PID 27692 found at Wed Nov 28 11:08:04 EST 2012
ssl.sh: #4930: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 27692 >/dev/null 2>/dev/null
selfserv with PID 27692 found at Wed Nov 28 11:08:04 EST 2012
ssl.sh: #4931: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser43   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27692 >/dev/null 2>/dev/null
selfserv with PID 27692 found at Wed Nov 28 11:08:05 EST 2012
ssl.sh: #4932: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser44   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27692 >/dev/null 2>/dev/null
selfserv with PID 27692 found at Wed Nov 28 11:08:05 EST 2012
ssl.sh: #4933: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser45   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27692 >/dev/null 2>/dev/null
selfserv with PID 27692 found at Wed Nov 28 11:08:05 EST 2012
ssl.sh: #4934: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser46   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27692 >/dev/null 2>/dev/null
selfserv with PID 27692 found at Wed Nov 28 11:08:05 EST 2012
ssl.sh: #4935: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser47   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27692 >/dev/null 2>/dev/null
selfserv with PID 27692 found at Wed Nov 28 11:08:05 EST 2012
ssl.sh: #4936: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser48   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27692 >/dev/null 2>/dev/null
selfserv with PID 27692 found at Wed Nov 28 11:08:05 EST 2012
ssl.sh: #4937: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser49   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27692 >/dev/null 2>/dev/null
selfserv with PID 27692 found at Wed Nov 28 11:08:05 EST 2012
ssl.sh: #4938: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser50   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27692 >/dev/null 2>/dev/null
selfserv with PID 27692 found at Wed Nov 28 11:08:05 EST 2012
ssl.sh: #4939: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser51   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27692 >/dev/null 2>/dev/null
selfserv with PID 27692 found at Wed Nov 28 11:08:05 EST 2012
ssl.sh: #4940: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser52   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27692 >/dev/null 2>/dev/null
selfserv with PID 27692 found at Wed Nov 28 11:08:05 EST 2012
ssl.sh: #4941: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/server/root.crl_43-48

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 156 bytes
tstclnt: Writing 156 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27692 >/dev/null 2>/dev/null
selfserv with PID 27692 found at Wed Nov 28 11:08:05 EST 2012
================= CRL Reloaded =============
ssl.sh: #4942: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 27692 >/dev/null 2>/dev/null
selfserv with PID 27692 found at Wed Nov 28 11:08:05 EST 2012
ssl.sh: #4943: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27692 >/dev/null 2>/dev/null
selfserv with PID 27692 found at Wed Nov 28 11:08:06 EST 2012
ssl.sh: #4944: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 27692 >/dev/null 2>/dev/null
selfserv with PID 27692 found at Wed Nov 28 11:08:06 EST 2012
ssl.sh: #4945: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser43   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 27692 >/dev/null 2>/dev/null
selfserv with PID 27692 found at Wed Nov 28 11:08:06 EST 2012
ssl.sh: #4946: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser44   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 27692 >/dev/null 2>/dev/null
selfserv with PID 27692 found at Wed Nov 28 11:08:06 EST 2012
ssl.sh: #4947: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser45   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 27692 >/dev/null 2>/dev/null
selfserv with PID 27692 found at Wed Nov 28 11:08:06 EST 2012
ssl.sh: #4948: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser46   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27692 >/dev/null 2>/dev/null
selfserv with PID 27692 found at Wed Nov 28 11:08:06 EST 2012
ssl.sh: #4949: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser47   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 27692 >/dev/null 2>/dev/null
selfserv with PID 27692 found at Wed Nov 28 11:08:06 EST 2012
ssl.sh: #4950: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser48   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 27692 >/dev/null 2>/dev/null
selfserv with PID 27692 found at Wed Nov 28 11:08:06 EST 2012
ssl.sh: #4951: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser49   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27692 >/dev/null 2>/dev/null
selfserv with PID 27692 found at Wed Nov 28 11:08:06 EST 2012
ssl.sh: #4952: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser50   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27692 >/dev/null 2>/dev/null
selfserv with PID 27692 found at Wed Nov 28 11:08:06 EST 2012
ssl.sh: #4953: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser51   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27692 >/dev/null 2>/dev/null
selfserv with PID 27692 found at Wed Nov 28 11:08:06 EST 2012
ssl.sh: #4954: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser52   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27692 >/dev/null 2>/dev/null
selfserv with PID 27692 found at Wed Nov 28 11:08:07 EST 2012
ssl.sh: #4955: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/server/root.crl_49-52

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 156 bytes
tstclnt: Writing 156 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27692 >/dev/null 2>/dev/null
selfserv with PID 27692 found at Wed Nov 28 11:08:07 EST 2012
================= CRL Reloaded =============
ssl.sh: #4956: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 27692 >/dev/null 2>/dev/null
selfserv with PID 27692 found at Wed Nov 28 11:08:07 EST 2012
ssl.sh: #4957: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27692 >/dev/null 2>/dev/null
selfserv with PID 27692 found at Wed Nov 28 11:08:07 EST 2012
ssl.sh: #4958: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 27692 >/dev/null 2>/dev/null
selfserv with PID 27692 found at Wed Nov 28 11:08:07 EST 2012
ssl.sh: #4959: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser43   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 27692 >/dev/null 2>/dev/null
selfserv with PID 27692 found at Wed Nov 28 11:08:07 EST 2012
ssl.sh: #4960: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser44   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 27692 >/dev/null 2>/dev/null
selfserv with PID 27692 found at Wed Nov 28 11:08:07 EST 2012
ssl.sh: #4961: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser45   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 27692 >/dev/null 2>/dev/null
selfserv with PID 27692 found at Wed Nov 28 11:08:07 EST 2012
ssl.sh: #4962: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser46   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27692 >/dev/null 2>/dev/null
selfserv with PID 27692 found at Wed Nov 28 11:08:07 EST 2012
ssl.sh: #4963: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser47   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 27692 >/dev/null 2>/dev/null
selfserv with PID 27692 found at Wed Nov 28 11:08:07 EST 2012
ssl.sh: #4964: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser48   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 27692 >/dev/null 2>/dev/null
selfserv with PID 27692 found at Wed Nov 28 11:08:07 EST 2012
ssl.sh: #4965: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser49   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 27692 >/dev/null 2>/dev/null
selfserv with PID 27692 found at Wed Nov 28 11:08:07 EST 2012
ssl.sh: #4966: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser50   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 27692 >/dev/null 2>/dev/null
selfserv with PID 27692 found at Wed Nov 28 11:08:07 EST 2012
ssl.sh: #4967: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser51   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27692 >/dev/null 2>/dev/null
selfserv with PID 27692 found at Wed Nov 28 11:08:08 EST 2012
ssl.sh: #4968: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser52   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 27692 >/dev/null 2>/dev/null
selfserv with PID 27692 found at Wed Nov 28 11:08:08 EST 2012
ssl.sh: #4969: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 27692 at Wed Nov 28 11:08:08 EST 2012
kill -USR1 27692
selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 27692 killed at Wed Nov 28 11:08:08 EST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Wed Nov 28 11:08:08 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:08:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 29112 >/dev/null 2>/dev/null
selfserv with PID 29112 found at Wed Nov 28 11:08:08 EST 2012
selfserv with PID 29112 started at Wed Nov 28 11:08:08 EST 2012
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 29112 >/dev/null 2>/dev/null
selfserv with PID 29112 found at Wed Nov 28 11:08:08 EST 2012
ssl.sh: #4970: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29112 >/dev/null 2>/dev/null
selfserv with PID 29112 found at Wed Nov 28 11:08:08 EST 2012
ssl.sh: #4971: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 29112 >/dev/null 2>/dev/null
selfserv with PID 29112 found at Wed Nov 28 11:08:08 EST 2012
ssl.sh: #4972: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser43 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29112 >/dev/null 2>/dev/null
selfserv with PID 29112 found at Wed Nov 28 11:08:08 EST 2012
ssl.sh: #4973: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser44 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29112 >/dev/null 2>/dev/null
selfserv with PID 29112 found at Wed Nov 28 11:08:08 EST 2012
ssl.sh: #4974: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser45 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29112 >/dev/null 2>/dev/null
selfserv with PID 29112 found at Wed Nov 28 11:08:08 EST 2012
ssl.sh: #4975: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser46 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29112 >/dev/null 2>/dev/null
selfserv with PID 29112 found at Wed Nov 28 11:08:08 EST 2012
ssl.sh: #4976: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser47 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29112 >/dev/null 2>/dev/null
selfserv with PID 29112 found at Wed Nov 28 11:08:08 EST 2012
ssl.sh: #4977: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser48 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29112 >/dev/null 2>/dev/null
selfserv with PID 29112 found at Wed Nov 28 11:08:09 EST 2012
ssl.sh: #4978: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser49 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29112 >/dev/null 2>/dev/null
selfserv with PID 29112 found at Wed Nov 28 11:08:09 EST 2012
ssl.sh: #4979: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser50 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29112 >/dev/null 2>/dev/null
selfserv with PID 29112 found at Wed Nov 28 11:08:09 EST 2012
ssl.sh: #4980: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser51 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29112 >/dev/null 2>/dev/null
selfserv with PID 29112 found at Wed Nov 28 11:08:09 EST 2012
ssl.sh: #4981: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser52 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29112 >/dev/null 2>/dev/null
selfserv with PID 29112 found at Wed Nov 28 11:08:09 EST 2012
ssl.sh: #4982: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/server/root.crl_43-48

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 156 bytes
tstclnt: Writing 156 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29112 >/dev/null 2>/dev/null
selfserv with PID 29112 found at Wed Nov 28 11:08:09 EST 2012
================= CRL Reloaded =============
ssl.sh: #4983: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 29112 >/dev/null 2>/dev/null
selfserv with PID 29112 found at Wed Nov 28 11:08:09 EST 2012
ssl.sh: #4984: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29112 >/dev/null 2>/dev/null
selfserv with PID 29112 found at Wed Nov 28 11:08:09 EST 2012
ssl.sh: #4985: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 29112 >/dev/null 2>/dev/null
selfserv with PID 29112 found at Wed Nov 28 11:08:09 EST 2012
ssl.sh: #4986: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser43 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 29112 >/dev/null 2>/dev/null
selfserv with PID 29112 found at Wed Nov 28 11:08:09 EST 2012
ssl.sh: #4987: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser44 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 29112 >/dev/null 2>/dev/null
selfserv with PID 29112 found at Wed Nov 28 11:08:09 EST 2012
ssl.sh: #4988: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser45 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 29112 >/dev/null 2>/dev/null
selfserv with PID 29112 found at Wed Nov 28 11:08:09 EST 2012
ssl.sh: #4989: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser46 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29112 >/dev/null 2>/dev/null
selfserv with PID 29112 found at Wed Nov 28 11:08:10 EST 2012
ssl.sh: #4990: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser47 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 29112 >/dev/null 2>/dev/null
selfserv with PID 29112 found at Wed Nov 28 11:08:10 EST 2012
ssl.sh: #4991: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser48 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 29112 >/dev/null 2>/dev/null
selfserv with PID 29112 found at Wed Nov 28 11:08:10 EST 2012
ssl.sh: #4992: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser49 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29112 >/dev/null 2>/dev/null
selfserv with PID 29112 found at Wed Nov 28 11:08:10 EST 2012
ssl.sh: #4993: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser50 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29112 >/dev/null 2>/dev/null
selfserv with PID 29112 found at Wed Nov 28 11:08:10 EST 2012
ssl.sh: #4994: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser51 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29112 >/dev/null 2>/dev/null
selfserv with PID 29112 found at Wed Nov 28 11:08:11 EST 2012
ssl.sh: #4995: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser52 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29112 >/dev/null 2>/dev/null
selfserv with PID 29112 found at Wed Nov 28 11:08:12 EST 2012
ssl.sh: #4996: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/server/root.crl_49-52

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 156 bytes
tstclnt: Writing 156 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29112 >/dev/null 2>/dev/null
selfserv with PID 29112 found at Wed Nov 28 11:08:12 EST 2012
================= CRL Reloaded =============
ssl.sh: #4997: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 29112 >/dev/null 2>/dev/null
selfserv with PID 29112 found at Wed Nov 28 11:08:12 EST 2012
ssl.sh: #4998: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29112 >/dev/null 2>/dev/null
selfserv with PID 29112 found at Wed Nov 28 11:08:12 EST 2012
ssl.sh: #4999: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 29112 >/dev/null 2>/dev/null
selfserv with PID 29112 found at Wed Nov 28 11:08:12 EST 2012
ssl.sh: #5000: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser43 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 29112 >/dev/null 2>/dev/null
selfserv with PID 29112 found at Wed Nov 28 11:08:12 EST 2012
ssl.sh: #5001: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser44 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 29112 >/dev/null 2>/dev/null
selfserv with PID 29112 found at Wed Nov 28 11:08:12 EST 2012
ssl.sh: #5002: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser45 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 29112 >/dev/null 2>/dev/null
selfserv with PID 29112 found at Wed Nov 28 11:08:12 EST 2012
ssl.sh: #5003: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser46 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29112 >/dev/null 2>/dev/null
selfserv with PID 29112 found at Wed Nov 28 11:08:12 EST 2012
ssl.sh: #5004: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser47 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 29112 >/dev/null 2>/dev/null
selfserv with PID 29112 found at Wed Nov 28 11:08:12 EST 2012
ssl.sh: #5005: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser48 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 29112 >/dev/null 2>/dev/null
selfserv with PID 29112 found at Wed Nov 28 11:08:12 EST 2012
ssl.sh: #5006: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser49 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 29112 >/dev/null 2>/dev/null
selfserv with PID 29112 found at Wed Nov 28 11:08:12 EST 2012
ssl.sh: #5007: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser50 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 29112 >/dev/null 2>/dev/null
selfserv with PID 29112 found at Wed Nov 28 11:08:13 EST 2012
ssl.sh: #5008: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser51 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29112 >/dev/null 2>/dev/null
selfserv with PID 29112 found at Wed Nov 28 11:08:13 EST 2012
ssl.sh: #5009: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser52 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 29112 >/dev/null 2>/dev/null
selfserv with PID 29112 found at Wed Nov 28 11:08:13 EST 2012
ssl.sh: #5010: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 29112 at Wed Nov 28 11:08:13 EST 2012
kill -USR1 29112
selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 29112 killed at Wed Nov 28 11:08:13 EST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Wed Nov 28 11:08:13 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:08:13 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 30532 >/dev/null 2>/dev/null
selfserv with PID 30532 found at Wed Nov 28 11:08:13 EST 2012
selfserv with PID 30532 started at Wed Nov 28 11:08:13 EST 2012
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 30532 >/dev/null 2>/dev/null
selfserv with PID 30532 found at Wed Nov 28 11:08:13 EST 2012
ssl.sh: #5011: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30532 >/dev/null 2>/dev/null
selfserv with PID 30532 found at Wed Nov 28 11:08:13 EST 2012
ssl.sh: #5012: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 30532 >/dev/null 2>/dev/null
selfserv with PID 30532 found at Wed Nov 28 11:08:13 EST 2012
ssl.sh: #5013: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser43-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30532 >/dev/null 2>/dev/null
selfserv with PID 30532 found at Wed Nov 28 11:08:13 EST 2012
ssl.sh: #5014: TLS Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser44-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30532 >/dev/null 2>/dev/null
selfserv with PID 30532 found at Wed Nov 28 11:08:13 EST 2012
ssl.sh: #5015: TLS Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser45-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30532 >/dev/null 2>/dev/null
selfserv with PID 30532 found at Wed Nov 28 11:08:13 EST 2012
ssl.sh: #5016: TLS Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser46-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30532 >/dev/null 2>/dev/null
selfserv with PID 30532 found at Wed Nov 28 11:08:13 EST 2012
ssl.sh: #5017: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser47-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30532 >/dev/null 2>/dev/null
selfserv with PID 30532 found at Wed Nov 28 11:08:14 EST 2012
ssl.sh: #5018: TLS Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser48-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30532 >/dev/null 2>/dev/null
selfserv with PID 30532 found at Wed Nov 28 11:08:14 EST 2012
ssl.sh: #5019: TLS Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser49-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30532 >/dev/null 2>/dev/null
selfserv with PID 30532 found at Wed Nov 28 11:08:14 EST 2012
ssl.sh: #5020: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser50-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30532 >/dev/null 2>/dev/null
selfserv with PID 30532 found at Wed Nov 28 11:08:14 EST 2012
ssl.sh: #5021: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser51-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30532 >/dev/null 2>/dev/null
selfserv with PID 30532 found at Wed Nov 28 11:08:14 EST 2012
ssl.sh: #5022: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser52-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30532 >/dev/null 2>/dev/null
selfserv with PID 30532 found at Wed Nov 28 11:08:14 EST 2012
ssl.sh: #5023: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/server/root.crl_43-48-ec

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 159 bytes
tstclnt: Writing 159 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30532 >/dev/null 2>/dev/null
selfserv with PID 30532 found at Wed Nov 28 11:08:14 EST 2012
================= CRL Reloaded =============
ssl.sh: #5024: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 30532 >/dev/null 2>/dev/null
selfserv with PID 30532 found at Wed Nov 28 11:08:14 EST 2012
ssl.sh: #5025: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30532 >/dev/null 2>/dev/null
selfserv with PID 30532 found at Wed Nov 28 11:08:14 EST 2012
ssl.sh: #5026: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 30532 >/dev/null 2>/dev/null
selfserv with PID 30532 found at Wed Nov 28 11:08:14 EST 2012
ssl.sh: #5027: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser43-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 30532 >/dev/null 2>/dev/null
selfserv with PID 30532 found at Wed Nov 28 11:08:15 EST 2012
ssl.sh: #5028: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser44-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 30532 >/dev/null 2>/dev/null
selfserv with PID 30532 found at Wed Nov 28 11:08:15 EST 2012
ssl.sh: #5029: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser45-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 30532 >/dev/null 2>/dev/null
selfserv with PID 30532 found at Wed Nov 28 11:08:15 EST 2012
ssl.sh: #5030: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser46-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30532 >/dev/null 2>/dev/null
selfserv with PID 30532 found at Wed Nov 28 11:08:15 EST 2012
ssl.sh: #5031: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser47-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 30532 >/dev/null 2>/dev/null
selfserv with PID 30532 found at Wed Nov 28 11:08:15 EST 2012
ssl.sh: #5032: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser48-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 30532 >/dev/null 2>/dev/null
selfserv with PID 30532 found at Wed Nov 28 11:08:15 EST 2012
ssl.sh: #5033: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser49-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30532 >/dev/null 2>/dev/null
selfserv with PID 30532 found at Wed Nov 28 11:08:15 EST 2012
ssl.sh: #5034: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser50-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30532 >/dev/null 2>/dev/null
selfserv with PID 30532 found at Wed Nov 28 11:08:15 EST 2012
ssl.sh: #5035: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser51-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30532 >/dev/null 2>/dev/null
selfserv with PID 30532 found at Wed Nov 28 11:08:15 EST 2012
ssl.sh: #5036: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser52-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30532 >/dev/null 2>/dev/null
selfserv with PID 30532 found at Wed Nov 28 11:08:16 EST 2012
ssl.sh: #5037: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/server/root.crl_49-52-ec

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 159 bytes
tstclnt: Writing 159 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30532 >/dev/null 2>/dev/null
selfserv with PID 30532 found at Wed Nov 28 11:08:16 EST 2012
================= CRL Reloaded =============
ssl.sh: #5038: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 30532 >/dev/null 2>/dev/null
selfserv with PID 30532 found at Wed Nov 28 11:08:16 EST 2012
ssl.sh: #5039: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30532 >/dev/null 2>/dev/null
selfserv with PID 30532 found at Wed Nov 28 11:08:16 EST 2012
ssl.sh: #5040: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 30532 >/dev/null 2>/dev/null
selfserv with PID 30532 found at Wed Nov 28 11:08:16 EST 2012
ssl.sh: #5041: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser43-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 30532 >/dev/null 2>/dev/null
selfserv with PID 30532 found at Wed Nov 28 11:08:16 EST 2012
ssl.sh: #5042: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser44-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 30532 >/dev/null 2>/dev/null
selfserv with PID 30532 found at Wed Nov 28 11:08:16 EST 2012
ssl.sh: #5043: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser45-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 30532 >/dev/null 2>/dev/null
selfserv with PID 30532 found at Wed Nov 28 11:08:16 EST 2012
ssl.sh: #5044: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser46-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30532 >/dev/null 2>/dev/null
selfserv with PID 30532 found at Wed Nov 28 11:08:16 EST 2012
ssl.sh: #5045: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser47-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 30532 >/dev/null 2>/dev/null
selfserv with PID 30532 found at Wed Nov 28 11:08:16 EST 2012
ssl.sh: #5046: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser48-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 30532 >/dev/null 2>/dev/null
selfserv with PID 30532 found at Wed Nov 28 11:08:17 EST 2012
ssl.sh: #5047: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser49-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 30532 >/dev/null 2>/dev/null
selfserv with PID 30532 found at Wed Nov 28 11:08:17 EST 2012
ssl.sh: #5048: TLS Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser50-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 30532 >/dev/null 2>/dev/null
selfserv with PID 30532 found at Wed Nov 28 11:08:17 EST 2012
ssl.sh: #5049: TLS Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser51-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30532 >/dev/null 2>/dev/null
selfserv with PID 30532 found at Wed Nov 28 11:08:17 EST 2012
ssl.sh: #5050: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser52-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 30532 >/dev/null 2>/dev/null
selfserv with PID 30532 found at Wed Nov 28 11:08:17 EST 2012
ssl.sh: #5051: TLS Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 30532 at Wed Nov 28 11:08:17 EST 2012
kill -USR1 30532
selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 30532 killed at Wed Nov 28 11:08:17 EST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:08:17 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:08:17 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 31952 >/dev/null 2>/dev/null
selfserv with PID 31952 found at Wed Nov 28 11:08:17 EST 2012
selfserv with PID 31952 started at Wed Nov 28 11:08:17 EST 2012
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 31952 >/dev/null 2>/dev/null
selfserv with PID 31952 found at Wed Nov 28 11:08:17 EST 2012
ssl.sh: #5052: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31952 >/dev/null 2>/dev/null
selfserv with PID 31952 found at Wed Nov 28 11:08:17 EST 2012
ssl.sh: #5053: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 31952 >/dev/null 2>/dev/null
selfserv with PID 31952 found at Wed Nov 28 11:08:17 EST 2012
ssl.sh: #5054: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser43-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31952 >/dev/null 2>/dev/null
selfserv with PID 31952 found at Wed Nov 28 11:08:18 EST 2012
ssl.sh: #5055: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser44-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31952 >/dev/null 2>/dev/null
selfserv with PID 31952 found at Wed Nov 28 11:08:18 EST 2012
ssl.sh: #5056: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser45-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31952 >/dev/null 2>/dev/null
selfserv with PID 31952 found at Wed Nov 28 11:08:18 EST 2012
ssl.sh: #5057: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser46-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31952 >/dev/null 2>/dev/null
selfserv with PID 31952 found at Wed Nov 28 11:08:18 EST 2012
ssl.sh: #5058: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser47-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31952 >/dev/null 2>/dev/null
selfserv with PID 31952 found at Wed Nov 28 11:08:18 EST 2012
ssl.sh: #5059: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser48-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31952 >/dev/null 2>/dev/null
selfserv with PID 31952 found at Wed Nov 28 11:08:18 EST 2012
ssl.sh: #5060: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser49-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31952 >/dev/null 2>/dev/null
selfserv with PID 31952 found at Wed Nov 28 11:08:18 EST 2012
ssl.sh: #5061: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser50-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31952 >/dev/null 2>/dev/null
selfserv with PID 31952 found at Wed Nov 28 11:08:18 EST 2012
ssl.sh: #5062: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser51-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31952 >/dev/null 2>/dev/null
selfserv with PID 31952 found at Wed Nov 28 11:08:18 EST 2012
ssl.sh: #5063: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser52-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31952 >/dev/null 2>/dev/null
selfserv with PID 31952 found at Wed Nov 28 11:08:19 EST 2012
ssl.sh: #5064: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/server/root.crl_43-48-ec

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 159 bytes
tstclnt: Writing 159 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31952 >/dev/null 2>/dev/null
selfserv with PID 31952 found at Wed Nov 28 11:08:19 EST 2012
================= CRL Reloaded =============
ssl.sh: #5065: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 31952 >/dev/null 2>/dev/null
selfserv with PID 31952 found at Wed Nov 28 11:08:19 EST 2012
ssl.sh: #5066: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31952 >/dev/null 2>/dev/null
selfserv with PID 31952 found at Wed Nov 28 11:08:19 EST 2012
ssl.sh: #5067: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 31952 >/dev/null 2>/dev/null
selfserv with PID 31952 found at Wed Nov 28 11:08:19 EST 2012
ssl.sh: #5068: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser43-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 31952 >/dev/null 2>/dev/null
selfserv with PID 31952 found at Wed Nov 28 11:08:19 EST 2012
ssl.sh: #5069: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser44-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 31952 >/dev/null 2>/dev/null
selfserv with PID 31952 found at Wed Nov 28 11:08:19 EST 2012
ssl.sh: #5070: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser45-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 31952 >/dev/null 2>/dev/null
selfserv with PID 31952 found at Wed Nov 28 11:08:19 EST 2012
ssl.sh: #5071: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser46-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31952 >/dev/null 2>/dev/null
selfserv with PID 31952 found at Wed Nov 28 11:08:19 EST 2012
ssl.sh: #5072: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser47-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 31952 >/dev/null 2>/dev/null
selfserv with PID 31952 found at Wed Nov 28 11:08:19 EST 2012
ssl.sh: #5073: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser48-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 31952 >/dev/null 2>/dev/null
selfserv with PID 31952 found at Wed Nov 28 11:08:20 EST 2012
ssl.sh: #5074: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser49-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31952 >/dev/null 2>/dev/null
selfserv with PID 31952 found at Wed Nov 28 11:08:20 EST 2012
ssl.sh: #5075: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser50-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31952 >/dev/null 2>/dev/null
selfserv with PID 31952 found at Wed Nov 28 11:08:20 EST 2012
ssl.sh: #5076: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser51-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31952 >/dev/null 2>/dev/null
selfserv with PID 31952 found at Wed Nov 28 11:08:20 EST 2012
ssl.sh: #5077: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser52-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31952 >/dev/null 2>/dev/null
selfserv with PID 31952 found at Wed Nov 28 11:08:20 EST 2012
ssl.sh: #5078: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/server/root.crl_49-52-ec

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 159 bytes
tstclnt: Writing 159 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31952 >/dev/null 2>/dev/null
selfserv with PID 31952 found at Wed Nov 28 11:08:20 EST 2012
================= CRL Reloaded =============
ssl.sh: #5079: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 31952 >/dev/null 2>/dev/null
selfserv with PID 31952 found at Wed Nov 28 11:08:20 EST 2012
ssl.sh: #5080: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31952 >/dev/null 2>/dev/null
selfserv with PID 31952 found at Wed Nov 28 11:08:20 EST 2012
ssl.sh: #5081: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 31952 >/dev/null 2>/dev/null
selfserv with PID 31952 found at Wed Nov 28 11:08:20 EST 2012
ssl.sh: #5082: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser43-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 31952 >/dev/null 2>/dev/null
selfserv with PID 31952 found at Wed Nov 28 11:08:20 EST 2012
ssl.sh: #5083: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser44-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 31952 >/dev/null 2>/dev/null
selfserv with PID 31952 found at Wed Nov 28 11:08:20 EST 2012
ssl.sh: #5084: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser45-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 31952 >/dev/null 2>/dev/null
selfserv with PID 31952 found at Wed Nov 28 11:08:21 EST 2012
ssl.sh: #5085: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser46-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31952 >/dev/null 2>/dev/null
selfserv with PID 31952 found at Wed Nov 28 11:08:21 EST 2012
ssl.sh: #5086: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser47-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 31952 >/dev/null 2>/dev/null
selfserv with PID 31952 found at Wed Nov 28 11:08:21 EST 2012
ssl.sh: #5087: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser48-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 31952 >/dev/null 2>/dev/null
selfserv with PID 31952 found at Wed Nov 28 11:08:21 EST 2012
ssl.sh: #5088: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser49-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 31952 >/dev/null 2>/dev/null
selfserv with PID 31952 found at Wed Nov 28 11:08:21 EST 2012
ssl.sh: #5089: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser50-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 31952 >/dev/null 2>/dev/null
selfserv with PID 31952 found at Wed Nov 28 11:08:21 EST 2012
ssl.sh: #5090: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser51-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31952 >/dev/null 2>/dev/null
selfserv with PID 31952 found at Wed Nov 28 11:08:21 EST 2012
ssl.sh: #5091: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser52-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 31952 >/dev/null 2>/dev/null
selfserv with PID 31952 found at Wed Nov 28 11:08:21 EST 2012
ssl.sh: #5092: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 31952 at Wed Nov 28 11:08:21 EST 2012
kill -USR1 31952
selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 31952 killed at Wed Nov 28 11:08:21 EST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:08:21 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:08:21 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 1018 >/dev/null 2>/dev/null
selfserv with PID 1018 found at Wed Nov 28 11:08:21 EST 2012
selfserv with PID 1018 started at Wed Nov 28 11:08:21 EST 2012
trying to kill selfserv with PID 1018 at Wed Nov 28 11:08:21 EST 2012
kill -USR1 1018
./ssl.sh: line 173:  1018 User defined signal 1   ${PROFTOOL} ${BINDIR}/selfserv -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 1018 killed at Wed Nov 28 11:08:21 EST 2012
selfserv starting at Wed Nov 28 11:08:21 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:08:21 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 1060 >/dev/null 2>/dev/null
selfserv with PID 1060 found at Wed Nov 28 11:08:21 EST 2012
selfserv with PID 1060 started at Wed Nov 28 11:08:21 EST 2012
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1060 >/dev/null 2>/dev/null
selfserv with PID 1060 found at Wed Nov 28 11:08:22 EST 2012
ssl.sh: #5093: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1060 >/dev/null 2>/dev/null
selfserv with PID 1060 found at Wed Nov 28 11:08:22 EST 2012
ssl.sh: #5094: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1060 >/dev/null 2>/dev/null
selfserv with PID 1060 found at Wed Nov 28 11:08:22 EST 2012
ssl.sh: #5095: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1060 >/dev/null 2>/dev/null
selfserv with PID 1060 found at Wed Nov 28 11:08:22 EST 2012
ssl.sh: #5096: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1060 >/dev/null 2>/dev/null
selfserv with PID 1060 found at Wed Nov 28 11:08:22 EST 2012
ssl.sh: #5097: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1060 >/dev/null 2>/dev/null
selfserv with PID 1060 found at Wed Nov 28 11:08:22 EST 2012
ssl.sh: #5098: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1060 >/dev/null 2>/dev/null
selfserv with PID 1060 found at Wed Nov 28 11:08:22 EST 2012
ssl.sh: #5099: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1060 >/dev/null 2>/dev/null
selfserv with PID 1060 found at Wed Nov 28 11:08:22 EST 2012
ssl.sh: #5100: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1060 >/dev/null 2>/dev/null
selfserv with PID 1060 found at Wed Nov 28 11:08:22 EST 2012
ssl.sh: #5101: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1060 >/dev/null 2>/dev/null
selfserv with PID 1060 found at Wed Nov 28 11:08:22 EST 2012
ssl.sh: #5102: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1060 >/dev/null 2>/dev/null
selfserv with PID 1060 found at Wed Nov 28 11:08:22 EST 2012
ssl.sh: #5103: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1060 >/dev/null 2>/dev/null
selfserv with PID 1060 found at Wed Nov 28 11:08:23 EST 2012
ssl.sh: #5104: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1060 >/dev/null 2>/dev/null
selfserv with PID 1060 found at Wed Nov 28 11:08:23 EST 2012
ssl.sh: #5105: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/server/root.crl_43-48

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 156 bytes
tstclnt: Writing 156 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1060 >/dev/null 2>/dev/null
selfserv with PID 1060 found at Wed Nov 28 11:08:23 EST 2012
================= CRL Reloaded =============
ssl.sh: #5106: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1060 >/dev/null 2>/dev/null
selfserv with PID 1060 found at Wed Nov 28 11:08:23 EST 2012
ssl.sh: #5107: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1060 >/dev/null 2>/dev/null
selfserv with PID 1060 found at Wed Nov 28 11:08:23 EST 2012
ssl.sh: #5108: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1060 >/dev/null 2>/dev/null
selfserv with PID 1060 found at Wed Nov 28 11:08:23 EST 2012
ssl.sh: #5109: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x09 for socket out_flags.
tstclnt: PR_Poll returned 0x09 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1060 >/dev/null 2>/dev/null
selfserv with PID 1060 found at Wed Nov 28 11:08:23 EST 2012
ssl.sh: #5110: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1060 >/dev/null 2>/dev/null
selfserv with PID 1060 found at Wed Nov 28 11:08:23 EST 2012
ssl.sh: #5111: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1060 >/dev/null 2>/dev/null
selfserv with PID 1060 found at Wed Nov 28 11:08:23 EST 2012
ssl.sh: #5112: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1060 >/dev/null 2>/dev/null
selfserv with PID 1060 found at Wed Nov 28 11:08:23 EST 2012
ssl.sh: #5113: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1060 >/dev/null 2>/dev/null
selfserv with PID 1060 found at Wed Nov 28 11:08:23 EST 2012
ssl.sh: #5114: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1060 >/dev/null 2>/dev/null
selfserv with PID 1060 found at Wed Nov 28 11:08:23 EST 2012
ssl.sh: #5115: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1060 >/dev/null 2>/dev/null
selfserv with PID 1060 found at Wed Nov 28 11:08:24 EST 2012
ssl.sh: #5116: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1060 >/dev/null 2>/dev/null
selfserv with PID 1060 found at Wed Nov 28 11:08:24 EST 2012
ssl.sh: #5117: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1060 >/dev/null 2>/dev/null
selfserv with PID 1060 found at Wed Nov 28 11:08:24 EST 2012
ssl.sh: #5118: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1060 >/dev/null 2>/dev/null
selfserv with PID 1060 found at Wed Nov 28 11:08:24 EST 2012
ssl.sh: #5119: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/server/root.crl_49-52

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 156 bytes
tstclnt: Writing 156 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1060 >/dev/null 2>/dev/null
selfserv with PID 1060 found at Wed Nov 28 11:08:24 EST 2012
================= CRL Reloaded =============
ssl.sh: #5120: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1060 >/dev/null 2>/dev/null
selfserv with PID 1060 found at Wed Nov 28 11:08:24 EST 2012
ssl.sh: #5121: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1060 >/dev/null 2>/dev/null
selfserv with PID 1060 found at Wed Nov 28 11:08:24 EST 2012
ssl.sh: #5122: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1060 >/dev/null 2>/dev/null
selfserv with PID 1060 found at Wed Nov 28 11:08:24 EST 2012
ssl.sh: #5123: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1060 >/dev/null 2>/dev/null
selfserv with PID 1060 found at Wed Nov 28 11:08:24 EST 2012
ssl.sh: #5124: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1060 >/dev/null 2>/dev/null
selfserv with PID 1060 found at Wed Nov 28 11:08:24 EST 2012
ssl.sh: #5125: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1060 >/dev/null 2>/dev/null
selfserv with PID 1060 found at Wed Nov 28 11:08:24 EST 2012
ssl.sh: #5126: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1060 >/dev/null 2>/dev/null
selfserv with PID 1060 found at Wed Nov 28 11:08:24 EST 2012
ssl.sh: #5127: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1060 >/dev/null 2>/dev/null
selfserv with PID 1060 found at Wed Nov 28 11:08:25 EST 2012
ssl.sh: #5128: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1060 >/dev/null 2>/dev/null
selfserv with PID 1060 found at Wed Nov 28 11:08:25 EST 2012
ssl.sh: #5129: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1060 >/dev/null 2>/dev/null
selfserv with PID 1060 found at Wed Nov 28 11:08:25 EST 2012
ssl.sh: #5130: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1060 >/dev/null 2>/dev/null
selfserv with PID 1060 found at Wed Nov 28 11:08:25 EST 2012
ssl.sh: #5131: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1060 >/dev/null 2>/dev/null
selfserv with PID 1060 found at Wed Nov 28 11:08:25 EST 2012
ssl.sh: #5132: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1060 >/dev/null 2>/dev/null
selfserv with PID 1060 found at Wed Nov 28 11:08:25 EST 2012
ssl.sh: #5133: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1060 at Wed Nov 28 11:08:25 EST 2012
kill -USR1 1060
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 1060 killed at Wed Nov 28 11:08:25 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:08:25 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:08:25 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 2483 >/dev/null 2>/dev/null
selfserv with PID 2483 found at Wed Nov 28 11:08:25 EST 2012
selfserv with PID 2483 started at Wed Nov 28 11:08:25 EST 2012
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2483 >/dev/null 2>/dev/null
selfserv with PID 2483 found at Wed Nov 28 11:08:25 EST 2012
ssl.sh: #5134: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2483 >/dev/null 2>/dev/null
selfserv with PID 2483 found at Wed Nov 28 11:08:25 EST 2012
ssl.sh: #5135: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2483 >/dev/null 2>/dev/null
selfserv with PID 2483 found at Wed Nov 28 11:08:25 EST 2012
ssl.sh: #5136: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2483 >/dev/null 2>/dev/null
selfserv with PID 2483 found at Wed Nov 28 11:08:25 EST 2012
ssl.sh: #5137: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2483 >/dev/null 2>/dev/null
selfserv with PID 2483 found at Wed Nov 28 11:08:25 EST 2012
ssl.sh: #5138: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2483 >/dev/null 2>/dev/null
selfserv with PID 2483 found at Wed Nov 28 11:08:26 EST 2012
ssl.sh: #5139: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2483 >/dev/null 2>/dev/null
selfserv with PID 2483 found at Wed Nov 28 11:08:26 EST 2012
ssl.sh: #5140: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2483 >/dev/null 2>/dev/null
selfserv with PID 2483 found at Wed Nov 28 11:08:26 EST 2012
ssl.sh: #5141: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2483 >/dev/null 2>/dev/null
selfserv with PID 2483 found at Wed Nov 28 11:08:26 EST 2012
ssl.sh: #5142: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2483 >/dev/null 2>/dev/null
selfserv with PID 2483 found at Wed Nov 28 11:08:26 EST 2012
ssl.sh: #5143: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2483 >/dev/null 2>/dev/null
selfserv with PID 2483 found at Wed Nov 28 11:08:26 EST 2012
ssl.sh: #5144: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2483 >/dev/null 2>/dev/null
selfserv with PID 2483 found at Wed Nov 28 11:08:26 EST 2012
ssl.sh: #5145: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2483 >/dev/null 2>/dev/null
selfserv with PID 2483 found at Wed Nov 28 11:08:26 EST 2012
ssl.sh: #5146: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/server/root.crl_43-48

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 156 bytes
tstclnt: Writing 156 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2483 >/dev/null 2>/dev/null
selfserv with PID 2483 found at Wed Nov 28 11:08:26 EST 2012
================= CRL Reloaded =============
ssl.sh: #5147: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2483 >/dev/null 2>/dev/null
selfserv with PID 2483 found at Wed Nov 28 11:08:26 EST 2012
ssl.sh: #5148: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2483 >/dev/null 2>/dev/null
selfserv with PID 2483 found at Wed Nov 28 11:08:26 EST 2012
ssl.sh: #5149: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2483 >/dev/null 2>/dev/null
selfserv with PID 2483 found at Wed Nov 28 11:08:26 EST 2012
ssl.sh: #5150: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2483 >/dev/null 2>/dev/null
selfserv with PID 2483 found at Wed Nov 28 11:08:26 EST 2012
ssl.sh: #5151: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2483 >/dev/null 2>/dev/null
selfserv with PID 2483 found at Wed Nov 28 11:08:27 EST 2012
ssl.sh: #5152: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2483 >/dev/null 2>/dev/null
selfserv with PID 2483 found at Wed Nov 28 11:08:27 EST 2012
ssl.sh: #5153: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2483 >/dev/null 2>/dev/null
selfserv with PID 2483 found at Wed Nov 28 11:08:27 EST 2012
ssl.sh: #5154: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2483 >/dev/null 2>/dev/null
selfserv with PID 2483 found at Wed Nov 28 11:08:27 EST 2012
ssl.sh: #5155: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2483 >/dev/null 2>/dev/null
selfserv with PID 2483 found at Wed Nov 28 11:08:27 EST 2012
ssl.sh: #5156: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2483 >/dev/null 2>/dev/null
selfserv with PID 2483 found at Wed Nov 28 11:08:27 EST 2012
ssl.sh: #5157: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2483 >/dev/null 2>/dev/null
selfserv with PID 2483 found at Wed Nov 28 11:08:27 EST 2012
ssl.sh: #5158: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2483 >/dev/null 2>/dev/null
selfserv with PID 2483 found at Wed Nov 28 11:08:27 EST 2012
ssl.sh: #5159: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2483 >/dev/null 2>/dev/null
selfserv with PID 2483 found at Wed Nov 28 11:08:27 EST 2012
ssl.sh: #5160: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/server/root.crl_49-52

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 156 bytes
tstclnt: Writing 156 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2483 >/dev/null 2>/dev/null
selfserv with PID 2483 found at Wed Nov 28 11:08:27 EST 2012
================= CRL Reloaded =============
ssl.sh: #5161: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2483 >/dev/null 2>/dev/null
selfserv with PID 2483 found at Wed Nov 28 11:08:27 EST 2012
ssl.sh: #5162: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2483 >/dev/null 2>/dev/null
selfserv with PID 2483 found at Wed Nov 28 11:08:27 EST 2012
ssl.sh: #5163: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2483 >/dev/null 2>/dev/null
selfserv with PID 2483 found at Wed Nov 28 11:08:28 EST 2012
ssl.sh: #5164: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2483 >/dev/null 2>/dev/null
selfserv with PID 2483 found at Wed Nov 28 11:08:28 EST 2012
ssl.sh: #5165: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2483 >/dev/null 2>/dev/null
selfserv with PID 2483 found at Wed Nov 28 11:08:28 EST 2012
ssl.sh: #5166: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2483 >/dev/null 2>/dev/null
selfserv with PID 2483 found at Wed Nov 28 11:08:28 EST 2012
ssl.sh: #5167: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2483 >/dev/null 2>/dev/null
selfserv with PID 2483 found at Wed Nov 28 11:08:28 EST 2012
ssl.sh: #5168: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2483 >/dev/null 2>/dev/null
selfserv with PID 2483 found at Wed Nov 28 11:08:28 EST 2012
ssl.sh: #5169: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2483 >/dev/null 2>/dev/null
selfserv with PID 2483 found at Wed Nov 28 11:08:28 EST 2012
ssl.sh: #5170: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2483 >/dev/null 2>/dev/null
selfserv with PID 2483 found at Wed Nov 28 11:08:28 EST 2012
ssl.sh: #5171: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2483 >/dev/null 2>/dev/null
selfserv with PID 2483 found at Wed Nov 28 11:08:28 EST 2012
ssl.sh: #5172: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2483 >/dev/null 2>/dev/null
selfserv with PID 2483 found at Wed Nov 28 11:08:28 EST 2012
ssl.sh: #5173: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2483 >/dev/null 2>/dev/null
selfserv with PID 2483 found at Wed Nov 28 11:08:28 EST 2012
ssl.sh: #5174: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2483 at Wed Nov 28 11:08:28 EST 2012
kill -USR1 2483
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 2483 killed at Wed Nov 28 11:08:28 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:08:28 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:08:28 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 3906 >/dev/null 2>/dev/null
selfserv with PID 3906 found at Wed Nov 28 11:08:28 EST 2012
selfserv with PID 3906 started at Wed Nov 28 11:08:28 EST 2012
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3906 >/dev/null 2>/dev/null
selfserv with PID 3906 found at Wed Nov 28 11:08:29 EST 2012
ssl.sh: #5175: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3906 >/dev/null 2>/dev/null
selfserv with PID 3906 found at Wed Nov 28 11:08:29 EST 2012
ssl.sh: #5176: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3906 >/dev/null 2>/dev/null
selfserv with PID 3906 found at Wed Nov 28 11:08:29 EST 2012
ssl.sh: #5177: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3906 >/dev/null 2>/dev/null
selfserv with PID 3906 found at Wed Nov 28 11:08:29 EST 2012
ssl.sh: #5178: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3906 >/dev/null 2>/dev/null
selfserv with PID 3906 found at Wed Nov 28 11:08:29 EST 2012
ssl.sh: #5179: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3906 >/dev/null 2>/dev/null
selfserv with PID 3906 found at Wed Nov 28 11:08:29 EST 2012
ssl.sh: #5180: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3906 >/dev/null 2>/dev/null
selfserv with PID 3906 found at Wed Nov 28 11:08:29 EST 2012
ssl.sh: #5181: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3906 >/dev/null 2>/dev/null
selfserv with PID 3906 found at Wed Nov 28 11:08:29 EST 2012
ssl.sh: #5182: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3906 >/dev/null 2>/dev/null
selfserv with PID 3906 found at Wed Nov 28 11:08:29 EST 2012
ssl.sh: #5183: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3906 >/dev/null 2>/dev/null
selfserv with PID 3906 found at Wed Nov 28 11:08:29 EST 2012
ssl.sh: #5184: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3906 >/dev/null 2>/dev/null
selfserv with PID 3906 found at Wed Nov 28 11:08:29 EST 2012
ssl.sh: #5185: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3906 >/dev/null 2>/dev/null
selfserv with PID 3906 found at Wed Nov 28 11:08:29 EST 2012
ssl.sh: #5186: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3906 >/dev/null 2>/dev/null
selfserv with PID 3906 found at Wed Nov 28 11:08:30 EST 2012
ssl.sh: #5187: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/server/root.crl_43-48

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 156 bytes
tstclnt: Writing 156 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3906 >/dev/null 2>/dev/null
selfserv with PID 3906 found at Wed Nov 28 11:08:30 EST 2012
================= CRL Reloaded =============
ssl.sh: #5188: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3906 >/dev/null 2>/dev/null
selfserv with PID 3906 found at Wed Nov 28 11:08:30 EST 2012
ssl.sh: #5189: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3906 >/dev/null 2>/dev/null
selfserv with PID 3906 found at Wed Nov 28 11:08:30 EST 2012
ssl.sh: #5190: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3906 >/dev/null 2>/dev/null
selfserv with PID 3906 found at Wed Nov 28 11:08:30 EST 2012
ssl.sh: #5191: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3906 >/dev/null 2>/dev/null
selfserv with PID 3906 found at Wed Nov 28 11:08:30 EST 2012
ssl.sh: #5192: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3906 >/dev/null 2>/dev/null
selfserv with PID 3906 found at Wed Nov 28 11:08:30 EST 2012
ssl.sh: #5193: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3906 >/dev/null 2>/dev/null
selfserv with PID 3906 found at Wed Nov 28 11:08:30 EST 2012
ssl.sh: #5194: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3906 >/dev/null 2>/dev/null
selfserv with PID 3906 found at Wed Nov 28 11:08:30 EST 2012
ssl.sh: #5195: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3906 >/dev/null 2>/dev/null
selfserv with PID 3906 found at Wed Nov 28 11:08:30 EST 2012
ssl.sh: #5196: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3906 >/dev/null 2>/dev/null
selfserv with PID 3906 found at Wed Nov 28 11:08:30 EST 2012
ssl.sh: #5197: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3906 >/dev/null 2>/dev/null
selfserv with PID 3906 found at Wed Nov 28 11:08:30 EST 2012
ssl.sh: #5198: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3906 >/dev/null 2>/dev/null
selfserv with PID 3906 found at Wed Nov 28 11:08:30 EST 2012
ssl.sh: #5199: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3906 >/dev/null 2>/dev/null
selfserv with PID 3906 found at Wed Nov 28 11:08:31 EST 2012
ssl.sh: #5200: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3906 >/dev/null 2>/dev/null
selfserv with PID 3906 found at Wed Nov 28 11:08:31 EST 2012
ssl.sh: #5201: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/server/root.crl_49-52

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 156 bytes
tstclnt: Writing 156 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3906 >/dev/null 2>/dev/null
selfserv with PID 3906 found at Wed Nov 28 11:08:31 EST 2012
================= CRL Reloaded =============
ssl.sh: #5202: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3906 >/dev/null 2>/dev/null
selfserv with PID 3906 found at Wed Nov 28 11:08:31 EST 2012
ssl.sh: #5203: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3906 >/dev/null 2>/dev/null
selfserv with PID 3906 found at Wed Nov 28 11:08:31 EST 2012
ssl.sh: #5204: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3906 >/dev/null 2>/dev/null
selfserv with PID 3906 found at Wed Nov 28 11:08:31 EST 2012
ssl.sh: #5205: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3906 >/dev/null 2>/dev/null
selfserv with PID 3906 found at Wed Nov 28 11:08:31 EST 2012
ssl.sh: #5206: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3906 >/dev/null 2>/dev/null
selfserv with PID 3906 found at Wed Nov 28 11:08:31 EST 2012
ssl.sh: #5207: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3906 >/dev/null 2>/dev/null
selfserv with PID 3906 found at Wed Nov 28 11:08:31 EST 2012
ssl.sh: #5208: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3906 >/dev/null 2>/dev/null
selfserv with PID 3906 found at Wed Nov 28 11:08:31 EST 2012
ssl.sh: #5209: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3906 >/dev/null 2>/dev/null
selfserv with PID 3906 found at Wed Nov 28 11:08:31 EST 2012
ssl.sh: #5210: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3906 >/dev/null 2>/dev/null
selfserv with PID 3906 found at Wed Nov 28 11:08:31 EST 2012
ssl.sh: #5211: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3906 >/dev/null 2>/dev/null
selfserv with PID 3906 found at Wed Nov 28 11:08:31 EST 2012
ssl.sh: #5212: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3906 >/dev/null 2>/dev/null
selfserv with PID 3906 found at Wed Nov 28 11:08:32 EST 2012
ssl.sh: #5213: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3906 >/dev/null 2>/dev/null
selfserv with PID 3906 found at Wed Nov 28 11:08:32 EST 2012
ssl.sh: #5214: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3906 >/dev/null 2>/dev/null
selfserv with PID 3906 found at Wed Nov 28 11:08:32 EST 2012
ssl.sh: #5215: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3906 at Wed Nov 28 11:08:32 EST 2012
kill -USR1 3906
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 3906 killed at Wed Nov 28 11:08:32 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:08:32 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:08:32 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 5327 >/dev/null 2>/dev/null
selfserv with PID 5327 found at Wed Nov 28 11:08:32 EST 2012
selfserv with PID 5327 started at Wed Nov 28 11:08:32 EST 2012
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5327 >/dev/null 2>/dev/null
selfserv with PID 5327 found at Wed Nov 28 11:08:32 EST 2012
ssl.sh: #5216: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5327 >/dev/null 2>/dev/null
selfserv with PID 5327 found at Wed Nov 28 11:08:32 EST 2012
ssl.sh: #5217: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5327 >/dev/null 2>/dev/null
selfserv with PID 5327 found at Wed Nov 28 11:08:32 EST 2012
ssl.sh: #5218: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5327 >/dev/null 2>/dev/null
selfserv with PID 5327 found at Wed Nov 28 11:08:32 EST 2012
ssl.sh: #5219: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5327 >/dev/null 2>/dev/null
selfserv with PID 5327 found at Wed Nov 28 11:08:32 EST 2012
ssl.sh: #5220: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5327 >/dev/null 2>/dev/null
selfserv with PID 5327 found at Wed Nov 28 11:08:32 EST 2012
ssl.sh: #5221: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5327 >/dev/null 2>/dev/null
selfserv with PID 5327 found at Wed Nov 28 11:08:33 EST 2012
ssl.sh: #5222: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5327 >/dev/null 2>/dev/null
selfserv with PID 5327 found at Wed Nov 28 11:08:33 EST 2012
ssl.sh: #5223: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5327 >/dev/null 2>/dev/null
selfserv with PID 5327 found at Wed Nov 28 11:08:33 EST 2012
ssl.sh: #5224: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5327 >/dev/null 2>/dev/null
selfserv with PID 5327 found at Wed Nov 28 11:08:33 EST 2012
ssl.sh: #5225: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5327 >/dev/null 2>/dev/null
selfserv with PID 5327 found at Wed Nov 28 11:08:33 EST 2012
ssl.sh: #5226: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5327 >/dev/null 2>/dev/null
selfserv with PID 5327 found at Wed Nov 28 11:08:33 EST 2012
ssl.sh: #5227: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5327 >/dev/null 2>/dev/null
selfserv with PID 5327 found at Wed Nov 28 11:08:33 EST 2012
ssl.sh: #5228: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/server/root.crl_43-48-ec

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 159 bytes
tstclnt: Writing 159 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5327 >/dev/null 2>/dev/null
selfserv with PID 5327 found at Wed Nov 28 11:08:33 EST 2012
================= CRL Reloaded =============
ssl.sh: #5229: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5327 >/dev/null 2>/dev/null
selfserv with PID 5327 found at Wed Nov 28 11:08:33 EST 2012
ssl.sh: #5230: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5327 >/dev/null 2>/dev/null
selfserv with PID 5327 found at Wed Nov 28 11:08:34 EST 2012
ssl.sh: #5231: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5327 >/dev/null 2>/dev/null
selfserv with PID 5327 found at Wed Nov 28 11:08:34 EST 2012
ssl.sh: #5232: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5327 >/dev/null 2>/dev/null
selfserv with PID 5327 found at Wed Nov 28 11:08:34 EST 2012
ssl.sh: #5233: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5327 >/dev/null 2>/dev/null
selfserv with PID 5327 found at Wed Nov 28 11:08:34 EST 2012
ssl.sh: #5234: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5327 >/dev/null 2>/dev/null
selfserv with PID 5327 found at Wed Nov 28 11:08:34 EST 2012
ssl.sh: #5235: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5327 >/dev/null 2>/dev/null
selfserv with PID 5327 found at Wed Nov 28 11:08:34 EST 2012
ssl.sh: #5236: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5327 >/dev/null 2>/dev/null
selfserv with PID 5327 found at Wed Nov 28 11:08:34 EST 2012
ssl.sh: #5237: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5327 >/dev/null 2>/dev/null
selfserv with PID 5327 found at Wed Nov 28 11:08:34 EST 2012
ssl.sh: #5238: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5327 >/dev/null 2>/dev/null
selfserv with PID 5327 found at Wed Nov 28 11:08:34 EST 2012
ssl.sh: #5239: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5327 >/dev/null 2>/dev/null
selfserv with PID 5327 found at Wed Nov 28 11:08:34 EST 2012
ssl.sh: #5240: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5327 >/dev/null 2>/dev/null
selfserv with PID 5327 found at Wed Nov 28 11:08:35 EST 2012
ssl.sh: #5241: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5327 >/dev/null 2>/dev/null
selfserv with PID 5327 found at Wed Nov 28 11:08:35 EST 2012
ssl.sh: #5242: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/server/root.crl_49-52-ec

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 159 bytes
tstclnt: Writing 159 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5327 >/dev/null 2>/dev/null
selfserv with PID 5327 found at Wed Nov 28 11:08:35 EST 2012
================= CRL Reloaded =============
ssl.sh: #5243: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5327 >/dev/null 2>/dev/null
selfserv with PID 5327 found at Wed Nov 28 11:08:35 EST 2012
ssl.sh: #5244: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5327 >/dev/null 2>/dev/null
selfserv with PID 5327 found at Wed Nov 28 11:08:35 EST 2012
ssl.sh: #5245: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5327 >/dev/null 2>/dev/null
selfserv with PID 5327 found at Wed Nov 28 11:08:35 EST 2012
ssl.sh: #5246: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5327 >/dev/null 2>/dev/null
selfserv with PID 5327 found at Wed Nov 28 11:08:35 EST 2012
ssl.sh: #5247: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5327 >/dev/null 2>/dev/null
selfserv with PID 5327 found at Wed Nov 28 11:08:35 EST 2012
ssl.sh: #5248: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5327 >/dev/null 2>/dev/null
selfserv with PID 5327 found at Wed Nov 28 11:08:35 EST 2012
ssl.sh: #5249: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5327 >/dev/null 2>/dev/null
selfserv with PID 5327 found at Wed Nov 28 11:08:36 EST 2012
ssl.sh: #5250: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5327 >/dev/null 2>/dev/null
selfserv with PID 5327 found at Wed Nov 28 11:08:36 EST 2012
ssl.sh: #5251: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5327 >/dev/null 2>/dev/null
selfserv with PID 5327 found at Wed Nov 28 11:08:36 EST 2012
ssl.sh: #5252: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5327 >/dev/null 2>/dev/null
selfserv with PID 5327 found at Wed Nov 28 11:08:36 EST 2012
ssl.sh: #5253: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5327 >/dev/null 2>/dev/null
selfserv with PID 5327 found at Wed Nov 28 11:08:36 EST 2012
ssl.sh: #5254: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5327 >/dev/null 2>/dev/null
selfserv with PID 5327 found at Wed Nov 28 11:08:36 EST 2012
ssl.sh: #5255: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5327 >/dev/null 2>/dev/null
selfserv with PID 5327 found at Wed Nov 28 11:08:36 EST 2012
ssl.sh: #5256: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 5327 at Wed Nov 28 11:08:36 EST 2012
kill -USR1 5327
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 5327 killed at Wed Nov 28 11:08:36 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:08:36 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:08:36 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 6748 >/dev/null 2>/dev/null
selfserv with PID 6748 found at Wed Nov 28 11:08:36 EST 2012
selfserv with PID 6748 started at Wed Nov 28 11:08:36 EST 2012
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6748 >/dev/null 2>/dev/null
selfserv with PID 6748 found at Wed Nov 28 11:08:36 EST 2012
ssl.sh: #5257: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6748 >/dev/null 2>/dev/null
selfserv with PID 6748 found at Wed Nov 28 11:08:37 EST 2012
ssl.sh: #5258: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6748 >/dev/null 2>/dev/null
selfserv with PID 6748 found at Wed Nov 28 11:08:37 EST 2012
ssl.sh: #5259: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6748 >/dev/null 2>/dev/null
selfserv with PID 6748 found at Wed Nov 28 11:08:37 EST 2012
ssl.sh: #5260: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6748 >/dev/null 2>/dev/null
selfserv with PID 6748 found at Wed Nov 28 11:08:37 EST 2012
ssl.sh: #5261: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6748 >/dev/null 2>/dev/null
selfserv with PID 6748 found at Wed Nov 28 11:08:37 EST 2012
ssl.sh: #5262: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6748 >/dev/null 2>/dev/null
selfserv with PID 6748 found at Wed Nov 28 11:08:37 EST 2012
ssl.sh: #5263: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6748 >/dev/null 2>/dev/null
selfserv with PID 6748 found at Wed Nov 28 11:08:37 EST 2012
ssl.sh: #5264: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6748 >/dev/null 2>/dev/null
selfserv with PID 6748 found at Wed Nov 28 11:08:37 EST 2012
ssl.sh: #5265: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6748 >/dev/null 2>/dev/null
selfserv with PID 6748 found at Wed Nov 28 11:08:37 EST 2012
ssl.sh: #5266: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6748 >/dev/null 2>/dev/null
selfserv with PID 6748 found at Wed Nov 28 11:08:37 EST 2012
ssl.sh: #5267: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6748 >/dev/null 2>/dev/null
selfserv with PID 6748 found at Wed Nov 28 11:08:38 EST 2012
ssl.sh: #5268: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6748 >/dev/null 2>/dev/null
selfserv with PID 6748 found at Wed Nov 28 11:08:38 EST 2012
ssl.sh: #5269: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/server/root.crl_43-48-ec

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 159 bytes
tstclnt: Writing 159 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6748 >/dev/null 2>/dev/null
selfserv with PID 6748 found at Wed Nov 28 11:08:38 EST 2012
================= CRL Reloaded =============
ssl.sh: #5270: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6748 >/dev/null 2>/dev/null
selfserv with PID 6748 found at Wed Nov 28 11:08:38 EST 2012
ssl.sh: #5271: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6748 >/dev/null 2>/dev/null
selfserv with PID 6748 found at Wed Nov 28 11:08:38 EST 2012
ssl.sh: #5272: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6748 >/dev/null 2>/dev/null
selfserv with PID 6748 found at Wed Nov 28 11:08:38 EST 2012
ssl.sh: #5273: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6748 >/dev/null 2>/dev/null
selfserv with PID 6748 found at Wed Nov 28 11:08:38 EST 2012
ssl.sh: #5274: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6748 >/dev/null 2>/dev/null
selfserv with PID 6748 found at Wed Nov 28 11:08:38 EST 2012
ssl.sh: #5275: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6748 >/dev/null 2>/dev/null
selfserv with PID 6748 found at Wed Nov 28 11:08:38 EST 2012
ssl.sh: #5276: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6748 >/dev/null 2>/dev/null
selfserv with PID 6748 found at Wed Nov 28 11:08:39 EST 2012
ssl.sh: #5277: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6748 >/dev/null 2>/dev/null
selfserv with PID 6748 found at Wed Nov 28 11:08:39 EST 2012
ssl.sh: #5278: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6748 >/dev/null 2>/dev/null
selfserv with PID 6748 found at Wed Nov 28 11:08:39 EST 2012
ssl.sh: #5279: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6748 >/dev/null 2>/dev/null
selfserv with PID 6748 found at Wed Nov 28 11:08:39 EST 2012
ssl.sh: #5280: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6748 >/dev/null 2>/dev/null
selfserv with PID 6748 found at Wed Nov 28 11:08:39 EST 2012
ssl.sh: #5281: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6748 >/dev/null 2>/dev/null
selfserv with PID 6748 found at Wed Nov 28 11:08:39 EST 2012
ssl.sh: #5282: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6748 >/dev/null 2>/dev/null
selfserv with PID 6748 found at Wed Nov 28 11:08:39 EST 2012
ssl.sh: #5283: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/server/root.crl_49-52-ec

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 159 bytes
tstclnt: Writing 159 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6748 >/dev/null 2>/dev/null
selfserv with PID 6748 found at Wed Nov 28 11:08:39 EST 2012
================= CRL Reloaded =============
ssl.sh: #5284: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6748 >/dev/null 2>/dev/null
selfserv with PID 6748 found at Wed Nov 28 11:08:39 EST 2012
ssl.sh: #5285: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6748 >/dev/null 2>/dev/null
selfserv with PID 6748 found at Wed Nov 28 11:08:39 EST 2012
ssl.sh: #5286: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6748 >/dev/null 2>/dev/null
selfserv with PID 6748 found at Wed Nov 28 11:08:40 EST 2012
ssl.sh: #5287: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6748 >/dev/null 2>/dev/null
selfserv with PID 6748 found at Wed Nov 28 11:08:40 EST 2012
ssl.sh: #5288: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6748 >/dev/null 2>/dev/null
selfserv with PID 6748 found at Wed Nov 28 11:08:40 EST 2012
ssl.sh: #5289: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6748 >/dev/null 2>/dev/null
selfserv with PID 6748 found at Wed Nov 28 11:08:40 EST 2012
ssl.sh: #5290: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6748 >/dev/null 2>/dev/null
selfserv with PID 6748 found at Wed Nov 28 11:08:40 EST 2012
ssl.sh: #5291: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6748 >/dev/null 2>/dev/null
selfserv with PID 6748 found at Wed Nov 28 11:08:40 EST 2012
ssl.sh: #5292: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6748 >/dev/null 2>/dev/null
selfserv with PID 6748 found at Wed Nov 28 11:08:40 EST 2012
ssl.sh: #5293: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6748 >/dev/null 2>/dev/null
selfserv with PID 6748 found at Wed Nov 28 11:08:40 EST 2012
ssl.sh: #5294: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6748 >/dev/null 2>/dev/null
selfserv with PID 6748 found at Wed Nov 28 11:08:40 EST 2012
ssl.sh: #5295: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6748 >/dev/null 2>/dev/null
selfserv with PID 6748 found at Wed Nov 28 11:08:40 EST 2012
ssl.sh: #5296: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6748 >/dev/null 2>/dev/null
selfserv with PID 6748 found at Wed Nov 28 11:08:41 EST 2012
ssl.sh: #5297: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 6748 at Wed Nov 28 11:08:41 EST 2012
kill -USR1 6748
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 6748 killed at Wed Nov 28 11:08:41 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:08:41 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:08:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 8168 >/dev/null 2>/dev/null
selfserv with PID 8168 found at Wed Nov 28 11:08:41 EST 2012
selfserv with PID 8168 started at Wed Nov 28 11:08:41 EST 2012
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8168 >/dev/null 2>/dev/null
selfserv with PID 8168 found at Wed Nov 28 11:08:41 EST 2012
ssl.sh: #5298: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8168 >/dev/null 2>/dev/null
selfserv with PID 8168 found at Wed Nov 28 11:08:41 EST 2012
ssl.sh: #5299: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8168 >/dev/null 2>/dev/null
selfserv with PID 8168 found at Wed Nov 28 11:08:41 EST 2012
ssl.sh: #5300: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8168 >/dev/null 2>/dev/null
selfserv with PID 8168 found at Wed Nov 28 11:08:41 EST 2012
ssl.sh: #5301: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8168 >/dev/null 2>/dev/null
selfserv with PID 8168 found at Wed Nov 28 11:08:41 EST 2012
ssl.sh: #5302: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8168 >/dev/null 2>/dev/null
selfserv with PID 8168 found at Wed Nov 28 11:08:41 EST 2012
ssl.sh: #5303: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8168 >/dev/null 2>/dev/null
selfserv with PID 8168 found at Wed Nov 28 11:08:41 EST 2012
ssl.sh: #5304: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8168 >/dev/null 2>/dev/null
selfserv with PID 8168 found at Wed Nov 28 11:08:41 EST 2012
ssl.sh: #5305: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8168 >/dev/null 2>/dev/null
selfserv with PID 8168 found at Wed Nov 28 11:08:42 EST 2012
ssl.sh: #5306: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8168 >/dev/null 2>/dev/null
selfserv with PID 8168 found at Wed Nov 28 11:08:42 EST 2012
ssl.sh: #5307: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8168 >/dev/null 2>/dev/null
selfserv with PID 8168 found at Wed Nov 28 11:08:42 EST 2012
ssl.sh: #5308: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8168 >/dev/null 2>/dev/null
selfserv with PID 8168 found at Wed Nov 28 11:08:42 EST 2012
ssl.sh: #5309: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8168 >/dev/null 2>/dev/null
selfserv with PID 8168 found at Wed Nov 28 11:08:42 EST 2012
ssl.sh: #5310: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/server/root.crl_43-48-ec

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 159 bytes
tstclnt: Writing 159 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8168 >/dev/null 2>/dev/null
selfserv with PID 8168 found at Wed Nov 28 11:08:42 EST 2012
================= CRL Reloaded =============
ssl.sh: #5311: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8168 >/dev/null 2>/dev/null
selfserv with PID 8168 found at Wed Nov 28 11:08:42 EST 2012
ssl.sh: #5312: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8168 >/dev/null 2>/dev/null
selfserv with PID 8168 found at Wed Nov 28 11:08:42 EST 2012
ssl.sh: #5313: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8168 >/dev/null 2>/dev/null
selfserv with PID 8168 found at Wed Nov 28 11:08:42 EST 2012
ssl.sh: #5314: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8168 >/dev/null 2>/dev/null
selfserv with PID 8168 found at Wed Nov 28 11:08:43 EST 2012
ssl.sh: #5315: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8168 >/dev/null 2>/dev/null
selfserv with PID 8168 found at Wed Nov 28 11:08:43 EST 2012
ssl.sh: #5316: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8168 >/dev/null 2>/dev/null
selfserv with PID 8168 found at Wed Nov 28 11:08:43 EST 2012
ssl.sh: #5317: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8168 >/dev/null 2>/dev/null
selfserv with PID 8168 found at Wed Nov 28 11:08:43 EST 2012
ssl.sh: #5318: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8168 >/dev/null 2>/dev/null
selfserv with PID 8168 found at Wed Nov 28 11:08:43 EST 2012
ssl.sh: #5319: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8168 >/dev/null 2>/dev/null
selfserv with PID 8168 found at Wed Nov 28 11:08:43 EST 2012
ssl.sh: #5320: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8168 >/dev/null 2>/dev/null
selfserv with PID 8168 found at Wed Nov 28 11:08:43 EST 2012
ssl.sh: #5321: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8168 >/dev/null 2>/dev/null
selfserv with PID 8168 found at Wed Nov 28 11:08:43 EST 2012
ssl.sh: #5322: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8168 >/dev/null 2>/dev/null
selfserv with PID 8168 found at Wed Nov 28 11:08:43 EST 2012
ssl.sh: #5323: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8168 >/dev/null 2>/dev/null
selfserv with PID 8168 found at Wed Nov 28 11:08:43 EST 2012
ssl.sh: #5324: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/server/root.crl_49-52-ec

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 159 bytes
tstclnt: Writing 159 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8168 >/dev/null 2>/dev/null
selfserv with PID 8168 found at Wed Nov 28 11:08:44 EST 2012
================= CRL Reloaded =============
ssl.sh: #5325: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8168 >/dev/null 2>/dev/null
selfserv with PID 8168 found at Wed Nov 28 11:08:44 EST 2012
ssl.sh: #5326: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8168 >/dev/null 2>/dev/null
selfserv with PID 8168 found at Wed Nov 28 11:08:44 EST 2012
ssl.sh: #5327: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8168 >/dev/null 2>/dev/null
selfserv with PID 8168 found at Wed Nov 28 11:08:44 EST 2012
ssl.sh: #5328: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8168 >/dev/null 2>/dev/null
selfserv with PID 8168 found at Wed Nov 28 11:08:44 EST 2012
ssl.sh: #5329: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8168 >/dev/null 2>/dev/null
selfserv with PID 8168 found at Wed Nov 28 11:08:44 EST 2012
ssl.sh: #5330: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8168 >/dev/null 2>/dev/null
selfserv with PID 8168 found at Wed Nov 28 11:08:44 EST 2012
ssl.sh: #5331: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8168 >/dev/null 2>/dev/null
selfserv with PID 8168 found at Wed Nov 28 11:08:44 EST 2012
ssl.sh: #5332: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8168 >/dev/null 2>/dev/null
selfserv with PID 8168 found at Wed Nov 28 11:08:44 EST 2012
ssl.sh: #5333: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8168 >/dev/null 2>/dev/null
selfserv with PID 8168 found at Wed Nov 28 11:08:44 EST 2012
ssl.sh: #5334: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8168 >/dev/null 2>/dev/null
selfserv with PID 8168 found at Wed Nov 28 11:08:44 EST 2012
ssl.sh: #5335: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8168 >/dev/null 2>/dev/null
selfserv with PID 8168 found at Wed Nov 28 11:08:45 EST 2012
ssl.sh: #5336: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8168 >/dev/null 2>/dev/null
selfserv with PID 8168 found at Wed Nov 28 11:08:45 EST 2012
ssl.sh: #5337: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8168 >/dev/null 2>/dev/null
selfserv with PID 8168 found at Wed Nov 28 11:08:45 EST 2012
ssl.sh: #5338: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 8168 at Wed Nov 28 11:08:45 EST 2012
kill -USR1 8168
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 8168 killed at Wed Nov 28 11:08:45 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:08:45 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:08:45 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 9590 >/dev/null 2>/dev/null
selfserv with PID 9590 found at Wed Nov 28 11:08:45 EST 2012
selfserv with PID 9590 started at Wed Nov 28 11:08:45 EST 2012
trying to kill selfserv with PID 9590 at Wed Nov 28 11:08:45 EST 2012
kill -USR1 9590
./ssl.sh: line 173:  9590 User defined signal 1   ${PROFTOOL} ${BINDIR}/selfserv -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 9590 killed at Wed Nov 28 11:08:45 EST 2012
selfserv starting at Wed Nov 28 11:08:45 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:08:45 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 9632 >/dev/null 2>/dev/null
selfserv with PID 9632 found at Wed Nov 28 11:08:45 EST 2012
selfserv with PID 9632 started at Wed Nov 28 11:08:45 EST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9632 >/dev/null 2>/dev/null
selfserv with PID 9632 found at Wed Nov 28 11:08:45 EST 2012
ssl.sh: #5339: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9632 >/dev/null 2>/dev/null
selfserv with PID 9632 found at Wed Nov 28 11:08:45 EST 2012
ssl.sh: #5340: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9632 >/dev/null 2>/dev/null
selfserv with PID 9632 found at Wed Nov 28 11:08:45 EST 2012
ssl.sh: #5341: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9632 >/dev/null 2>/dev/null
selfserv with PID 9632 found at Wed Nov 28 11:08:45 EST 2012
ssl.sh: #5342: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9632 >/dev/null 2>/dev/null
selfserv with PID 9632 found at Wed Nov 28 11:08:45 EST 2012
ssl.sh: #5343: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9632 >/dev/null 2>/dev/null
selfserv with PID 9632 found at Wed Nov 28 11:08:45 EST 2012
ssl.sh: #5344: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9632 >/dev/null 2>/dev/null
selfserv with PID 9632 found at Wed Nov 28 11:08:45 EST 2012
ssl.sh: #5345: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9632 >/dev/null 2>/dev/null
selfserv with PID 9632 found at Wed Nov 28 11:08:46 EST 2012
ssl.sh: #5346: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9632 >/dev/null 2>/dev/null
selfserv with PID 9632 found at Wed Nov 28 11:08:46 EST 2012
ssl.sh: #5347: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9632 >/dev/null 2>/dev/null
selfserv with PID 9632 found at Wed Nov 28 11:08:46 EST 2012
ssl.sh: #5348: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9632 >/dev/null 2>/dev/null
selfserv with PID 9632 found at Wed Nov 28 11:08:46 EST 2012
ssl.sh: #5349: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9632 >/dev/null 2>/dev/null
selfserv with PID 9632 found at Wed Nov 28 11:08:46 EST 2012
ssl.sh: #5350: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9632 >/dev/null 2>/dev/null
selfserv with PID 9632 found at Wed Nov 28 11:08:46 EST 2012
ssl.sh: #5351: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/server/root.crl_43-48

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 156 bytes
tstclnt: Writing 156 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9632 >/dev/null 2>/dev/null
selfserv with PID 9632 found at Wed Nov 28 11:08:46 EST 2012
================= CRL Reloaded =============
ssl.sh: #5352: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9632 >/dev/null 2>/dev/null
selfserv with PID 9632 found at Wed Nov 28 11:08:46 EST 2012
ssl.sh: #5353: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9632 >/dev/null 2>/dev/null
selfserv with PID 9632 found at Wed Nov 28 11:08:46 EST 2012
ssl.sh: #5354: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9632 >/dev/null 2>/dev/null
selfserv with PID 9632 found at Wed Nov 28 11:08:46 EST 2012
ssl.sh: #5355: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9632 >/dev/null 2>/dev/null
selfserv with PID 9632 found at Wed Nov 28 11:08:46 EST 2012
ssl.sh: #5356: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9632 >/dev/null 2>/dev/null
selfserv with PID 9632 found at Wed Nov 28 11:08:46 EST 2012
ssl.sh: #5357: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9632 >/dev/null 2>/dev/null
selfserv with PID 9632 found at Wed Nov 28 11:08:46 EST 2012
ssl.sh: #5358: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9632 >/dev/null 2>/dev/null
selfserv with PID 9632 found at Wed Nov 28 11:08:47 EST 2012
ssl.sh: #5359: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9632 >/dev/null 2>/dev/null
selfserv with PID 9632 found at Wed Nov 28 11:08:47 EST 2012
ssl.sh: #5360: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9632 >/dev/null 2>/dev/null
selfserv with PID 9632 found at Wed Nov 28 11:08:47 EST 2012
ssl.sh: #5361: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9632 >/dev/null 2>/dev/null
selfserv with PID 9632 found at Wed Nov 28 11:08:47 EST 2012
ssl.sh: #5362: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9632 >/dev/null 2>/dev/null
selfserv with PID 9632 found at Wed Nov 28 11:08:47 EST 2012
ssl.sh: #5363: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9632 >/dev/null 2>/dev/null
selfserv with PID 9632 found at Wed Nov 28 11:08:47 EST 2012
ssl.sh: #5364: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9632 >/dev/null 2>/dev/null
selfserv with PID 9632 found at Wed Nov 28 11:08:47 EST 2012
ssl.sh: #5365: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/server/root.crl_49-52

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 156 bytes
tstclnt: Writing 156 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9632 >/dev/null 2>/dev/null
selfserv with PID 9632 found at Wed Nov 28 11:08:47 EST 2012
================= CRL Reloaded =============
ssl.sh: #5366: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9632 >/dev/null 2>/dev/null
selfserv with PID 9632 found at Wed Nov 28 11:08:47 EST 2012
ssl.sh: #5367: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9632 >/dev/null 2>/dev/null
selfserv with PID 9632 found at Wed Nov 28 11:08:47 EST 2012
ssl.sh: #5368: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9632 >/dev/null 2>/dev/null
selfserv with PID 9632 found at Wed Nov 28 11:08:47 EST 2012
ssl.sh: #5369: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9632 >/dev/null 2>/dev/null
selfserv with PID 9632 found at Wed Nov 28 11:08:47 EST 2012
ssl.sh: #5370: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9632 >/dev/null 2>/dev/null
selfserv with PID 9632 found at Wed Nov 28 11:08:47 EST 2012
ssl.sh: #5371: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9632 >/dev/null 2>/dev/null
selfserv with PID 9632 found at Wed Nov 28 11:08:47 EST 2012
ssl.sh: #5372: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9632 >/dev/null 2>/dev/null
selfserv with PID 9632 found at Wed Nov 28 11:08:48 EST 2012
ssl.sh: #5373: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9632 >/dev/null 2>/dev/null
selfserv with PID 9632 found at Wed Nov 28 11:08:48 EST 2012
ssl.sh: #5374: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9632 >/dev/null 2>/dev/null
selfserv with PID 9632 found at Wed Nov 28 11:08:48 EST 2012
ssl.sh: #5375: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9632 >/dev/null 2>/dev/null
selfserv with PID 9632 found at Wed Nov 28 11:08:48 EST 2012
ssl.sh: #5376: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9632 >/dev/null 2>/dev/null
selfserv with PID 9632 found at Wed Nov 28 11:08:48 EST 2012
ssl.sh: #5377: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9632 >/dev/null 2>/dev/null
selfserv with PID 9632 found at Wed Nov 28 11:08:48 EST 2012
ssl.sh: #5378: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9632 >/dev/null 2>/dev/null
selfserv with PID 9632 found at Wed Nov 28 11:08:48 EST 2012
ssl.sh: #5379: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 9632 at Wed Nov 28 11:08:48 EST 2012
kill -USR1 9632
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 9632 killed at Wed Nov 28 11:08:48 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:08:48 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:08:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 11055 >/dev/null 2>/dev/null
selfserv with PID 11055 found at Wed Nov 28 11:08:48 EST 2012
selfserv with PID 11055 started at Wed Nov 28 11:08:48 EST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11055 >/dev/null 2>/dev/null
selfserv with PID 11055 found at Wed Nov 28 11:08:48 EST 2012
ssl.sh: #5380: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11055 >/dev/null 2>/dev/null
selfserv with PID 11055 found at Wed Nov 28 11:08:48 EST 2012
ssl.sh: #5381: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11055 >/dev/null 2>/dev/null
selfserv with PID 11055 found at Wed Nov 28 11:08:48 EST 2012
ssl.sh: #5382: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11055 >/dev/null 2>/dev/null
selfserv with PID 11055 found at Wed Nov 28 11:08:48 EST 2012
ssl.sh: #5383: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11055 >/dev/null 2>/dev/null
selfserv with PID 11055 found at Wed Nov 28 11:08:48 EST 2012
ssl.sh: #5384: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11055 >/dev/null 2>/dev/null
selfserv with PID 11055 found at Wed Nov 28 11:08:49 EST 2012
ssl.sh: #5385: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11055 >/dev/null 2>/dev/null
selfserv with PID 11055 found at Wed Nov 28 11:08:49 EST 2012
ssl.sh: #5386: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11055 >/dev/null 2>/dev/null
selfserv with PID 11055 found at Wed Nov 28 11:08:49 EST 2012
ssl.sh: #5387: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11055 >/dev/null 2>/dev/null
selfserv with PID 11055 found at Wed Nov 28 11:08:49 EST 2012
ssl.sh: #5388: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11055 >/dev/null 2>/dev/null
selfserv with PID 11055 found at Wed Nov 28 11:08:49 EST 2012
ssl.sh: #5389: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11055 >/dev/null 2>/dev/null
selfserv with PID 11055 found at Wed Nov 28 11:08:49 EST 2012
ssl.sh: #5390: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11055 >/dev/null 2>/dev/null
selfserv with PID 11055 found at Wed Nov 28 11:08:49 EST 2012
ssl.sh: #5391: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11055 >/dev/null 2>/dev/null
selfserv with PID 11055 found at Wed Nov 28 11:08:49 EST 2012
ssl.sh: #5392: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/server/root.crl_43-48

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 156 bytes
tstclnt: Writing 156 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11055 >/dev/null 2>/dev/null
selfserv with PID 11055 found at Wed Nov 28 11:08:49 EST 2012
================= CRL Reloaded =============
ssl.sh: #5393: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11055 >/dev/null 2>/dev/null
selfserv with PID 11055 found at Wed Nov 28 11:08:49 EST 2012
ssl.sh: #5394: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11055 >/dev/null 2>/dev/null
selfserv with PID 11055 found at Wed Nov 28 11:08:49 EST 2012
ssl.sh: #5395: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11055 >/dev/null 2>/dev/null
selfserv with PID 11055 found at Wed Nov 28 11:08:49 EST 2012
ssl.sh: #5396: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11055 >/dev/null 2>/dev/null
selfserv with PID 11055 found at Wed Nov 28 11:08:49 EST 2012
ssl.sh: #5397: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11055 >/dev/null 2>/dev/null
selfserv with PID 11055 found at Wed Nov 28 11:08:49 EST 2012
ssl.sh: #5398: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11055 >/dev/null 2>/dev/null
selfserv with PID 11055 found at Wed Nov 28 11:08:50 EST 2012
ssl.sh: #5399: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11055 >/dev/null 2>/dev/null
selfserv with PID 11055 found at Wed Nov 28 11:08:50 EST 2012
ssl.sh: #5400: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11055 >/dev/null 2>/dev/null
selfserv with PID 11055 found at Wed Nov 28 11:08:50 EST 2012
ssl.sh: #5401: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11055 >/dev/null 2>/dev/null
selfserv with PID 11055 found at Wed Nov 28 11:08:50 EST 2012
ssl.sh: #5402: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11055 >/dev/null 2>/dev/null
selfserv with PID 11055 found at Wed Nov 28 11:08:50 EST 2012
ssl.sh: #5403: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11055 >/dev/null 2>/dev/null
selfserv with PID 11055 found at Wed Nov 28 11:08:50 EST 2012
ssl.sh: #5404: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11055 >/dev/null 2>/dev/null
selfserv with PID 11055 found at Wed Nov 28 11:08:50 EST 2012
ssl.sh: #5405: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11055 >/dev/null 2>/dev/null
selfserv with PID 11055 found at Wed Nov 28 11:08:50 EST 2012
ssl.sh: #5406: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/server/root.crl_49-52

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 156 bytes
tstclnt: Writing 156 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11055 >/dev/null 2>/dev/null
selfserv with PID 11055 found at Wed Nov 28 11:08:50 EST 2012
================= CRL Reloaded =============
ssl.sh: #5407: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11055 >/dev/null 2>/dev/null
selfserv with PID 11055 found at Wed Nov 28 11:08:50 EST 2012
ssl.sh: #5408: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11055 >/dev/null 2>/dev/null
selfserv with PID 11055 found at Wed Nov 28 11:08:50 EST 2012
ssl.sh: #5409: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11055 >/dev/null 2>/dev/null
selfserv with PID 11055 found at Wed Nov 28 11:08:50 EST 2012
ssl.sh: #5410: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11055 >/dev/null 2>/dev/null
selfserv with PID 11055 found at Wed Nov 28 11:08:50 EST 2012
ssl.sh: #5411: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11055 >/dev/null 2>/dev/null
selfserv with PID 11055 found at Wed Nov 28 11:08:50 EST 2012
ssl.sh: #5412: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11055 >/dev/null 2>/dev/null
selfserv with PID 11055 found at Wed Nov 28 11:08:50 EST 2012
ssl.sh: #5413: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11055 >/dev/null 2>/dev/null
selfserv with PID 11055 found at Wed Nov 28 11:08:50 EST 2012
ssl.sh: #5414: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11055 >/dev/null 2>/dev/null
selfserv with PID 11055 found at Wed Nov 28 11:08:51 EST 2012
ssl.sh: #5415: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11055 >/dev/null 2>/dev/null
selfserv with PID 11055 found at Wed Nov 28 11:08:51 EST 2012
ssl.sh: #5416: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11055 >/dev/null 2>/dev/null
selfserv with PID 11055 found at Wed Nov 28 11:08:51 EST 2012
ssl.sh: #5417: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11055 >/dev/null 2>/dev/null
selfserv with PID 11055 found at Wed Nov 28 11:08:51 EST 2012
ssl.sh: #5418: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11055 >/dev/null 2>/dev/null
selfserv with PID 11055 found at Wed Nov 28 11:08:51 EST 2012
ssl.sh: #5419: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11055 >/dev/null 2>/dev/null
selfserv with PID 11055 found at Wed Nov 28 11:08:51 EST 2012
ssl.sh: #5420: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 11055 at Wed Nov 28 11:08:51 EST 2012
kill -USR1 11055
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 11055 killed at Wed Nov 28 11:08:51 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:08:51 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:08:51 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 12480 >/dev/null 2>/dev/null
selfserv with PID 12480 found at Wed Nov 28 11:08:51 EST 2012
selfserv with PID 12480 started at Wed Nov 28 11:08:51 EST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12480 >/dev/null 2>/dev/null
selfserv with PID 12480 found at Wed Nov 28 11:08:51 EST 2012
ssl.sh: #5421: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12480 >/dev/null 2>/dev/null
selfserv with PID 12480 found at Wed Nov 28 11:08:51 EST 2012
ssl.sh: #5422: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12480 >/dev/null 2>/dev/null
selfserv with PID 12480 found at Wed Nov 28 11:08:51 EST 2012
ssl.sh: #5423: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12480 >/dev/null 2>/dev/null
selfserv with PID 12480 found at Wed Nov 28 11:08:51 EST 2012
ssl.sh: #5424: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12480 >/dev/null 2>/dev/null
selfserv with PID 12480 found at Wed Nov 28 11:08:51 EST 2012
ssl.sh: #5425: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12480 >/dev/null 2>/dev/null
selfserv with PID 12480 found at Wed Nov 28 11:08:51 EST 2012
ssl.sh: #5426: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12480 >/dev/null 2>/dev/null
selfserv with PID 12480 found at Wed Nov 28 11:08:51 EST 2012
ssl.sh: #5427: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12480 >/dev/null 2>/dev/null
selfserv with PID 12480 found at Wed Nov 28 11:08:52 EST 2012
ssl.sh: #5428: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12480 >/dev/null 2>/dev/null
selfserv with PID 12480 found at Wed Nov 28 11:08:52 EST 2012
ssl.sh: #5429: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12480 >/dev/null 2>/dev/null
selfserv with PID 12480 found at Wed Nov 28 11:08:52 EST 2012
ssl.sh: #5430: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12480 >/dev/null 2>/dev/null
selfserv with PID 12480 found at Wed Nov 28 11:08:52 EST 2012
ssl.sh: #5431: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12480 >/dev/null 2>/dev/null
selfserv with PID 12480 found at Wed Nov 28 11:08:52 EST 2012
ssl.sh: #5432: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12480 >/dev/null 2>/dev/null
selfserv with PID 12480 found at Wed Nov 28 11:08:52 EST 2012
ssl.sh: #5433: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/server/root.crl_43-48

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 156 bytes
tstclnt: Writing 156 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12480 >/dev/null 2>/dev/null
selfserv with PID 12480 found at Wed Nov 28 11:08:52 EST 2012
================= CRL Reloaded =============
ssl.sh: #5434: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12480 >/dev/null 2>/dev/null
selfserv with PID 12480 found at Wed Nov 28 11:08:52 EST 2012
ssl.sh: #5435: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12480 >/dev/null 2>/dev/null
selfserv with PID 12480 found at Wed Nov 28 11:08:52 EST 2012
ssl.sh: #5436: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12480 >/dev/null 2>/dev/null
selfserv with PID 12480 found at Wed Nov 28 11:08:52 EST 2012
ssl.sh: #5437: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12480 >/dev/null 2>/dev/null
selfserv with PID 12480 found at Wed Nov 28 11:08:52 EST 2012
ssl.sh: #5438: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12480 >/dev/null 2>/dev/null
selfserv with PID 12480 found at Wed Nov 28 11:08:52 EST 2012
ssl.sh: #5439: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12480 >/dev/null 2>/dev/null
selfserv with PID 12480 found at Wed Nov 28 11:08:52 EST 2012
ssl.sh: #5440: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12480 >/dev/null 2>/dev/null
selfserv with PID 12480 found at Wed Nov 28 11:08:52 EST 2012
ssl.sh: #5441: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12480 >/dev/null 2>/dev/null
selfserv with PID 12480 found at Wed Nov 28 11:08:53 EST 2012
ssl.sh: #5442: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12480 >/dev/null 2>/dev/null
selfserv with PID 12480 found at Wed Nov 28 11:08:53 EST 2012
ssl.sh: #5443: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12480 >/dev/null 2>/dev/null
selfserv with PID 12480 found at Wed Nov 28 11:08:53 EST 2012
ssl.sh: #5444: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12480 >/dev/null 2>/dev/null
selfserv with PID 12480 found at Wed Nov 28 11:08:53 EST 2012
ssl.sh: #5445: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12480 >/dev/null 2>/dev/null
selfserv with PID 12480 found at Wed Nov 28 11:08:53 EST 2012
ssl.sh: #5446: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12480 >/dev/null 2>/dev/null
selfserv with PID 12480 found at Wed Nov 28 11:08:53 EST 2012
ssl.sh: #5447: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/server/root.crl_49-52

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 156 bytes
tstclnt: Writing 156 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12480 >/dev/null 2>/dev/null
selfserv with PID 12480 found at Wed Nov 28 11:08:53 EST 2012
================= CRL Reloaded =============
ssl.sh: #5448: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12480 >/dev/null 2>/dev/null
selfserv with PID 12480 found at Wed Nov 28 11:08:53 EST 2012
ssl.sh: #5449: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12480 >/dev/null 2>/dev/null
selfserv with PID 12480 found at Wed Nov 28 11:08:53 EST 2012
ssl.sh: #5450: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12480 >/dev/null 2>/dev/null
selfserv with PID 12480 found at Wed Nov 28 11:08:53 EST 2012
ssl.sh: #5451: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12480 >/dev/null 2>/dev/null
selfserv with PID 12480 found at Wed Nov 28 11:08:53 EST 2012
ssl.sh: #5452: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12480 >/dev/null 2>/dev/null
selfserv with PID 12480 found at Wed Nov 28 11:08:53 EST 2012
ssl.sh: #5453: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12480 >/dev/null 2>/dev/null
selfserv with PID 12480 found at Wed Nov 28 11:08:53 EST 2012
ssl.sh: #5454: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12480 >/dev/null 2>/dev/null
selfserv with PID 12480 found at Wed Nov 28 11:08:53 EST 2012
ssl.sh: #5455: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12480 >/dev/null 2>/dev/null
selfserv with PID 12480 found at Wed Nov 28 11:08:54 EST 2012
ssl.sh: #5456: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12480 >/dev/null 2>/dev/null
selfserv with PID 12480 found at Wed Nov 28 11:08:54 EST 2012
ssl.sh: #5457: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12480 >/dev/null 2>/dev/null
selfserv with PID 12480 found at Wed Nov 28 11:08:54 EST 2012
ssl.sh: #5458: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12480 >/dev/null 2>/dev/null
selfserv with PID 12480 found at Wed Nov 28 11:08:54 EST 2012
ssl.sh: #5459: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12480 >/dev/null 2>/dev/null
selfserv with PID 12480 found at Wed Nov 28 11:08:54 EST 2012
ssl.sh: #5460: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12480 >/dev/null 2>/dev/null
selfserv with PID 12480 found at Wed Nov 28 11:08:54 EST 2012
ssl.sh: #5461: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 12480 at Wed Nov 28 11:08:54 EST 2012
kill -USR1 12480
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 12480 killed at Wed Nov 28 11:08:54 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:08:54 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:08:54 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 13902 >/dev/null 2>/dev/null
selfserv with PID 13902 found at Wed Nov 28 11:08:54 EST 2012
selfserv with PID 13902 started at Wed Nov 28 11:08:54 EST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13902 >/dev/null 2>/dev/null
selfserv with PID 13902 found at Wed Nov 28 11:08:54 EST 2012
ssl.sh: #5462: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13902 >/dev/null 2>/dev/null
selfserv with PID 13902 found at Wed Nov 28 11:08:54 EST 2012
ssl.sh: #5463: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13902 >/dev/null 2>/dev/null
selfserv with PID 13902 found at Wed Nov 28 11:08:54 EST 2012
ssl.sh: #5464: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13902 >/dev/null 2>/dev/null
selfserv with PID 13902 found at Wed Nov 28 11:08:54 EST 2012
ssl.sh: #5465: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13902 >/dev/null 2>/dev/null
selfserv with PID 13902 found at Wed Nov 28 11:08:54 EST 2012
ssl.sh: #5466: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13902 >/dev/null 2>/dev/null
selfserv with PID 13902 found at Wed Nov 28 11:08:55 EST 2012
ssl.sh: #5467: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13902 >/dev/null 2>/dev/null
selfserv with PID 13902 found at Wed Nov 28 11:08:55 EST 2012
ssl.sh: #5468: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13902 >/dev/null 2>/dev/null
selfserv with PID 13902 found at Wed Nov 28 11:08:55 EST 2012
ssl.sh: #5469: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13902 >/dev/null 2>/dev/null
selfserv with PID 13902 found at Wed Nov 28 11:08:55 EST 2012
ssl.sh: #5470: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13902 >/dev/null 2>/dev/null
selfserv with PID 13902 found at Wed Nov 28 11:08:55 EST 2012
ssl.sh: #5471: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13902 >/dev/null 2>/dev/null
selfserv with PID 13902 found at Wed Nov 28 11:08:55 EST 2012
ssl.sh: #5472: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13902 >/dev/null 2>/dev/null
selfserv with PID 13902 found at Wed Nov 28 11:08:55 EST 2012
ssl.sh: #5473: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13902 >/dev/null 2>/dev/null
selfserv with PID 13902 found at Wed Nov 28 11:08:55 EST 2012
ssl.sh: #5474: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/server/root.crl_43-48-ec

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 159 bytes
tstclnt: Writing 159 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13902 >/dev/null 2>/dev/null
selfserv with PID 13902 found at Wed Nov 28 11:08:55 EST 2012
================= CRL Reloaded =============
ssl.sh: #5475: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13902 >/dev/null 2>/dev/null
selfserv with PID 13902 found at Wed Nov 28 11:08:55 EST 2012
ssl.sh: #5476: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13902 >/dev/null 2>/dev/null
selfserv with PID 13902 found at Wed Nov 28 11:08:55 EST 2012
ssl.sh: #5477: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13902 >/dev/null 2>/dev/null
selfserv with PID 13902 found at Wed Nov 28 11:08:56 EST 2012
ssl.sh: #5478: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13902 >/dev/null 2>/dev/null
selfserv with PID 13902 found at Wed Nov 28 11:08:56 EST 2012
ssl.sh: #5479: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13902 >/dev/null 2>/dev/null
selfserv with PID 13902 found at Wed Nov 28 11:08:56 EST 2012
ssl.sh: #5480: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13902 >/dev/null 2>/dev/null
selfserv with PID 13902 found at Wed Nov 28 11:08:56 EST 2012
ssl.sh: #5481: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13902 >/dev/null 2>/dev/null
selfserv with PID 13902 found at Wed Nov 28 11:08:56 EST 2012
ssl.sh: #5482: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13902 >/dev/null 2>/dev/null
selfserv with PID 13902 found at Wed Nov 28 11:08:56 EST 2012
ssl.sh: #5483: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13902 >/dev/null 2>/dev/null
selfserv with PID 13902 found at Wed Nov 28 11:08:56 EST 2012
ssl.sh: #5484: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13902 >/dev/null 2>/dev/null
selfserv with PID 13902 found at Wed Nov 28 11:08:56 EST 2012
ssl.sh: #5485: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13902 >/dev/null 2>/dev/null
selfserv with PID 13902 found at Wed Nov 28 11:08:56 EST 2012
ssl.sh: #5486: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13902 >/dev/null 2>/dev/null
selfserv with PID 13902 found at Wed Nov 28 11:08:56 EST 2012
ssl.sh: #5487: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13902 >/dev/null 2>/dev/null
selfserv with PID 13902 found at Wed Nov 28 11:08:57 EST 2012
ssl.sh: #5488: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/server/root.crl_49-52-ec

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 159 bytes
tstclnt: Writing 159 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13902 >/dev/null 2>/dev/null
selfserv with PID 13902 found at Wed Nov 28 11:08:57 EST 2012
================= CRL Reloaded =============
ssl.sh: #5489: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13902 >/dev/null 2>/dev/null
selfserv with PID 13902 found at Wed Nov 28 11:08:57 EST 2012
ssl.sh: #5490: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13902 >/dev/null 2>/dev/null
selfserv with PID 13902 found at Wed Nov 28 11:08:57 EST 2012
ssl.sh: #5491: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13902 >/dev/null 2>/dev/null
selfserv with PID 13902 found at Wed Nov 28 11:08:57 EST 2012
ssl.sh: #5492: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13902 >/dev/null 2>/dev/null
selfserv with PID 13902 found at Wed Nov 28 11:08:57 EST 2012
ssl.sh: #5493: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13902 >/dev/null 2>/dev/null
selfserv with PID 13902 found at Wed Nov 28 11:08:57 EST 2012
ssl.sh: #5494: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13902 >/dev/null 2>/dev/null
selfserv with PID 13902 found at Wed Nov 28 11:08:57 EST 2012
ssl.sh: #5495: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13902 >/dev/null 2>/dev/null
selfserv with PID 13902 found at Wed Nov 28 11:08:57 EST 2012
ssl.sh: #5496: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13902 >/dev/null 2>/dev/null
selfserv with PID 13902 found at Wed Nov 28 11:08:57 EST 2012
ssl.sh: #5497: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13902 >/dev/null 2>/dev/null
selfserv with PID 13902 found at Wed Nov 28 11:08:58 EST 2012
ssl.sh: #5498: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13902 >/dev/null 2>/dev/null
selfserv with PID 13902 found at Wed Nov 28 11:08:58 EST 2012
ssl.sh: #5499: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13902 >/dev/null 2>/dev/null
selfserv with PID 13902 found at Wed Nov 28 11:08:58 EST 2012
ssl.sh: #5500: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13902 >/dev/null 2>/dev/null
selfserv with PID 13902 found at Wed Nov 28 11:08:58 EST 2012
ssl.sh: #5501: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13902 >/dev/null 2>/dev/null
selfserv with PID 13902 found at Wed Nov 28 11:08:58 EST 2012
ssl.sh: #5502: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 13902 at Wed Nov 28 11:08:58 EST 2012
kill -USR1 13902
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 13902 killed at Wed Nov 28 11:08:58 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:08:58 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:08:58 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 15322 >/dev/null 2>/dev/null
selfserv with PID 15322 found at Wed Nov 28 11:08:58 EST 2012
selfserv with PID 15322 started at Wed Nov 28 11:08:58 EST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15322 >/dev/null 2>/dev/null
selfserv with PID 15322 found at Wed Nov 28 11:08:58 EST 2012
ssl.sh: #5503: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15322 >/dev/null 2>/dev/null
selfserv with PID 15322 found at Wed Nov 28 11:08:58 EST 2012
ssl.sh: #5504: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15322 >/dev/null 2>/dev/null
selfserv with PID 15322 found at Wed Nov 28 11:08:58 EST 2012
ssl.sh: #5505: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15322 >/dev/null 2>/dev/null
selfserv with PID 15322 found at Wed Nov 28 11:08:58 EST 2012
ssl.sh: #5506: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15322 >/dev/null 2>/dev/null
selfserv with PID 15322 found at Wed Nov 28 11:08:58 EST 2012
ssl.sh: #5507: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15322 >/dev/null 2>/dev/null
selfserv with PID 15322 found at Wed Nov 28 11:08:59 EST 2012
ssl.sh: #5508: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15322 >/dev/null 2>/dev/null
selfserv with PID 15322 found at Wed Nov 28 11:08:59 EST 2012
ssl.sh: #5509: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15322 >/dev/null 2>/dev/null
selfserv with PID 15322 found at Wed Nov 28 11:08:59 EST 2012
ssl.sh: #5510: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15322 >/dev/null 2>/dev/null
selfserv with PID 15322 found at Wed Nov 28 11:08:59 EST 2012
ssl.sh: #5511: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15322 >/dev/null 2>/dev/null
selfserv with PID 15322 found at Wed Nov 28 11:08:59 EST 2012
ssl.sh: #5512: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15322 >/dev/null 2>/dev/null
selfserv with PID 15322 found at Wed Nov 28 11:08:59 EST 2012
ssl.sh: #5513: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15322 >/dev/null 2>/dev/null
selfserv with PID 15322 found at Wed Nov 28 11:08:59 EST 2012
ssl.sh: #5514: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15322 >/dev/null 2>/dev/null
selfserv with PID 15322 found at Wed Nov 28 11:08:59 EST 2012
ssl.sh: #5515: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/server/root.crl_43-48-ec

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 159 bytes
tstclnt: Writing 159 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15322 >/dev/null 2>/dev/null
selfserv with PID 15322 found at Wed Nov 28 11:08:59 EST 2012
================= CRL Reloaded =============
ssl.sh: #5516: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15322 >/dev/null 2>/dev/null
selfserv with PID 15322 found at Wed Nov 28 11:08:59 EST 2012
ssl.sh: #5517: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15322 >/dev/null 2>/dev/null
selfserv with PID 15322 found at Wed Nov 28 11:08:59 EST 2012
ssl.sh: #5518: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15322 >/dev/null 2>/dev/null
selfserv with PID 15322 found at Wed Nov 28 11:08:59 EST 2012
ssl.sh: #5519: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15322 >/dev/null 2>/dev/null
selfserv with PID 15322 found at Wed Nov 28 11:09:00 EST 2012
ssl.sh: #5520: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15322 >/dev/null 2>/dev/null
selfserv with PID 15322 found at Wed Nov 28 11:09:00 EST 2012
ssl.sh: #5521: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15322 >/dev/null 2>/dev/null
selfserv with PID 15322 found at Wed Nov 28 11:09:00 EST 2012
ssl.sh: #5522: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15322 >/dev/null 2>/dev/null
selfserv with PID 15322 found at Wed Nov 28 11:09:00 EST 2012
ssl.sh: #5523: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15322 >/dev/null 2>/dev/null
selfserv with PID 15322 found at Wed Nov 28 11:09:00 EST 2012
ssl.sh: #5524: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15322 >/dev/null 2>/dev/null
selfserv with PID 15322 found at Wed Nov 28 11:09:00 EST 2012
ssl.sh: #5525: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15322 >/dev/null 2>/dev/null
selfserv with PID 15322 found at Wed Nov 28 11:09:00 EST 2012
ssl.sh: #5526: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15322 >/dev/null 2>/dev/null
selfserv with PID 15322 found at Wed Nov 28 11:09:00 EST 2012
ssl.sh: #5527: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15322 >/dev/null 2>/dev/null
selfserv with PID 15322 found at Wed Nov 28 11:09:00 EST 2012
ssl.sh: #5528: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15322 >/dev/null 2>/dev/null
selfserv with PID 15322 found at Wed Nov 28 11:09:00 EST 2012
ssl.sh: #5529: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/server/root.crl_49-52-ec

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 159 bytes
tstclnt: Writing 159 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15322 >/dev/null 2>/dev/null
selfserv with PID 15322 found at Wed Nov 28 11:09:00 EST 2012
================= CRL Reloaded =============
ssl.sh: #5530: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15322 >/dev/null 2>/dev/null
selfserv with PID 15322 found at Wed Nov 28 11:09:00 EST 2012
ssl.sh: #5531: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15322 >/dev/null 2>/dev/null
selfserv with PID 15322 found at Wed Nov 28 11:09:01 EST 2012
ssl.sh: #5532: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15322 >/dev/null 2>/dev/null
selfserv with PID 15322 found at Wed Nov 28 11:09:01 EST 2012
ssl.sh: #5533: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15322 >/dev/null 2>/dev/null
selfserv with PID 15322 found at Wed Nov 28 11:09:01 EST 2012
ssl.sh: #5534: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15322 >/dev/null 2>/dev/null
selfserv with PID 15322 found at Wed Nov 28 11:09:01 EST 2012
ssl.sh: #5535: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15322 >/dev/null 2>/dev/null
selfserv with PID 15322 found at Wed Nov 28 11:09:01 EST 2012
ssl.sh: #5536: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15322 >/dev/null 2>/dev/null
selfserv with PID 15322 found at Wed Nov 28 11:09:01 EST 2012
ssl.sh: #5537: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15322 >/dev/null 2>/dev/null
selfserv with PID 15322 found at Wed Nov 28 11:09:01 EST 2012
ssl.sh: #5538: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15322 >/dev/null 2>/dev/null
selfserv with PID 15322 found at Wed Nov 28 11:09:01 EST 2012
ssl.sh: #5539: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15322 >/dev/null 2>/dev/null
selfserv with PID 15322 found at Wed Nov 28 11:09:01 EST 2012
ssl.sh: #5540: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15322 >/dev/null 2>/dev/null
selfserv with PID 15322 found at Wed Nov 28 11:09:01 EST 2012
ssl.sh: #5541: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15322 >/dev/null 2>/dev/null
selfserv with PID 15322 found at Wed Nov 28 11:09:01 EST 2012
ssl.sh: #5542: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15322 >/dev/null 2>/dev/null
selfserv with PID 15322 found at Wed Nov 28 11:09:01 EST 2012
ssl.sh: #5543: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 15322 at Wed Nov 28 11:09:02 EST 2012
kill -USR1 15322
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 15322 killed at Wed Nov 28 11:09:02 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:09:02 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:02 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 16743 >/dev/null 2>/dev/null
selfserv with PID 16743 found at Wed Nov 28 11:09:02 EST 2012
selfserv with PID 16743 started at Wed Nov 28 11:09:02 EST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16743 >/dev/null 2>/dev/null
selfserv with PID 16743 found at Wed Nov 28 11:09:02 EST 2012
ssl.sh: #5544: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16743 >/dev/null 2>/dev/null
selfserv with PID 16743 found at Wed Nov 28 11:09:02 EST 2012
ssl.sh: #5545: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16743 >/dev/null 2>/dev/null
selfserv with PID 16743 found at Wed Nov 28 11:09:02 EST 2012
ssl.sh: #5546: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16743 >/dev/null 2>/dev/null
selfserv with PID 16743 found at Wed Nov 28 11:09:02 EST 2012
ssl.sh: #5547: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16743 >/dev/null 2>/dev/null
selfserv with PID 16743 found at Wed Nov 28 11:09:02 EST 2012
ssl.sh: #5548: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16743 >/dev/null 2>/dev/null
selfserv with PID 16743 found at Wed Nov 28 11:09:02 EST 2012
ssl.sh: #5549: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16743 >/dev/null 2>/dev/null
selfserv with PID 16743 found at Wed Nov 28 11:09:02 EST 2012
ssl.sh: #5550: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16743 >/dev/null 2>/dev/null
selfserv with PID 16743 found at Wed Nov 28 11:09:02 EST 2012
ssl.sh: #5551: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16743 >/dev/null 2>/dev/null
selfserv with PID 16743 found at Wed Nov 28 11:09:02 EST 2012
ssl.sh: #5552: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16743 >/dev/null 2>/dev/null
selfserv with PID 16743 found at Wed Nov 28 11:09:03 EST 2012
ssl.sh: #5553: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16743 >/dev/null 2>/dev/null
selfserv with PID 16743 found at Wed Nov 28 11:09:03 EST 2012
ssl.sh: #5554: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16743 >/dev/null 2>/dev/null
selfserv with PID 16743 found at Wed Nov 28 11:09:03 EST 2012
ssl.sh: #5555: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16743 >/dev/null 2>/dev/null
selfserv with PID 16743 found at Wed Nov 28 11:09:03 EST 2012
ssl.sh: #5556: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/server/root.crl_43-48-ec

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 159 bytes
tstclnt: Writing 159 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16743 >/dev/null 2>/dev/null
selfserv with PID 16743 found at Wed Nov 28 11:09:03 EST 2012
================= CRL Reloaded =============
ssl.sh: #5557: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16743 >/dev/null 2>/dev/null
selfserv with PID 16743 found at Wed Nov 28 11:09:03 EST 2012
ssl.sh: #5558: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16743 >/dev/null 2>/dev/null
selfserv with PID 16743 found at Wed Nov 28 11:09:03 EST 2012
ssl.sh: #5559: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16743 >/dev/null 2>/dev/null
selfserv with PID 16743 found at Wed Nov 28 11:09:03 EST 2012
ssl.sh: #5560: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16743 >/dev/null 2>/dev/null
selfserv with PID 16743 found at Wed Nov 28 11:09:03 EST 2012
ssl.sh: #5561: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16743 >/dev/null 2>/dev/null
selfserv with PID 16743 found at Wed Nov 28 11:09:03 EST 2012
ssl.sh: #5562: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16743 >/dev/null 2>/dev/null
selfserv with PID 16743 found at Wed Nov 28 11:09:03 EST 2012
ssl.sh: #5563: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16743 >/dev/null 2>/dev/null
selfserv with PID 16743 found at Wed Nov 28 11:09:04 EST 2012
ssl.sh: #5564: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16743 >/dev/null 2>/dev/null
selfserv with PID 16743 found at Wed Nov 28 11:09:04 EST 2012
ssl.sh: #5565: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16743 >/dev/null 2>/dev/null
selfserv with PID 16743 found at Wed Nov 28 11:09:04 EST 2012
ssl.sh: #5566: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16743 >/dev/null 2>/dev/null
selfserv with PID 16743 found at Wed Nov 28 11:09:04 EST 2012
ssl.sh: #5567: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16743 >/dev/null 2>/dev/null
selfserv with PID 16743 found at Wed Nov 28 11:09:04 EST 2012
ssl.sh: #5568: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16743 >/dev/null 2>/dev/null
selfserv with PID 16743 found at Wed Nov 28 11:09:04 EST 2012
ssl.sh: #5569: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16743 >/dev/null 2>/dev/null
selfserv with PID 16743 found at Wed Nov 28 11:09:04 EST 2012
ssl.sh: #5570: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/server/root.crl_49-52-ec

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 159 bytes
tstclnt: Writing 159 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16743 >/dev/null 2>/dev/null
selfserv with PID 16743 found at Wed Nov 28 11:09:04 EST 2012
================= CRL Reloaded =============
ssl.sh: #5571: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16743 >/dev/null 2>/dev/null
selfserv with PID 16743 found at Wed Nov 28 11:09:04 EST 2012
ssl.sh: #5572: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16743 >/dev/null 2>/dev/null
selfserv with PID 16743 found at Wed Nov 28 11:09:04 EST 2012
ssl.sh: #5573: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16743 >/dev/null 2>/dev/null
selfserv with PID 16743 found at Wed Nov 28 11:09:04 EST 2012
ssl.sh: #5574: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16743 >/dev/null 2>/dev/null
selfserv with PID 16743 found at Wed Nov 28 11:09:05 EST 2012
ssl.sh: #5575: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16743 >/dev/null 2>/dev/null
selfserv with PID 16743 found at Wed Nov 28 11:09:05 EST 2012
ssl.sh: #5576: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16743 >/dev/null 2>/dev/null
selfserv with PID 16743 found at Wed Nov 28 11:09:05 EST 2012
ssl.sh: #5577: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16743 >/dev/null 2>/dev/null
selfserv with PID 16743 found at Wed Nov 28 11:09:05 EST 2012
ssl.sh: #5578: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16743 >/dev/null 2>/dev/null
selfserv with PID 16743 found at Wed Nov 28 11:09:05 EST 2012
ssl.sh: #5579: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16743 >/dev/null 2>/dev/null
selfserv with PID 16743 found at Wed Nov 28 11:09:05 EST 2012
ssl.sh: #5580: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16743 >/dev/null 2>/dev/null
selfserv with PID 16743 found at Wed Nov 28 11:09:05 EST 2012
ssl.sh: #5581: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16743 >/dev/null 2>/dev/null
selfserv with PID 16743 found at Wed Nov 28 11:09:05 EST 2012
ssl.sh: #5582: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16743 >/dev/null 2>/dev/null
selfserv with PID 16743 found at Wed Nov 28 11:09:05 EST 2012
ssl.sh: #5583: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16743 >/dev/null 2>/dev/null
selfserv with PID 16743 found at Wed Nov 28 11:09:05 EST 2012
ssl.sh: #5584: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 16743 at Wed Nov 28 11:09:05 EST 2012
kill -USR1 16743
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 16743 killed at Wed Nov 28 11:09:05 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:09:05 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:05 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 18164 >/dev/null 2>/dev/null
selfserv with PID 18164 found at Wed Nov 28 11:09:05 EST 2012
selfserv with PID 18164 started at Wed Nov 28 11:09:05 EST 2012
trying to kill selfserv with PID 18164 at Wed Nov 28 11:09:05 EST 2012
kill -USR1 18164
./ssl.sh: line 173: 18164 User defined signal 1   ${PROFTOOL} ${BINDIR}/selfserv -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 18164 killed at Wed Nov 28 11:09:05 EST 2012
ssl.sh: SSL Cipher Coverage  - server bypass/client bypass  - with ECC ===============================
selfserv starting at Wed Nov 28 11:09:05 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:05 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 18212 >/dev/null 2>/dev/null
selfserv with PID 18212 found at Wed Nov 28 11:09:05 EST 2012
selfserv with PID 18212 started at Wed Nov 28 11:09:05 EST 2012
ssl.sh: running SSL2_RC4_128_WITH_MD5 ----------------------------
kill -0 18212 >/dev/null 2>/dev/null
selfserv with PID 18212 found at Wed Nov 28 11:09:06 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c A -V ssl2:ssl3 -O -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5585: SSL2_RC4_128_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_RC4_128_EXPORT40_WITH_MD5 ----------------------------
kill -0 18212 >/dev/null 2>/dev/null
selfserv with PID 18212 found at Wed Nov 28 11:09:06 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c B -V ssl2:ssl3 -O -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5586: SSL2_RC4_128_EXPORT40_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_RC2_128_CBC_WITH_MD5 ----------------------------
kill -0 18212 >/dev/null 2>/dev/null
selfserv with PID 18212 found at Wed Nov 28 11:09:06 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c C -V ssl2:ssl3 -O -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 128-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5587: SSL2_RC2_128_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 ----------------------------
kill -0 18212 >/dev/null 2>/dev/null
selfserv with PID 18212 found at Wed Nov 28 11:09:06 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c D -V ssl2:ssl3 -O -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5588: SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_DES_64_CBC_WITH_MD5 ----------------------------
kill -0 18212 >/dev/null 2>/dev/null
selfserv with PID 18212 found at Wed Nov 28 11:09:06 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c E -V ssl2:ssl3 -O -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 56-bit DES with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5589: SSL2_DES_64_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_DES_192_EDE3_CBC_WITH_MD5 ----------------------------
kill -0 18212 >/dev/null 2>/dev/null
selfserv with PID 18212 found at Wed Nov 28 11:09:06 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c F -V ssl2:ssl3 -O -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 112-bit 3DES with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5590: SSL2_DES_192_EDE3_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_RC4_128_EXPORT40_WITH_MD5 ----------------------------
kill -0 18212 >/dev/null 2>/dev/null
selfserv with PID 18212 found at Wed Nov 28 11:09:06 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c B -V ssl2:tls1.1 -O -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5591: SSL2_RC4_128_EXPORT40_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_RC2_128_CBC_WITH_MD5 ----------------------------
kill -0 18212 >/dev/null 2>/dev/null
selfserv with PID 18212 found at Wed Nov 28 11:09:06 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c C -V ssl2:tls1.1 -O -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 128-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5592: SSL2_RC2_128_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_DES_64_CBC_WITH_MD5 ----------------------------
kill -0 18212 >/dev/null 2>/dev/null
selfserv with PID 18212 found at Wed Nov 28 11:09:06 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c E -V ssl2:tls1.1 -O -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 56-bit DES with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5593: SSL2_DES_64_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 18212 >/dev/null 2>/dev/null
selfserv with PID 18212 found at Wed Nov 28 11:09:06 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c c -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5594: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 18212 >/dev/null 2>/dev/null
selfserv with PID 18212 found at Wed Nov 28 11:09:06 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c d -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5595: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 18212 >/dev/null 2>/dev/null
selfserv with PID 18212 found at Wed Nov 28 11:09:06 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c e -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5596: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 18212 >/dev/null 2>/dev/null
selfserv with PID 18212 found at Wed Nov 28 11:09:07 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c f -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5597: SSL3_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 18212 >/dev/null 2>/dev/null
selfserv with PID 18212 found at Wed Nov 28 11:09:07 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c g -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5598: SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ----------------------------
kill -0 18212 >/dev/null 2>/dev/null
selfserv with PID 18212 found at Wed Nov 28 11:09:07 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c i -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5599: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 18212 >/dev/null 2>/dev/null
selfserv with PID 18212 found at Wed Nov 28 11:09:07 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c j -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5600: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 18212 >/dev/null 2>/dev/null
selfserv with PID 18212 found at Wed Nov 28 11:09:07 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c k -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5601: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 18212 >/dev/null 2>/dev/null
selfserv with PID 18212 found at Wed Nov 28 11:09:07 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c l -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5602: SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 18212 >/dev/null 2>/dev/null
selfserv with PID 18212 found at Wed Nov 28 11:09:07 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c m -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5603: SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 18212 >/dev/null 2>/dev/null
selfserv with PID 18212 found at Wed Nov 28 11:09:07 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c n -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5604: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 18212 >/dev/null 2>/dev/null
selfserv with PID 18212 found at Wed Nov 28 11:09:07 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c v -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5605: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 18212 >/dev/null 2>/dev/null
selfserv with PID 18212 found at Wed Nov 28 11:09:07 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c y -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5606: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_SHA ----------------------------
kill -0 18212 >/dev/null 2>/dev/null
selfserv with PID 18212 found at Wed Nov 28 11:09:07 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c z -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5607: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 18212 >/dev/null 2>/dev/null
selfserv with PID 18212 found at Wed Nov 28 11:09:07 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c c -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5608: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 18212 >/dev/null 2>/dev/null
selfserv with PID 18212 found at Wed Nov 28 11:09:07 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c d -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5609: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 18212 >/dev/null 2>/dev/null
selfserv with PID 18212 found at Wed Nov 28 11:09:07 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c e -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5610: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 18212 >/dev/null 2>/dev/null
selfserv with PID 18212 found at Wed Nov 28 11:09:07 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c f -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5611: TLS_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 18212 >/dev/null 2>/dev/null
selfserv with PID 18212 found at Wed Nov 28 11:09:07 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c g -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5612: TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_MD5 ----------------------------
kill -0 18212 >/dev/null 2>/dev/null
selfserv with PID 18212 found at Wed Nov 28 11:09:07 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c i -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5613: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 18212 >/dev/null 2>/dev/null
selfserv with PID 18212 found at Wed Nov 28 11:09:07 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c j -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5614: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 18212 >/dev/null 2>/dev/null
selfserv with PID 18212 found at Wed Nov 28 11:09:07 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c k -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5615: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 18212 >/dev/null 2>/dev/null
selfserv with PID 18212 found at Wed Nov 28 11:09:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c l -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5616: TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 18212 >/dev/null 2>/dev/null
selfserv with PID 18212 found at Wed Nov 28 11:09:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c m -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5617: TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 18212 >/dev/null 2>/dev/null
selfserv with PID 18212 found at Wed Nov 28 11:09:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c n -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5618: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 18212 >/dev/null 2>/dev/null
selfserv with PID 18212 found at Wed Nov 28 11:09:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c v -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5619: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 18212 >/dev/null 2>/dev/null
selfserv with PID 18212 found at Wed Nov 28 11:09:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c y -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5620: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_SHA ----------------------------
kill -0 18212 >/dev/null 2>/dev/null
selfserv with PID 18212 found at Wed Nov 28 11:09:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c z -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5621: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 18212 >/dev/null 2>/dev/null
selfserv with PID 18212 found at Wed Nov 28 11:09:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c c -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5622: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 18212 >/dev/null 2>/dev/null
selfserv with PID 18212 found at Wed Nov 28 11:09:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c d -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5623: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 18212 >/dev/null 2>/dev/null
selfserv with PID 18212 found at Wed Nov 28 11:09:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c e -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5624: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ----------------------------
kill -0 18212 >/dev/null 2>/dev/null
selfserv with PID 18212 found at Wed Nov 28 11:09:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c i -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5625: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 18212 >/dev/null 2>/dev/null
selfserv with PID 18212 found at Wed Nov 28 11:09:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c j -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5626: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 18212 >/dev/null 2>/dev/null
selfserv with PID 18212 found at Wed Nov 28 11:09:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c k -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5627: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 18212 >/dev/null 2>/dev/null
selfserv with PID 18212 found at Wed Nov 28 11:09:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c l -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5628: TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 18212 >/dev/null 2>/dev/null
selfserv with PID 18212 found at Wed Nov 28 11:09:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c m -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5629: TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 18212 >/dev/null 2>/dev/null
selfserv with PID 18212 found at Wed Nov 28 11:09:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c n -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5630: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 18212 >/dev/null 2>/dev/null
selfserv with PID 18212 found at Wed Nov 28 11:09:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c v -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5631: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 18212 >/dev/null 2>/dev/null
selfserv with PID 18212 found at Wed Nov 28 11:09:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c y -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5632: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_SHA ----------------------------
kill -0 18212 >/dev/null 2>/dev/null
selfserv with PID 18212 found at Wed Nov 28 11:09:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c z -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5633: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 18212 >/dev/null 2>/dev/null
selfserv with PID 18212 found at Wed Nov 28 11:09:09 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5634: SSL3_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 18212 >/dev/null 2>/dev/null
selfserv with PID 18212 found at Wed Nov 28 11:09:09 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5635: SSL3_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 18212 >/dev/null 2>/dev/null
selfserv with PID 18212 found at Wed Nov 28 11:09:09 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5636: SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 18212 >/dev/null 2>/dev/null
selfserv with PID 18212 found at Wed Nov 28 11:09:09 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5637: SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 18212 >/dev/null 2>/dev/null
selfserv with PID 18212 found at Wed Nov 28 11:09:09 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5638: SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 18212 >/dev/null 2>/dev/null
selfserv with PID 18212 found at Wed Nov 28 11:09:09 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5639: SSL3_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 18212 >/dev/null 2>/dev/null
selfserv with PID 18212 found at Wed Nov 28 11:09:09 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5640: SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 18212 >/dev/null 2>/dev/null
selfserv with PID 18212 found at Wed Nov 28 11:09:09 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5641: SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 18212 >/dev/null 2>/dev/null
selfserv with PID 18212 found at Wed Nov 28 11:09:09 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5642: SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 18212 >/dev/null 2>/dev/null
selfserv with PID 18212 found at Wed Nov 28 11:09:09 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5643: SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 18212 at Wed Nov 28 11:09:09 EST 2012
kill -USR1 18212
selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 18212 killed at Wed Nov 28 11:09:09 EST 2012
ssl.sh: SSL3_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Wed Nov 28 11:09:09 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:09 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 19803 >/dev/null 2>/dev/null
selfserv with PID 19803 found at Wed Nov 28 11:09:09 EST 2012
selfserv with PID 19803 started at Wed Nov 28 11:09:09 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5644: SSL3_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 19803 >/dev/null 2>/dev/null
selfserv with PID 19803 found at Wed Nov 28 11:09:10 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5645: SSL3_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 19803 >/dev/null 2>/dev/null
selfserv with PID 19803 found at Wed Nov 28 11:09:10 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5646: SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 19803 >/dev/null 2>/dev/null
selfserv with PID 19803 found at Wed Nov 28 11:09:10 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5647: SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 19803 >/dev/null 2>/dev/null
selfserv with PID 19803 found at Wed Nov 28 11:09:10 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5648: SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 19803 at Wed Nov 28 11:09:10 EST 2012
kill -USR1 19803
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 19803 killed at Wed Nov 28 11:09:10 EST 2012
ssl.sh: SSL3_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Wed Nov 28 11:09:10 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:10 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 19952 >/dev/null 2>/dev/null
selfserv with PID 19952 found at Wed Nov 28 11:09:10 EST 2012
selfserv with PID 19952 started at Wed Nov 28 11:09:10 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5649: SSL3_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 19952 >/dev/null 2>/dev/null
selfserv with PID 19952 found at Wed Nov 28 11:09:10 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5650: SSL3_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 19952 >/dev/null 2>/dev/null
selfserv with PID 19952 found at Wed Nov 28 11:09:10 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5651: SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 19952 >/dev/null 2>/dev/null
selfserv with PID 19952 found at Wed Nov 28 11:09:10 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5652: SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 19952 >/dev/null 2>/dev/null
selfserv with PID 19952 found at Wed Nov 28 11:09:10 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5653: SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 19952 >/dev/null 2>/dev/null
selfserv with PID 19952 found at Wed Nov 28 11:09:10 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5654: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 19952 >/dev/null 2>/dev/null
selfserv with PID 19952 found at Wed Nov 28 11:09:10 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5655: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 19952 >/dev/null 2>/dev/null
selfserv with PID 19952 found at Wed Nov 28 11:09:10 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5656: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 19952 >/dev/null 2>/dev/null
selfserv with PID 19952 found at Wed Nov 28 11:09:11 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5657: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 19952 >/dev/null 2>/dev/null
selfserv with PID 19952 found at Wed Nov 28 11:09:11 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5658: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 19952 >/dev/null 2>/dev/null
selfserv with PID 19952 found at Wed Nov 28 11:09:11 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5659: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 19952 >/dev/null 2>/dev/null
selfserv with PID 19952 found at Wed Nov 28 11:09:11 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5660: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 19952 >/dev/null 2>/dev/null
selfserv with PID 19952 found at Wed Nov 28 11:09:11 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5661: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 19952 >/dev/null 2>/dev/null
selfserv with PID 19952 found at Wed Nov 28 11:09:11 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5662: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 19952 >/dev/null 2>/dev/null
selfserv with PID 19952 found at Wed Nov 28 11:09:11 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5663: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 19952 at Wed Nov 28 11:09:11 EST 2012
kill -USR1 19952
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 19952 killed at Wed Nov 28 11:09:11 EST 2012
ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Wed Nov 28 11:09:11 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:11 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 20352 >/dev/null 2>/dev/null
selfserv with PID 20352 found at Wed Nov 28 11:09:11 EST 2012
selfserv with PID 20352 started at Wed Nov 28 11:09:11 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5664: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 20352 >/dev/null 2>/dev/null
selfserv with PID 20352 found at Wed Nov 28 11:09:11 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5665: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 20352 >/dev/null 2>/dev/null
selfserv with PID 20352 found at Wed Nov 28 11:09:11 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5666: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 20352 >/dev/null 2>/dev/null
selfserv with PID 20352 found at Wed Nov 28 11:09:11 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5667: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 20352 >/dev/null 2>/dev/null
selfserv with PID 20352 found at Wed Nov 28 11:09:12 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5668: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 20352 at Wed Nov 28 11:09:12 EST 2012
kill -USR1 20352
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 20352 killed at Wed Nov 28 11:09:12 EST 2012
ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Wed Nov 28 11:09:12 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:12 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 20501 >/dev/null 2>/dev/null
selfserv with PID 20501 found at Wed Nov 28 11:09:12 EST 2012
selfserv with PID 20501 started at Wed Nov 28 11:09:12 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5669: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 20501 >/dev/null 2>/dev/null
selfserv with PID 20501 found at Wed Nov 28 11:09:12 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5670: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 20501 >/dev/null 2>/dev/null
selfserv with PID 20501 found at Wed Nov 28 11:09:12 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5671: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 20501 >/dev/null 2>/dev/null
selfserv with PID 20501 found at Wed Nov 28 11:09:12 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5672: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 20501 >/dev/null 2>/dev/null
selfserv with PID 20501 found at Wed Nov 28 11:09:12 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5673: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 20501 >/dev/null 2>/dev/null
selfserv with PID 20501 found at Wed Nov 28 11:09:12 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5674: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 20501 >/dev/null 2>/dev/null
selfserv with PID 20501 found at Wed Nov 28 11:09:12 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5675: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 20501 >/dev/null 2>/dev/null
selfserv with PID 20501 found at Wed Nov 28 11:09:12 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5676: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 20501 >/dev/null 2>/dev/null
selfserv with PID 20501 found at Wed Nov 28 11:09:12 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5677: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 20501 >/dev/null 2>/dev/null
selfserv with PID 20501 found at Wed Nov 28 11:09:12 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5678: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 20501 >/dev/null 2>/dev/null
selfserv with PID 20501 found at Wed Nov 28 11:09:12 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5679: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 20501 >/dev/null 2>/dev/null
selfserv with PID 20501 found at Wed Nov 28 11:09:12 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5680: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 20501 >/dev/null 2>/dev/null
selfserv with PID 20501 found at Wed Nov 28 11:09:13 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5681: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 20501 >/dev/null 2>/dev/null
selfserv with PID 20501 found at Wed Nov 28 11:09:13 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5682: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 20501 >/dev/null 2>/dev/null
selfserv with PID 20501 found at Wed Nov 28 11:09:13 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5683: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 20501 at Wed Nov 28 11:09:13 EST 2012
kill -USR1 20501
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 20501 killed at Wed Nov 28 11:09:13 EST 2012
ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Wed Nov 28 11:09:13 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:13 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 20886 >/dev/null 2>/dev/null
selfserv with PID 20886 found at Wed Nov 28 11:09:13 EST 2012
selfserv with PID 20886 started at Wed Nov 28 11:09:13 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5684: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 20886 >/dev/null 2>/dev/null
selfserv with PID 20886 found at Wed Nov 28 11:09:13 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5685: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 20886 >/dev/null 2>/dev/null
selfserv with PID 20886 found at Wed Nov 28 11:09:13 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5686: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 20886 >/dev/null 2>/dev/null
selfserv with PID 20886 found at Wed Nov 28 11:09:13 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5687: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 20886 >/dev/null 2>/dev/null
selfserv with PID 20886 found at Wed Nov 28 11:09:13 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5688: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 20886 at Wed Nov 28 11:09:13 EST 2012
kill -USR1 20886
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 20886 killed at Wed Nov 28 11:09:13 EST 2012
ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Wed Nov 28 11:09:13 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:13 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 21034 >/dev/null 2>/dev/null
selfserv with PID 21034 found at Wed Nov 28 11:09:13 EST 2012
selfserv with PID 21034 started at Wed Nov 28 11:09:13 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5689: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 21034 >/dev/null 2>/dev/null
selfserv with PID 21034 found at Wed Nov 28 11:09:13 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5690: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 21034 >/dev/null 2>/dev/null
selfserv with PID 21034 found at Wed Nov 28 11:09:14 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5691: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 21034 >/dev/null 2>/dev/null
selfserv with PID 21034 found at Wed Nov 28 11:09:14 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5692: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 21034 >/dev/null 2>/dev/null
selfserv with PID 21034 found at Wed Nov 28 11:09:14 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5693: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 21034 at Wed Nov 28 11:09:14 EST 2012
kill -USR1 21034
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 21034 killed at Wed Nov 28 11:09:14 EST 2012
ssl.sh: SSL Client Authentication  - server bypass/client bypass  - with ECC ===============================
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:09:14 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:14 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 21233 >/dev/null 2>/dev/null
selfserv with PID 21233 found at Wed Nov 28 11:09:14 EST 2012
selfserv with PID 21233 started at Wed Nov 28 11:09:14 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5694: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 21233 at Wed Nov 28 11:09:14 EST 2012
kill -USR1 21233
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 21233 killed at Wed Nov 28 11:09:14 EST 2012
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Wed Nov 28 11:09:14 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:14 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 21290 >/dev/null 2>/dev/null
selfserv with PID 21290 found at Wed Nov 28 11:09:14 EST 2012
selfserv with PID 21290 started at Wed Nov 28 11:09:14 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -w bogus -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5695: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 21290 at Wed Nov 28 11:09:14 EST 2012
kill -USR1 21290
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 21290 killed at Wed Nov 28 11:09:14 EST 2012
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Wed Nov 28 11:09:14 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:14 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 21347 >/dev/null 2>/dev/null
selfserv with PID 21347 found at Wed Nov 28 11:09:14 EST 2012
selfserv with PID 21347 started at Wed Nov 28 11:09:14 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -w nss -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5696: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 21347 at Wed Nov 28 11:09:14 EST 2012
kill -USR1 21347
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 21347 killed at Wed Nov 28 11:09:14 EST 2012
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:09:14 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:14 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 21404 >/dev/null 2>/dev/null
selfserv with PID 21404 found at Wed Nov 28 11:09:14 EST 2012
selfserv with PID 21404 started at Wed Nov 28 11:09:14 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #5697: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 21404 at Wed Nov 28 11:09:14 EST 2012
kill -USR1 21404
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 21404 killed at Wed Nov 28 11:09:15 EST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Wed Nov 28 11:09:15 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:15 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 21461 >/dev/null 2>/dev/null
selfserv with PID 21461 found at Wed Nov 28 11:09:15 EST 2012
selfserv with PID 21461 started at Wed Nov 28 11:09:15 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -w bogus -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #5698: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 21461 at Wed Nov 28 11:09:15 EST 2012
kill -USR1 21461
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 21461 killed at Wed Nov 28 11:09:15 EST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Wed Nov 28 11:09:15 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:15 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 21518 >/dev/null 2>/dev/null
selfserv with PID 21518 found at Wed Nov 28 11:09:15 EST 2012
selfserv with PID 21518 started at Wed Nov 28 11:09:15 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -w nss -n TestUser   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5699: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 21518 at Wed Nov 28 11:09:15 EST 2012
kill -USR1 21518
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 21518 killed at Wed Nov 28 11:09:15 EST 2012
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:09:15 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:15 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 21575 >/dev/null 2>/dev/null
selfserv with PID 21575 found at Wed Nov 28 11:09:15 EST 2012
selfserv with PID 21575 started at Wed Nov 28 11:09:15 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5700: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 21575 at Wed Nov 28 11:09:15 EST 2012
kill -USR1 21575
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 21575 killed at Wed Nov 28 11:09:15 EST 2012
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Wed Nov 28 11:09:15 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:15 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 21632 >/dev/null 2>/dev/null
selfserv with PID 21632 found at Wed Nov 28 11:09:15 EST 2012
selfserv with PID 21632 started at Wed Nov 28 11:09:15 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V :ssl3 -n TestUser -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5701: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 21632 at Wed Nov 28 11:09:15 EST 2012
kill -USR1 21632
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 21632 killed at Wed Nov 28 11:09:15 EST 2012
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Wed Nov 28 11:09:15 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:15 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 21689 >/dev/null 2>/dev/null
selfserv with PID 21689 found at Wed Nov 28 11:09:15 EST 2012
selfserv with PID 21689 started at Wed Nov 28 11:09:15 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V :ssl3 -n TestUser -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5702: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 21689 at Wed Nov 28 11:09:15 EST 2012
kill -USR1 21689
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 21689 killed at Wed Nov 28 11:09:15 EST 2012
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:09:15 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:15 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 21746 >/dev/null 2>/dev/null
selfserv with PID 21746 found at Wed Nov 28 11:09:15 EST 2012
selfserv with PID 21746 started at Wed Nov 28 11:09:15 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #5703: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 21746 at Wed Nov 28 11:09:16 EST 2012
kill -USR1 21746
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 21746 killed at Wed Nov 28 11:09:16 EST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Wed Nov 28 11:09:16 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:16 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 21803 >/dev/null 2>/dev/null
selfserv with PID 21803 found at Wed Nov 28 11:09:16 EST 2012
selfserv with PID 21803 started at Wed Nov 28 11:09:16 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V :ssl3 -n TestUser -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #5704: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 21803 at Wed Nov 28 11:09:16 EST 2012
kill -USR1 21803
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 21803 killed at Wed Nov 28 11:09:16 EST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Wed Nov 28 11:09:16 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:16 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 21860 >/dev/null 2>/dev/null
selfserv with PID 21860 found at Wed Nov 28 11:09:16 EST 2012
selfserv with PID 21860 started at Wed Nov 28 11:09:16 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V :ssl3 -n TestUser -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5705: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 21860 at Wed Nov 28 11:09:16 EST 2012
kill -USR1 21860
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 21860 killed at Wed Nov 28 11:09:16 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:09:16 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:16 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 21917 >/dev/null 2>/dev/null
selfserv with PID 21917 found at Wed Nov 28 11:09:16 EST 2012
selfserv with PID 21917 started at Wed Nov 28 11:09:16 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5706: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 21917 at Wed Nov 28 11:09:16 EST 2012
kill -USR1 21917
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 21917 killed at Wed Nov 28 11:09:16 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:09:16 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:16 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 21974 >/dev/null 2>/dev/null
selfserv with PID 21974 found at Wed Nov 28 11:09:16 EST 2012
selfserv with PID 21974 started at Wed Nov 28 11:09:16 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3: -w bogus -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5707: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 21974 at Wed Nov 28 11:09:16 EST 2012
kill -USR1 21974
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 21974 killed at Wed Nov 28 11:09:16 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:09:16 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:16 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 22031 >/dev/null 2>/dev/null
selfserv with PID 22031 found at Wed Nov 28 11:09:16 EST 2012
selfserv with PID 22031 started at Wed Nov 28 11:09:16 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5708: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 22031 at Wed Nov 28 11:09:16 EST 2012
kill -USR1 22031
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 22031 killed at Wed Nov 28 11:09:16 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:09:16 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:16 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 22088 >/dev/null 2>/dev/null
selfserv with PID 22088 found at Wed Nov 28 11:09:16 EST 2012
selfserv with PID 22088 started at Wed Nov 28 11:09:16 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #5709: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 22088 at Wed Nov 28 11:09:17 EST 2012
kill -USR1 22088
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 22088 killed at Wed Nov 28 11:09:17 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:09:17 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:17 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 22145 >/dev/null 2>/dev/null
selfserv with PID 22145 found at Wed Nov 28 11:09:17 EST 2012
selfserv with PID 22145 started at Wed Nov 28 11:09:17 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3: -w bogus -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #5710: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 22145 at Wed Nov 28 11:09:17 EST 2012
kill -USR1 22145
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 22145 killed at Wed Nov 28 11:09:17 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:09:17 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:17 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 22202 >/dev/null 2>/dev/null
selfserv with PID 22202 found at Wed Nov 28 11:09:17 EST 2012
selfserv with PID 22202 started at Wed Nov 28 11:09:17 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5711: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 22202 at Wed Nov 28 11:09:17 EST 2012
kill -USR1 22202
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 22202 killed at Wed Nov 28 11:09:17 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:09:17 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:17 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 22259 >/dev/null 2>/dev/null
selfserv with PID 22259 found at Wed Nov 28 11:09:17 EST 2012
selfserv with PID 22259 started at Wed Nov 28 11:09:17 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5712: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 22259 at Wed Nov 28 11:09:17 EST 2012
kill -USR1 22259
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 22259 killed at Wed Nov 28 11:09:17 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:09:17 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:17 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 22316 >/dev/null 2>/dev/null
selfserv with PID 22316 found at Wed Nov 28 11:09:17 EST 2012
selfserv with PID 22316 started at Wed Nov 28 11:09:17 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w bogus -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5713: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 22316 at Wed Nov 28 11:09:17 EST 2012
kill -USR1 22316
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 22316 killed at Wed Nov 28 11:09:17 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:09:17 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:17 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 22373 >/dev/null 2>/dev/null
selfserv with PID 22373 found at Wed Nov 28 11:09:17 EST 2012
selfserv with PID 22373 started at Wed Nov 28 11:09:17 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w nss -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5714: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 22373 at Wed Nov 28 11:09:17 EST 2012
kill -USR1 22373
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 22373 killed at Wed Nov 28 11:09:17 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:09:17 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:17 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 22430 >/dev/null 2>/dev/null
selfserv with PID 22430 found at Wed Nov 28 11:09:18 EST 2012
selfserv with PID 22430 started at Wed Nov 28 11:09:18 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #5715: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 22430 at Wed Nov 28 11:09:18 EST 2012
kill -USR1 22430
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 22430 killed at Wed Nov 28 11:09:18 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:09:18 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:18 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 22487 >/dev/null 2>/dev/null
selfserv with PID 22487 found at Wed Nov 28 11:09:18 EST 2012
selfserv with PID 22487 started at Wed Nov 28 11:09:18 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w bogus -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #5716: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 22487 at Wed Nov 28 11:09:18 EST 2012
kill -USR1 22487
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 22487 killed at Wed Nov 28 11:09:18 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:09:18 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:18 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 22544 >/dev/null 2>/dev/null
selfserv with PID 22544 found at Wed Nov 28 11:09:18 EST 2012
selfserv with PID 22544 started at Wed Nov 28 11:09:18 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w nss -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5717: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 22544 at Wed Nov 28 11:09:18 EST 2012
kill -USR1 22544
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 22544 killed at Wed Nov 28 11:09:18 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:09:18 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:18 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 22601 >/dev/null 2>/dev/null
selfserv with PID 22601 found at Wed Nov 28 11:09:18 EST 2012
selfserv with PID 22601 started at Wed Nov 28 11:09:18 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5718: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 22601 at Wed Nov 28 11:09:18 EST 2012
kill -USR1 22601
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 22601 killed at Wed Nov 28 11:09:18 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:09:18 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:18 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 22658 >/dev/null 2>/dev/null
selfserv with PID 22658 found at Wed Nov 28 11:09:18 EST 2012
selfserv with PID 22658 started at Wed Nov 28 11:09:18 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5719: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 22658 at Wed Nov 28 11:09:18 EST 2012
kill -USR1 22658
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 22658 killed at Wed Nov 28 11:09:18 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:09:18 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:18 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 22715 >/dev/null 2>/dev/null
selfserv with PID 22715 found at Wed Nov 28 11:09:18 EST 2012
selfserv with PID 22715 started at Wed Nov 28 11:09:18 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5720: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 22715 at Wed Nov 28 11:09:18 EST 2012
kill -USR1 22715
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 22715 killed at Wed Nov 28 11:09:18 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:09:18 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:18 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Wed Nov 28 11:09:19 EST 2012
selfserv with PID 22772 started at Wed Nov 28 11:09:19 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #5721: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 22772 at Wed Nov 28 11:09:19 EST 2012
kill -USR1 22772
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 22772 killed at Wed Nov 28 11:09:19 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:09:19 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:19 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 22829 >/dev/null 2>/dev/null
selfserv with PID 22829 found at Wed Nov 28 11:09:19 EST 2012
selfserv with PID 22829 started at Wed Nov 28 11:09:19 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #5722: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 22829 at Wed Nov 28 11:09:19 EST 2012
kill -USR1 22829
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 22829 killed at Wed Nov 28 11:09:19 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:09:19 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:19 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 22886 >/dev/null 2>/dev/null
selfserv with PID 22886 found at Wed Nov 28 11:09:19 EST 2012
selfserv with PID 22886 started at Wed Nov 28 11:09:19 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5723: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 22886 at Wed Nov 28 11:09:19 EST 2012
kill -USR1 22886
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 22886 killed at Wed Nov 28 11:09:19 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:09:19 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:19 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 22958 >/dev/null 2>/dev/null
selfserv with PID 22958 found at Wed Nov 28 11:09:19 EST 2012
selfserv with PID 22958 started at Wed Nov 28 11:09:19 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -w bogus -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5724: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 22958 at Wed Nov 28 11:09:19 EST 2012
kill -USR1 22958
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 22958 killed at Wed Nov 28 11:09:19 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:09:19 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:19 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23015 >/dev/null 2>/dev/null
selfserv with PID 23015 found at Wed Nov 28 11:09:19 EST 2012
selfserv with PID 23015 started at Wed Nov 28 11:09:19 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -w nss -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5725: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23015 at Wed Nov 28 11:09:19 EST 2012
kill -USR1 23015
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23015 killed at Wed Nov 28 11:09:19 EST 2012
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:09:19 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:19 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23072 >/dev/null 2>/dev/null
selfserv with PID 23072 found at Wed Nov 28 11:09:19 EST 2012
selfserv with PID 23072 started at Wed Nov 28 11:09:19 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -w bogus -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #5726: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 23072 at Wed Nov 28 11:09:19 EST 2012
kill -USR1 23072
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23072 killed at Wed Nov 28 11:09:20 EST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:09:20 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:20 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23129 >/dev/null 2>/dev/null
selfserv with PID 23129 found at Wed Nov 28 11:09:20 EST 2012
selfserv with PID 23129 started at Wed Nov 28 11:09:20 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -w nss -n TestUser-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5727: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23129 at Wed Nov 28 11:09:20 EST 2012
kill -USR1 23129
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23129 killed at Wed Nov 28 11:09:20 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:09:20 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:20 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23186 >/dev/null 2>/dev/null
selfserv with PID 23186 found at Wed Nov 28 11:09:20 EST 2012
selfserv with PID 23186 started at Wed Nov 28 11:09:20 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V :ssl3 -n TestUser-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5728: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23186 at Wed Nov 28 11:09:20 EST 2012
kill -USR1 23186
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23186 killed at Wed Nov 28 11:09:20 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:09:20 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:20 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23243 >/dev/null 2>/dev/null
selfserv with PID 23243 found at Wed Nov 28 11:09:20 EST 2012
selfserv with PID 23243 started at Wed Nov 28 11:09:20 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V :ssl3 -n TestUser-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5729: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23243 at Wed Nov 28 11:09:20 EST 2012
kill -USR1 23243
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23243 killed at Wed Nov 28 11:09:20 EST 2012
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:09:20 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:20 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23300 >/dev/null 2>/dev/null
selfserv with PID 23300 found at Wed Nov 28 11:09:20 EST 2012
selfserv with PID 23300 started at Wed Nov 28 11:09:20 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V :ssl3 -n TestUser-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #5730: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 23300 at Wed Nov 28 11:09:20 EST 2012
kill -USR1 23300
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23300 killed at Wed Nov 28 11:09:20 EST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:09:20 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:20 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23357 >/dev/null 2>/dev/null
selfserv with PID 23357 found at Wed Nov 28 11:09:20 EST 2012
selfserv with PID 23357 started at Wed Nov 28 11:09:20 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V :ssl3 -n TestUser-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5731: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23357 at Wed Nov 28 11:09:20 EST 2012
kill -USR1 23357
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23357 killed at Wed Nov 28 11:09:20 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:09:20 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:20 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23414 >/dev/null 2>/dev/null
selfserv with PID 23414 found at Wed Nov 28 11:09:20 EST 2012
selfserv with PID 23414 started at Wed Nov 28 11:09:20 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3: -w bogus -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5732: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23414 at Wed Nov 28 11:09:21 EST 2012
kill -USR1 23414
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23414 killed at Wed Nov 28 11:09:21 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:09:21 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:21 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23471 >/dev/null 2>/dev/null
selfserv with PID 23471 found at Wed Nov 28 11:09:21 EST 2012
selfserv with PID 23471 started at Wed Nov 28 11:09:21 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5733: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23471 at Wed Nov 28 11:09:21 EST 2012
kill -USR1 23471
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23471 killed at Wed Nov 28 11:09:21 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:09:21 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:21 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23528 >/dev/null 2>/dev/null
selfserv with PID 23528 found at Wed Nov 28 11:09:21 EST 2012
selfserv with PID 23528 started at Wed Nov 28 11:09:21 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3: -w bogus -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #5734: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 23528 at Wed Nov 28 11:09:21 EST 2012
kill -USR1 23528
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23528 killed at Wed Nov 28 11:09:21 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:09:21 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:21 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23585 >/dev/null 2>/dev/null
selfserv with PID 23585 found at Wed Nov 28 11:09:21 EST 2012
selfserv with PID 23585 started at Wed Nov 28 11:09:21 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5735: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23585 at Wed Nov 28 11:09:21 EST 2012
kill -USR1 23585
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23585 killed at Wed Nov 28 11:09:21 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:09:21 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:21 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23642 >/dev/null 2>/dev/null
selfserv with PID 23642 found at Wed Nov 28 11:09:21 EST 2012
selfserv with PID 23642 started at Wed Nov 28 11:09:21 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w bogus -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5736: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23642 at Wed Nov 28 11:09:21 EST 2012
kill -USR1 23642
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23642 killed at Wed Nov 28 11:09:21 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:09:21 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:21 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23699 >/dev/null 2>/dev/null
selfserv with PID 23699 found at Wed Nov 28 11:09:21 EST 2012
selfserv with PID 23699 started at Wed Nov 28 11:09:21 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w nss -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5737: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23699 at Wed Nov 28 11:09:22 EST 2012
kill -USR1 23699
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23699 killed at Wed Nov 28 11:09:22 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:09:22 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:22 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23756 >/dev/null 2>/dev/null
selfserv with PID 23756 found at Wed Nov 28 11:09:22 EST 2012
selfserv with PID 23756 started at Wed Nov 28 11:09:22 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w bogus -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #5738: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 23756 at Wed Nov 28 11:09:22 EST 2012
kill -USR1 23756
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23756 killed at Wed Nov 28 11:09:22 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:09:22 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:22 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23813 >/dev/null 2>/dev/null
selfserv with PID 23813 found at Wed Nov 28 11:09:22 EST 2012
selfserv with PID 23813 started at Wed Nov 28 11:09:22 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w nss -n TestUser-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5739: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23813 at Wed Nov 28 11:09:22 EST 2012
kill -USR1 23813
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23813 killed at Wed Nov 28 11:09:22 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:09:22 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:22 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23870 >/dev/null 2>/dev/null
selfserv with PID 23870 found at Wed Nov 28 11:09:22 EST 2012
selfserv with PID 23870 started at Wed Nov 28 11:09:22 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5740: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23870 at Wed Nov 28 11:09:22 EST 2012
kill -USR1 23870
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23870 killed at Wed Nov 28 11:09:22 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:09:22 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:22 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23927 >/dev/null 2>/dev/null
selfserv with PID 23927 found at Wed Nov 28 11:09:22 EST 2012
selfserv with PID 23927 started at Wed Nov 28 11:09:22 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5741: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23927 at Wed Nov 28 11:09:22 EST 2012
kill -USR1 23927
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23927 killed at Wed Nov 28 11:09:22 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:09:22 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:22 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23984 >/dev/null 2>/dev/null
selfserv with PID 23984 found at Wed Nov 28 11:09:22 EST 2012
selfserv with PID 23984 started at Wed Nov 28 11:09:22 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #5742: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 23984 at Wed Nov 28 11:09:23 EST 2012
kill -USR1 23984
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23984 killed at Wed Nov 28 11:09:23 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:09:23 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:23 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24041 >/dev/null 2>/dev/null
selfserv with PID 24041 found at Wed Nov 28 11:09:23 EST 2012
selfserv with PID 24041 started at Wed Nov 28 11:09:23 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5743: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24041 at Wed Nov 28 11:09:23 EST 2012
kill -USR1 24041
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24041 killed at Wed Nov 28 11:09:23 EST 2012
ssl.sh: TLS Server hello response without SNI ----
selfserv starting at Wed Nov 28 11:09:23 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:23 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24119 >/dev/null 2>/dev/null
selfserv with PID 24119 found at Wed Nov 28 11:09:23 EST 2012
selfserv with PID 24119 started at Wed Nov 28 11:09:23 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5744: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24119 at Wed Nov 28 11:09:23 EST 2012
kill -USR1 24119
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24119 killed at Wed Nov 28 11:09:23 EST 2012
ssl.sh: TLS Server hello response with SNI ----
selfserv starting at Wed Nov 28 11:09:23 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:23 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24182 >/dev/null 2>/dev/null
selfserv with PID 24182 found at Wed Nov 28 11:09:23 EST 2012
selfserv with PID 24182 started at Wed Nov 28 11:09:23 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser -a buildnss02-sni.usersys.redhat.com  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02-sni.usersys.redhat.com,E=buildnss02-sni.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5745: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24182 at Wed Nov 28 11:09:23 EST 2012
kill -USR1 24182
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24182 killed at Wed Nov 28 11:09:23 EST 2012
ssl.sh: TLS Server response with alert ----
selfserv starting at Wed Nov 28 11:09:23 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:23 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24245 >/dev/null 2>/dev/null
selfserv with PID 24245 found at Wed Nov 28 11:09:23 EST 2012
selfserv with PID 24245 started at Wed Nov 28 11:09:23 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser -a buildnss02-sni1.usersys.redhat.com  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 254
ssl.sh: #5746: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24245 at Wed Nov 28 11:09:23 EST 2012
kill -USR1 24245
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24245 killed at Wed Nov 28 11:09:23 EST 2012
ssl.sh: SSL3 Server hello response without SNI ----
selfserv starting at Wed Nov 28 11:09:23 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:23 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24308 >/dev/null 2>/dev/null
selfserv with PID 24308 found at Wed Nov 28 11:09:23 EST 2012
selfserv with PID 24308 started at Wed Nov 28 11:09:23 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:ssl3 -w nss -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5747: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24308 at Wed Nov 28 11:09:24 EST 2012
kill -USR1 24308
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24308 killed at Wed Nov 28 11:09:24 EST 2012
ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ----
selfserv starting at Wed Nov 28 11:09:24 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:24 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24371 >/dev/null 2>/dev/null
selfserv with PID 24371 found at Wed Nov 28 11:09:24 EST 2012
selfserv with PID 24371 started at Wed Nov 28 11:09:24 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:ssl3 -w nss -n TestUser -a buildnss02-sni.usersys.redhat.com  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12271:
SSL peer cannot verify your certificate.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: authentication of server cert failed: Unable to communicate securely with peer: requested domain name does not match the server's certificate.
tstclnt: exiting with return code 254
ssl.sh: #5748: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24371 at Wed Nov 28 11:09:24 EST 2012
kill -USR1 24371
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24371 killed at Wed Nov 28 11:09:24 EST 2012
ssl.sh: TLS Server hello response without SNI ----
selfserv starting at Wed Nov 28 11:09:24 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:24 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24434 >/dev/null 2>/dev/null
selfserv with PID 24434 found at Wed Nov 28 11:09:24 EST 2012
selfserv with PID 24434 started at Wed Nov 28 11:09:24 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5749: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24434 at Wed Nov 28 11:09:24 EST 2012
kill -USR1 24434
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24434 killed at Wed Nov 28 11:09:24 EST 2012
ssl.sh: TLS Server hello response with SNI ----
selfserv starting at Wed Nov 28 11:09:24 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:24 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24497 >/dev/null 2>/dev/null
selfserv with PID 24497 found at Wed Nov 28 11:09:24 EST 2012
selfserv with PID 24497 started at Wed Nov 28 11:09:24 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser -a buildnss02-sni.usersys.redhat.com  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02-sni.usersys.redhat.com,E=buildnss02-sni.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02-sni.usersys.redhat.com,E=buildnss02-sni.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5750: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24497 at Wed Nov 28 11:09:24 EST 2012
kill -USR1 24497
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24497 killed at Wed Nov 28 11:09:24 EST 2012
ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ----
selfserv starting at Wed Nov 28 11:09:24 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:24 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24560 >/dev/null 2>/dev/null
selfserv with PID 24560 found at Wed Nov 28 11:09:24 EST 2012
selfserv with PID 24560 started at Wed Nov 28 11:09:24 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser -a buildnss02-sni.usersys.redhat.com -a buildnss02.usersys.redhat.com  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02-sni.usersys.redhat.com,E=buildnss02-sni.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: Cannot communicate securely with peer: no common encryption algorithm(s).
tstclnt: exiting with return code 1
ssl.sh: #5751: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24560 at Wed Nov 28 11:09:24 EST 2012
kill -USR1 24560
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24560 killed at Wed Nov 28 11:09:24 EST 2012
ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ----
selfserv starting at Wed Nov 28 11:09:24 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:24 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24623 >/dev/null 2>/dev/null
selfserv with PID 24623 found at Wed Nov 28 11:09:24 EST 2012
selfserv with PID 24623 started at Wed Nov 28 11:09:24 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser -a buildnss02-sni.usersys.redhat.com -a buildnss02-sni1.usersys.redhat.com  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02-sni.usersys.redhat.com,E=buildnss02-sni.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 1
ssl.sh: #5752: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24623 at Wed Nov 28 11:09:25 EST 2012
kill -USR1 24623
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24623 killed at Wed Nov 28 11:09:25 EST 2012
ssl.sh: TLS Server response with alert ----
selfserv starting at Wed Nov 28 11:09:25 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:25 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24686 >/dev/null 2>/dev/null
selfserv with PID 24686 found at Wed Nov 28 11:09:25 EST 2012
selfserv with PID 24686 started at Wed Nov 28 11:09:25 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser -a buildnss02-sni1.usersys.redhat.com  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 254
ssl.sh: #5753: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24686 at Wed Nov 28 11:09:25 EST 2012
kill -USR1 24686
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24686 killed at Wed Nov 28 11:09:25 EST 2012
ssl.sh: SSL Stress Test  - server bypass/client bypass  - with ECC ===============================
ssl.sh: Stress SSL2 RC4 128 with MD5 ----
selfserv starting at Wed Nov 28 11:09:25 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:25 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24818 >/dev/null 2>/dev/null
selfserv with PID 24818 found at Wed Nov 28 11:09:25 EST 2012
selfserv with PID 24818 started at Wed Nov 28 11:09:25 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 1000 -C A \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:09:25 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: SSL2 - 1 server certificates tested.
strsclnt completed at Wed Nov 28 11:09:25 EST 2012
ssl.sh: #5754: Stress SSL2 RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 24818 at Wed Nov 28 11:09:25 EST 2012
kill -USR1 24818
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24818 killed at Wed Nov 28 11:09:25 EST 2012
ssl.sh: Stress SSL3 RC4 128 with MD5 ----
selfserv starting at Wed Nov 28 11:09:25 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:25 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24894 >/dev/null 2>/dev/null
selfserv with PID 24894 found at Wed Nov 28 11:09:25 EST 2012
selfserv with PID 24894 started at Wed Nov 28 11:09:25 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 1000 -C c -V :ssl3 \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:09:25 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:09:25 EST 2012
ssl.sh: #5755: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 24894 at Wed Nov 28 11:09:25 EST 2012
kill -USR1 24894
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24894 killed at Wed Nov 28 11:09:25 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 ----
selfserv starting at Wed Nov 28 11:09:25 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:25 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24970 >/dev/null 2>/dev/null
selfserv with PID 24970 found at Wed Nov 28 11:09:25 EST 2012
selfserv with PID 24970 started at Wed Nov 28 11:09:25 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 1000 -C c \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:09:25 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:09:26 EST 2012
ssl.sh: #5756: Stress TLS  RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 24970 at Wed Nov 28 11:09:26 EST 2012
kill -USR1 24970
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24970 killed at Wed Nov 28 11:09:26 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (false start) ----
selfserv starting at Wed Nov 28 11:09:26 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:26 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25046 >/dev/null 2>/dev/null
selfserv with PID 25046 found at Wed Nov 28 11:09:26 EST 2012
selfserv with PID 25046 started at Wed Nov 28 11:09:26 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 1000 -C c -g \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:09:26 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:09:26 EST 2012
ssl.sh: #5757: Stress TLS  RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 25046 at Wed Nov 28 11:09:26 EST 2012
kill -USR1 25046
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25046 killed at Wed Nov 28 11:09:26 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket) ----
selfserv starting at Wed Nov 28 11:09:26 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:26 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25122 >/dev/null 2>/dev/null
selfserv with PID 25122 found at Wed Nov 28 11:09:26 EST 2012
selfserv with PID 25122 started at Wed Nov 28 11:09:26 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:09:26 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Wed Nov 28 11:09:26 EST 2012
ssl.sh: #5758: Stress TLS  RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 25122 at Wed Nov 28 11:09:26 EST 2012
kill -USR1 25122
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25122 killed at Wed Nov 28 11:09:26 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (compression) ----
selfserv starting at Wed Nov 28 11:09:26 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:26 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25198 >/dev/null 2>/dev/null
selfserv with PID 25198 found at Wed Nov 28 11:09:26 EST 2012
selfserv with PID 25198 started at Wed Nov 28 11:09:26 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -z \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:09:26 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:09:27 EST 2012
ssl.sh: #5759: Stress TLS  RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 25198 at Wed Nov 28 11:09:27 EST 2012
kill -USR1 25198
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25198 killed at Wed Nov 28 11:09:27 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression) ----
selfserv starting at Wed Nov 28 11:09:27 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:27 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25274 >/dev/null 2>/dev/null
selfserv with PID 25274 found at Wed Nov 28 11:09:27 EST 2012
selfserv with PID 25274 started at Wed Nov 28 11:09:27 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u -z \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:09:27 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Wed Nov 28 11:09:27 EST 2012
ssl.sh: #5760: Stress TLS  RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 25274 at Wed Nov 28 11:09:27 EST 2012
kill -USR1 25274
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25274 killed at Wed Nov 28 11:09:27 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) ----
selfserv starting at Wed Nov 28 11:09:27 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:27 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25350 >/dev/null 2>/dev/null
selfserv with PID 25350 found at Wed Nov 28 11:09:27 EST 2012
selfserv with PID 25350 started at Wed Nov 28 11:09:27 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:09:27 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Wed Nov 28 11:09:27 EST 2012
ssl.sh: #5761: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 25350 at Wed Nov 28 11:09:27 EST 2012
kill -USR1 25350
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25350 killed at Wed Nov 28 11:09:27 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI) ----
selfserv starting at Wed Nov 28 11:09:28 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:28 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25432 >/dev/null 2>/dev/null
selfserv with PID 25432 found at Wed Nov 28 11:09:28 EST 2012
selfserv with PID 25432 started at Wed Nov 28 11:09:28 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:09:28 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Wed Nov 28 11:09:28 EST 2012
ssl.sh: #5762: Stress TLS RC4 128 with MD5 (session ticket, SNI) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 25432 at Wed Nov 28 11:09:28 EST 2012
kill -USR1 25432
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25432 killed at Wed Nov 28 11:09:28 EST 2012
ssl.sh: Stress SSL2 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Wed Nov 28 11:09:28 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:28 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25529 >/dev/null 2>/dev/null
selfserv with PID 25529 found at Wed Nov 28 11:09:28 EST 2012
selfserv with PID 25529 started at Wed Nov 28 11:09:28 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 100 -C A -N -n TestUser \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:09:28 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: SSL2 - 100 server certificates tested.
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed Nov 28 11:09:29 EST 2012
ssl.sh: #5763: Stress SSL2 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 25529 at Wed Nov 28 11:09:29 EST 2012
kill -USR1 25529
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25529 killed at Wed Nov 28 11:09:29 EST 2012
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Wed Nov 28 11:09:29 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:29 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25604 >/dev/null 2>/dev/null
selfserv with PID 25604 found at Wed Nov 28 11:09:29 EST 2012
selfserv with PID 25604 started at Wed Nov 28 11:09:29 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 100 -C c -V :ssl3 -N -n TestUser \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:09:29 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed Nov 28 11:09:29 EST 2012
ssl.sh: #5764: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 25604 at Wed Nov 28 11:09:29 EST 2012
kill -USR1 25604
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25604 killed at Wed Nov 28 11:09:29 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Wed Nov 28 11:09:29 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:29 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25679 >/dev/null 2>/dev/null
selfserv with PID 25679 found at Wed Nov 28 11:09:29 EST 2012
selfserv with PID 25679 started at Wed Nov 28 11:09:29 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 100 -C c -N -n TestUser \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:09:29 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed Nov 28 11:09:29 EST 2012
ssl.sh: #5765: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 25679 at Wed Nov 28 11:09:29 EST 2012
kill -USR1 25679
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25679 killed at Wed Nov 28 11:09:29 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Wed Nov 28 11:09:29 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:29 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25754 >/dev/null 2>/dev/null
selfserv with PID 25754 found at Wed Nov 28 11:09:29 EST 2012
selfserv with PID 25754 started at Wed Nov 28 11:09:29 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:09:29 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Wed Nov 28 11:09:30 EST 2012
ssl.sh: #5766: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 25754 at Wed Nov 28 11:09:30 EST 2012
kill -USR1 25754
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25754 killed at Wed Nov 28 11:09:30 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Wed Nov 28 11:09:30 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:30 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25830 >/dev/null 2>/dev/null
selfserv with PID 25830 found at Wed Nov 28 11:09:30 EST 2012
selfserv with PID 25830 started at Wed Nov 28 11:09:30 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -z \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:09:30 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:09:30 EST 2012
ssl.sh: #5767: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 25830 at Wed Nov 28 11:09:30 EST 2012
kill -USR1 25830
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25830 killed at Wed Nov 28 11:09:30 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Wed Nov 28 11:09:30 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:30 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25906 >/dev/null 2>/dev/null
selfserv with PID 25906 found at Wed Nov 28 11:09:30 EST 2012
selfserv with PID 25906 started at Wed Nov 28 11:09:30 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:09:30 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:09:30 EST 2012
ssl.sh: #5768: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 25906 at Wed Nov 28 11:09:30 EST 2012
kill -USR1 25906
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25906 killed at Wed Nov 28 11:09:30 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Wed Nov 28 11:09:30 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:30 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25982 >/dev/null 2>/dev/null
selfserv with PID 25982 found at Wed Nov 28 11:09:30 EST 2012
selfserv with PID 25982 started at Wed Nov 28 11:09:30 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u -z \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:09:30 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Wed Nov 28 11:09:30 EST 2012
ssl.sh: #5769: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 25982 at Wed Nov 28 11:09:30 EST 2012
kill -USR1 25982
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25982 killed at Wed Nov 28 11:09:30 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Wed Nov 28 11:09:30 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:30 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 26058 >/dev/null 2>/dev/null
selfserv with PID 26058 found at Wed Nov 28 11:09:30 EST 2012
selfserv with PID 26058 started at Wed Nov 28 11:09:30 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:09:30 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Wed Nov 28 11:09:31 EST 2012
ssl.sh: #5770: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26058 at Wed Nov 28 11:09:31 EST 2012
kill -USR1 26058
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 26058 killed at Wed Nov 28 11:09:31 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ----
selfserv starting at Wed Nov 28 11:09:31 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:31 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 26140 >/dev/null 2>/dev/null
selfserv with PID 26140 found at Wed Nov 28 11:09:31 EST 2012
selfserv with PID 26140 started at Wed Nov 28 11:09:31 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:09:31 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Wed Nov 28 11:09:31 EST 2012
ssl.sh: #5771: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26140 at Wed Nov 28 11:09:31 EST 2012
kill -USR1 26140
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 26140 killed at Wed Nov 28 11:09:31 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ----
selfserv starting at Wed Nov 28 11:09:31 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -a buildnss02-sni.usersys.redhat.com -k buildnss02-sni.usersys.redhat.com -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:31 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 26222 >/dev/null 2>/dev/null
selfserv with PID 26222 found at Wed Nov 28 11:09:31 EST 2012
selfserv with PID 26222 started at Wed Nov 28 11:09:31 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u -a buildnss02-sni.usersys.redhat.com \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:09:31 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Wed Nov 28 11:09:31 EST 2012
ssl.sh: #5772: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26222 at Wed Nov 28 11:09:31 EST 2012
kill -USR1 26222
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 26222 killed at Wed Nov 28 11:09:31 EST 2012
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Wed Nov 28 11:09:31 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C009 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:31 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 26319 >/dev/null 2>/dev/null
selfserv with PID 26319 found at Wed Nov 28 11:09:31 EST 2012
selfserv with PID 26319 started at Wed Nov 28 11:09:31 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 100 -C :C009 -N -V :ssl3 \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:09:31 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed Nov 28 11:09:32 EST 2012
ssl.sh: #5773: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26319 at Wed Nov 28 11:09:32 EST 2012
kill -USR1 26319
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 26319 killed at Wed Nov 28 11:09:32 EST 2012
ssl.sh: Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Wed Nov 28 11:09:32 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C013 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:32 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 26394 >/dev/null 2>/dev/null
selfserv with PID 26394 found at Wed Nov 28 11:09:32 EST 2012
selfserv with PID 26394 started at Wed Nov 28 11:09:32 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 1000 -C :C013 -V :ssl3 \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:09:32 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:09:32 EST 2012
ssl.sh: #5774: Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26394 at Wed Nov 28 11:09:32 EST 2012
kill -USR1 26394
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 26394 killed at Wed Nov 28 11:09:32 EST 2012
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) ----
selfserv starting at Wed Nov 28 11:09:32 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C004 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:32 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 26470 >/dev/null 2>/dev/null
selfserv with PID 26470 found at Wed Nov 28 11:09:32 EST 2012
selfserv with PID 26470 started at Wed Nov 28 11:09:32 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C004 -N \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:09:32 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed Nov 28 11:09:33 EST 2012
ssl.sh: #5775: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26470 at Wed Nov 28 11:09:33 EST 2012
kill -USR1 26470
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 26470 killed at Wed Nov 28 11:09:33 EST 2012
ssl.sh: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) ----
selfserv starting at Wed Nov 28 11:09:33 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c :C00E -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:33 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 26546 >/dev/null 2>/dev/null
selfserv with PID 26546 found at Wed Nov 28 11:09:33 EST 2012
selfserv with PID 26546 started at Wed Nov 28 11:09:33 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C00E -N \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:09:33 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed Nov 28 11:09:34 EST 2012
ssl.sh: #5776: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26546 at Wed Nov 28 11:09:34 EST 2012
kill -USR1 26546
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 26546 killed at Wed Nov 28 11:09:34 EST 2012
ssl.sh: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Wed Nov 28 11:09:34 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C013 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:34 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 26621 >/dev/null 2>/dev/null
selfserv with PID 26621 found at Wed Nov 28 11:09:34 EST 2012
selfserv with PID 26621 started at Wed Nov 28 11:09:34 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :C013 \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:09:34 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:09:35 EST 2012
ssl.sh: #5777: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26621 at Wed Nov 28 11:09:35 EST 2012
kill -USR1 26621
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 26621 killed at Wed Nov 28 11:09:35 EST 2012
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) ----
selfserv starting at Wed Nov 28 11:09:35 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C004 -u -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:35 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 26697 >/dev/null 2>/dev/null
selfserv with PID 26697 found at Wed Nov 28 11:09:35 EST 2012
selfserv with PID 26697 started at Wed Nov 28 11:09:35 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :C004 -u \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:09:35 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Wed Nov 28 11:09:35 EST 2012
ssl.sh: #5778: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26697 at Wed Nov 28 11:09:35 EST 2012
kill -USR1 26697
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 26697 killed at Wed Nov 28 11:09:35 EST 2012
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Wed Nov 28 11:09:35 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C009 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:35 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 26794 >/dev/null 2>/dev/null
selfserv with PID 26794 found at Wed Nov 28 11:09:35 EST 2012
selfserv with PID 26794 started at Wed Nov 28 11:09:35 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 10 -C :C009 -N -V :ssl3 -n TestUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:09:35 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Wed Nov 28 11:09:35 EST 2012
ssl.sh: #5779: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26794 at Wed Nov 28 11:09:35 EST 2012
kill -USR1 26794
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 26794 killed at Wed Nov 28 11:09:35 EST 2012
ssl.sh: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) ----
selfserv starting at Wed Nov 28 11:09:35 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:35 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 26869 >/dev/null 2>/dev/null
selfserv with PID 26869 found at Wed Nov 28 11:09:35 EST 2012
selfserv with PID 26869 started at Wed Nov 28 11:09:35 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 100 -C :C013 -V :ssl3 -n TestUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:09:35 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:09:36 EST 2012
ssl.sh: #5780: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26869 at Wed Nov 28 11:09:36 EST 2012
kill -USR1 26869
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 26869 killed at Wed Nov 28 11:09:36 EST 2012
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Wed Nov 28 11:09:36 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C004 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:36 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 26945 >/dev/null 2>/dev/null
selfserv with PID 26945 found at Wed Nov 28 11:09:36 EST 2012
selfserv with PID 26945 started at Wed Nov 28 11:09:36 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 10 -C :C004 -N -n TestUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:09:36 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Wed Nov 28 11:09:36 EST 2012
ssl.sh: #5781: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26945 at Wed Nov 28 11:09:36 EST 2012
kill -USR1 26945
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 26945 killed at Wed Nov 28 11:09:36 EST 2012
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Wed Nov 28 11:09:36 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -r -r -c :C00E -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:36 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 27020 >/dev/null 2>/dev/null
selfserv with PID 27020 found at Wed Nov 28 11:09:36 EST 2012
selfserv with PID 27020 started at Wed Nov 28 11:09:36 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 10 -C :C00E -N -n TestUser-ecmixed \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:09:36 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Wed Nov 28 11:09:36 EST 2012
ssl.sh: #5782: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27020 at Wed Nov 28 11:09:36 EST 2012
kill -USR1 27020
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 27020 killed at Wed Nov 28 11:09:36 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ----
selfserv starting at Wed Nov 28 11:09:36 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:36 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 27095 >/dev/null 2>/dev/null
selfserv with PID 27095 found at Wed Nov 28 11:09:36 EST 2012
selfserv with PID 27095 started at Wed Nov 28 11:09:36 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 100 -C :C013 -n TestUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:09:36 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:09:36 EST 2012
ssl.sh: #5783: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27095 at Wed Nov 28 11:09:36 EST 2012
kill -USR1 27095
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 27095 killed at Wed Nov 28 11:09:36 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ----
selfserv starting at Wed Nov 28 11:09:37 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -u -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 27171 >/dev/null 2>/dev/null
selfserv with PID 27171 found at Wed Nov 28 11:09:37 EST 2012
selfserv with PID 27171 started at Wed Nov 28 11:09:37 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec -u \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:09:37 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Wed Nov 28 11:09:37 EST 2012
ssl.sh: #5784: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27171 at Wed Nov 28 11:09:37 EST 2012
kill -USR1 27171
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 27171 killed at Wed Nov 28 11:09:37 EST 2012
ssl.sh: SSL Cipher Coverage Extended Test - server bypass/client bypass  - with ECC ===============================
selfserv starting at Wed Nov 28 11:09:37 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 27234 >/dev/null 2>/dev/null
selfserv with PID 27234 found at Wed Nov 28 11:09:37 EST 2012
selfserv with PID 27234 started at Wed Nov 28 11:09:37 EST 2012
ssl.sh: skipping  SSL2_RC4_128_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC2_128_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_DES_64_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_DES_192_EDE3_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC2_128_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_DES_64_CBC_WITH_MD5 for Extended Test
ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 27234 >/dev/null 2>/dev/null
selfserv with PID 27234 found at Wed Nov 28 11:09:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c c -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5785: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 27234 >/dev/null 2>/dev/null
selfserv with PID 27234 found at Wed Nov 28 11:09:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c d -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5786: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 27234 >/dev/null 2>/dev/null
selfserv with PID 27234 found at Wed Nov 28 11:09:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c e -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5787: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 27234 >/dev/null 2>/dev/null
selfserv with PID 27234 found at Wed Nov 28 11:09:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c f -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5788: SSL3_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 27234 >/dev/null 2>/dev/null
selfserv with PID 27234 found at Wed Nov 28 11:09:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c g -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5789: SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ----------------------------
kill -0 27234 >/dev/null 2>/dev/null
selfserv with PID 27234 found at Wed Nov 28 11:09:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c i -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5790: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 27234 >/dev/null 2>/dev/null
selfserv with PID 27234 found at Wed Nov 28 11:09:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c j -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5791: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 27234 >/dev/null 2>/dev/null
selfserv with PID 27234 found at Wed Nov 28 11:09:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c k -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5792: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 27234 >/dev/null 2>/dev/null
selfserv with PID 27234 found at Wed Nov 28 11:09:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c l -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5793: SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 27234 >/dev/null 2>/dev/null
selfserv with PID 27234 found at Wed Nov 28 11:09:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c m -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5794: SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 27234 >/dev/null 2>/dev/null
selfserv with PID 27234 found at Wed Nov 28 11:09:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c n -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5795: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 27234 >/dev/null 2>/dev/null
selfserv with PID 27234 found at Wed Nov 28 11:09:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c v -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5796: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 27234 >/dev/null 2>/dev/null
selfserv with PID 27234 found at Wed Nov 28 11:09:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c y -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5797: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_SHA ----------------------------
kill -0 27234 >/dev/null 2>/dev/null
selfserv with PID 27234 found at Wed Nov 28 11:09:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c z -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5798: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 27234 >/dev/null 2>/dev/null
selfserv with PID 27234 found at Wed Nov 28 11:09:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c c -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5799: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 27234 >/dev/null 2>/dev/null
selfserv with PID 27234 found at Wed Nov 28 11:09:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c d -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5800: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 27234 >/dev/null 2>/dev/null
selfserv with PID 27234 found at Wed Nov 28 11:09:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c e -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5801: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 27234 >/dev/null 2>/dev/null
selfserv with PID 27234 found at Wed Nov 28 11:09:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c f -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5802: TLS_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 27234 >/dev/null 2>/dev/null
selfserv with PID 27234 found at Wed Nov 28 11:09:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c g -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5803: TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_MD5 ----------------------------
kill -0 27234 >/dev/null 2>/dev/null
selfserv with PID 27234 found at Wed Nov 28 11:09:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c i -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5804: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 27234 >/dev/null 2>/dev/null
selfserv with PID 27234 found at Wed Nov 28 11:09:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c j -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5805: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 27234 >/dev/null 2>/dev/null
selfserv with PID 27234 found at Wed Nov 28 11:09:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c k -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5806: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 27234 >/dev/null 2>/dev/null
selfserv with PID 27234 found at Wed Nov 28 11:09:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c l -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5807: TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 27234 >/dev/null 2>/dev/null
selfserv with PID 27234 found at Wed Nov 28 11:09:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c m -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5808: TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 27234 >/dev/null 2>/dev/null
selfserv with PID 27234 found at Wed Nov 28 11:09:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c n -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5809: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 27234 >/dev/null 2>/dev/null
selfserv with PID 27234 found at Wed Nov 28 11:09:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c v -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5810: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 27234 >/dev/null 2>/dev/null
selfserv with PID 27234 found at Wed Nov 28 11:09:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c y -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5811: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_SHA ----------------------------
kill -0 27234 >/dev/null 2>/dev/null
selfserv with PID 27234 found at Wed Nov 28 11:09:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c z -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5812: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 27234 >/dev/null 2>/dev/null
selfserv with PID 27234 found at Wed Nov 28 11:09:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c c -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5813: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 27234 >/dev/null 2>/dev/null
selfserv with PID 27234 found at Wed Nov 28 11:09:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c d -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5814: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 27234 >/dev/null 2>/dev/null
selfserv with PID 27234 found at Wed Nov 28 11:09:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c e -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5815: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ----------------------------
kill -0 27234 >/dev/null 2>/dev/null
selfserv with PID 27234 found at Wed Nov 28 11:09:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c i -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5816: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 27234 >/dev/null 2>/dev/null
selfserv with PID 27234 found at Wed Nov 28 11:09:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c j -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5817: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 27234 >/dev/null 2>/dev/null
selfserv with PID 27234 found at Wed Nov 28 11:09:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c k -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5818: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 27234 >/dev/null 2>/dev/null
selfserv with PID 27234 found at Wed Nov 28 11:09:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c l -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5819: TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 27234 >/dev/null 2>/dev/null
selfserv with PID 27234 found at Wed Nov 28 11:09:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c m -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5820: TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 27234 >/dev/null 2>/dev/null
selfserv with PID 27234 found at Wed Nov 28 11:09:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c n -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5821: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 27234 >/dev/null 2>/dev/null
selfserv with PID 27234 found at Wed Nov 28 11:09:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c v -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5822: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 27234 >/dev/null 2>/dev/null
selfserv with PID 27234 found at Wed Nov 28 11:09:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c y -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5823: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_SHA ----------------------------
kill -0 27234 >/dev/null 2>/dev/null
selfserv with PID 27234 found at Wed Nov 28 11:09:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c z -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5824: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 27234 >/dev/null 2>/dev/null
selfserv with PID 27234 found at Wed Nov 28 11:09:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5825: SSL3_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 27234 >/dev/null 2>/dev/null
selfserv with PID 27234 found at Wed Nov 28 11:09:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5826: SSL3_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 27234 >/dev/null 2>/dev/null
selfserv with PID 27234 found at Wed Nov 28 11:09:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5827: SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 27234 >/dev/null 2>/dev/null
selfserv with PID 27234 found at Wed Nov 28 11:09:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5828: SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 27234 >/dev/null 2>/dev/null
selfserv with PID 27234 found at Wed Nov 28 11:09:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5829: SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 27234 >/dev/null 2>/dev/null
selfserv with PID 27234 found at Wed Nov 28 11:09:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5830: SSL3_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 27234 >/dev/null 2>/dev/null
selfserv with PID 27234 found at Wed Nov 28 11:09:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5831: SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 27234 >/dev/null 2>/dev/null
selfserv with PID 27234 found at Wed Nov 28 11:09:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5832: SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 27234 >/dev/null 2>/dev/null
selfserv with PID 27234 found at Wed Nov 28 11:09:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5833: SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 27234 >/dev/null 2>/dev/null
selfserv with PID 27234 found at Wed Nov 28 11:09:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5834: SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 27234 at Wed Nov 28 11:09:40 EST 2012
kill -USR1 27234
selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 27234 killed at Wed Nov 28 11:09:40 EST 2012
ssl.sh: SSL3_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Wed Nov 28 11:09:40 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 28653 >/dev/null 2>/dev/null
selfserv with PID 28653 found at Wed Nov 28 11:09:40 EST 2012
selfserv with PID 28653 started at Wed Nov 28 11:09:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5835: SSL3_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 28653 >/dev/null 2>/dev/null
selfserv with PID 28653 found at Wed Nov 28 11:09:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5836: SSL3_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 28653 >/dev/null 2>/dev/null
selfserv with PID 28653 found at Wed Nov 28 11:09:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5837: SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 28653 >/dev/null 2>/dev/null
selfserv with PID 28653 found at Wed Nov 28 11:09:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5838: SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 28653 >/dev/null 2>/dev/null
selfserv with PID 28653 found at Wed Nov 28 11:09:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5839: SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 28653 at Wed Nov 28 11:09:41 EST 2012
kill -USR1 28653
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 28653 killed at Wed Nov 28 11:09:41 EST 2012
ssl.sh: SSL3_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Wed Nov 28 11:09:41 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 28801 >/dev/null 2>/dev/null
selfserv with PID 28801 found at Wed Nov 28 11:09:41 EST 2012
selfserv with PID 28801 started at Wed Nov 28 11:09:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5840: SSL3_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 28801 >/dev/null 2>/dev/null
selfserv with PID 28801 found at Wed Nov 28 11:09:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5841: SSL3_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 28801 >/dev/null 2>/dev/null
selfserv with PID 28801 found at Wed Nov 28 11:09:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5842: SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 28801 >/dev/null 2>/dev/null
selfserv with PID 28801 found at Wed Nov 28 11:09:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5843: SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 28801 >/dev/null 2>/dev/null
selfserv with PID 28801 found at Wed Nov 28 11:09:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5844: SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 28801 >/dev/null 2>/dev/null
selfserv with PID 28801 found at Wed Nov 28 11:09:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5845: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 28801 >/dev/null 2>/dev/null
selfserv with PID 28801 found at Wed Nov 28 11:09:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5846: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 28801 >/dev/null 2>/dev/null
selfserv with PID 28801 found at Wed Nov 28 11:09:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5847: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 28801 >/dev/null 2>/dev/null
selfserv with PID 28801 found at Wed Nov 28 11:09:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5848: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 28801 >/dev/null 2>/dev/null
selfserv with PID 28801 found at Wed Nov 28 11:09:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5849: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 28801 >/dev/null 2>/dev/null
selfserv with PID 28801 found at Wed Nov 28 11:09:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5850: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 28801 >/dev/null 2>/dev/null
selfserv with PID 28801 found at Wed Nov 28 11:09:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5851: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 28801 >/dev/null 2>/dev/null
selfserv with PID 28801 found at Wed Nov 28 11:09:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5852: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 28801 >/dev/null 2>/dev/null
selfserv with PID 28801 found at Wed Nov 28 11:09:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5853: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 28801 >/dev/null 2>/dev/null
selfserv with PID 28801 found at Wed Nov 28 11:09:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5854: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 28801 at Wed Nov 28 11:09:42 EST 2012
kill -USR1 28801
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 28801 killed at Wed Nov 28 11:09:42 EST 2012
ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Wed Nov 28 11:09:42 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 29200 >/dev/null 2>/dev/null
selfserv with PID 29200 found at Wed Nov 28 11:09:42 EST 2012
selfserv with PID 29200 started at Wed Nov 28 11:09:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5855: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 29200 >/dev/null 2>/dev/null
selfserv with PID 29200 found at Wed Nov 28 11:09:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5856: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 29200 >/dev/null 2>/dev/null
selfserv with PID 29200 found at Wed Nov 28 11:09:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5857: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 29200 >/dev/null 2>/dev/null
selfserv with PID 29200 found at Wed Nov 28 11:09:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5858: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 29200 >/dev/null 2>/dev/null
selfserv with PID 29200 found at Wed Nov 28 11:09:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5859: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 29200 at Wed Nov 28 11:09:42 EST 2012
kill -USR1 29200
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 29200 killed at Wed Nov 28 11:09:42 EST 2012
ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Wed Nov 28 11:09:42 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 29348 >/dev/null 2>/dev/null
selfserv with PID 29348 found at Wed Nov 28 11:09:43 EST 2012
selfserv with PID 29348 started at Wed Nov 28 11:09:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5860: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 29348 >/dev/null 2>/dev/null
selfserv with PID 29348 found at Wed Nov 28 11:09:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5861: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 29348 >/dev/null 2>/dev/null
selfserv with PID 29348 found at Wed Nov 28 11:09:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5862: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 29348 >/dev/null 2>/dev/null
selfserv with PID 29348 found at Wed Nov 28 11:09:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5863: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 29348 >/dev/null 2>/dev/null
selfserv with PID 29348 found at Wed Nov 28 11:09:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5864: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 29348 >/dev/null 2>/dev/null
selfserv with PID 29348 found at Wed Nov 28 11:09:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5865: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 29348 >/dev/null 2>/dev/null
selfserv with PID 29348 found at Wed Nov 28 11:09:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5866: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 29348 >/dev/null 2>/dev/null
selfserv with PID 29348 found at Wed Nov 28 11:09:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5867: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 29348 >/dev/null 2>/dev/null
selfserv with PID 29348 found at Wed Nov 28 11:09:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5868: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 29348 >/dev/null 2>/dev/null
selfserv with PID 29348 found at Wed Nov 28 11:09:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5869: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 29348 >/dev/null 2>/dev/null
selfserv with PID 29348 found at Wed Nov 28 11:09:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5870: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 29348 >/dev/null 2>/dev/null
selfserv with PID 29348 found at Wed Nov 28 11:09:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5871: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 29348 >/dev/null 2>/dev/null
selfserv with PID 29348 found at Wed Nov 28 11:09:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5872: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 29348 >/dev/null 2>/dev/null
selfserv with PID 29348 found at Wed Nov 28 11:09:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5873: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 29348 >/dev/null 2>/dev/null
selfserv with PID 29348 found at Wed Nov 28 11:09:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5874: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 29348 at Wed Nov 28 11:09:44 EST 2012
kill -USR1 29348
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 29348 killed at Wed Nov 28 11:09:44 EST 2012
ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Wed Nov 28 11:09:44 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 29733 >/dev/null 2>/dev/null
selfserv with PID 29733 found at Wed Nov 28 11:09:44 EST 2012
selfserv with PID 29733 started at Wed Nov 28 11:09:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5875: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 29733 >/dev/null 2>/dev/null
selfserv with PID 29733 found at Wed Nov 28 11:09:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5876: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 29733 >/dev/null 2>/dev/null
selfserv with PID 29733 found at Wed Nov 28 11:09:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5877: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 29733 >/dev/null 2>/dev/null
selfserv with PID 29733 found at Wed Nov 28 11:09:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5878: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 29733 >/dev/null 2>/dev/null
selfserv with PID 29733 found at Wed Nov 28 11:09:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5879: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 29733 at Wed Nov 28 11:09:44 EST 2012
kill -USR1 29733
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 29733 killed at Wed Nov 28 11:09:44 EST 2012
ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Wed Nov 28 11:09:44 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 29881 >/dev/null 2>/dev/null
selfserv with PID 29881 found at Wed Nov 28 11:09:44 EST 2012
selfserv with PID 29881 started at Wed Nov 28 11:09:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5880: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 29881 >/dev/null 2>/dev/null
selfserv with PID 29881 found at Wed Nov 28 11:09:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5881: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 29881 >/dev/null 2>/dev/null
selfserv with PID 29881 found at Wed Nov 28 11:09:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5882: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 29881 >/dev/null 2>/dev/null
selfserv with PID 29881 found at Wed Nov 28 11:09:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5883: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 29881 >/dev/null 2>/dev/null
selfserv with PID 29881 found at Wed Nov 28 11:09:45 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5884: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 29881 at Wed Nov 28 11:09:45 EST 2012
kill -USR1 29881
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 29881 killed at Wed Nov 28 11:09:45 EST 2012
ssl.sh: SSL Client Authentication Extended Test - server bypass/client bypass  - with ECC ===============================
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:09:45 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:45 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 30080 >/dev/null 2>/dev/null
selfserv with PID 30080 found at Wed Nov 28 11:09:45 EST 2012
selfserv with PID 30080 started at Wed Nov 28 11:09:45 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5885: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30080 at Wed Nov 28 11:09:45 EST 2012
kill -USR1 30080
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 30080 killed at Wed Nov 28 11:09:45 EST 2012
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Wed Nov 28 11:09:45 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:45 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 30137 >/dev/null 2>/dev/null
selfserv with PID 30137 found at Wed Nov 28 11:09:45 EST 2012
selfserv with PID 30137 started at Wed Nov 28 11:09:45 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -w bogus -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5886: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30137 at Wed Nov 28 11:09:45 EST 2012
kill -USR1 30137
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 30137 killed at Wed Nov 28 11:09:45 EST 2012
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Wed Nov 28 11:09:45 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:45 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 30194 >/dev/null 2>/dev/null
selfserv with PID 30194 found at Wed Nov 28 11:09:45 EST 2012
selfserv with PID 30194 started at Wed Nov 28 11:09:45 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -w nss -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5887: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30194 at Wed Nov 28 11:09:45 EST 2012
kill -USR1 30194
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 30194 killed at Wed Nov 28 11:09:45 EST 2012
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:09:45 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:45 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 30251 >/dev/null 2>/dev/null
selfserv with PID 30251 found at Wed Nov 28 11:09:45 EST 2012
selfserv with PID 30251 started at Wed Nov 28 11:09:45 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #5888: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 30251 at Wed Nov 28 11:09:45 EST 2012
kill -USR1 30251
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 30251 killed at Wed Nov 28 11:09:45 EST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Wed Nov 28 11:09:45 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:45 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 30308 >/dev/null 2>/dev/null
selfserv with PID 30308 found at Wed Nov 28 11:09:45 EST 2012
selfserv with PID 30308 started at Wed Nov 28 11:09:45 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -w bogus -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #5889: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 30308 at Wed Nov 28 11:09:46 EST 2012
kill -USR1 30308
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 30308 killed at Wed Nov 28 11:09:46 EST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Wed Nov 28 11:09:46 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 30365 >/dev/null 2>/dev/null
selfserv with PID 30365 found at Wed Nov 28 11:09:46 EST 2012
selfserv with PID 30365 started at Wed Nov 28 11:09:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -w nss -n ExtendedSSLUser   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5890: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30365 at Wed Nov 28 11:09:46 EST 2012
kill -USR1 30365
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 30365 killed at Wed Nov 28 11:09:46 EST 2012
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:09:46 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 30422 >/dev/null 2>/dev/null
selfserv with PID 30422 found at Wed Nov 28 11:09:46 EST 2012
selfserv with PID 30422 started at Wed Nov 28 11:09:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5891: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30422 at Wed Nov 28 11:09:46 EST 2012
kill -USR1 30422
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 30422 killed at Wed Nov 28 11:09:46 EST 2012
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Wed Nov 28 11:09:46 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 30479 >/dev/null 2>/dev/null
selfserv with PID 30479 found at Wed Nov 28 11:09:46 EST 2012
selfserv with PID 30479 started at Wed Nov 28 11:09:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V :ssl3 -n ExtendedSSLUser -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5892: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30479 at Wed Nov 28 11:09:46 EST 2012
kill -USR1 30479
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 30479 killed at Wed Nov 28 11:09:46 EST 2012
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Wed Nov 28 11:09:46 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 30536 >/dev/null 2>/dev/null
selfserv with PID 30536 found at Wed Nov 28 11:09:46 EST 2012
selfserv with PID 30536 started at Wed Nov 28 11:09:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V :ssl3 -n ExtendedSSLUser -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5893: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30536 at Wed Nov 28 11:09:46 EST 2012
kill -USR1 30536
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 30536 killed at Wed Nov 28 11:09:46 EST 2012
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:09:46 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 30593 >/dev/null 2>/dev/null
selfserv with PID 30593 found at Wed Nov 28 11:09:46 EST 2012
selfserv with PID 30593 started at Wed Nov 28 11:09:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #5894: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 30593 at Wed Nov 28 11:09:46 EST 2012
kill -USR1 30593
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 30593 killed at Wed Nov 28 11:09:46 EST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Wed Nov 28 11:09:46 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 30650 >/dev/null 2>/dev/null
selfserv with PID 30650 found at Wed Nov 28 11:09:46 EST 2012
selfserv with PID 30650 started at Wed Nov 28 11:09:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V :ssl3 -n ExtendedSSLUser -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #5895: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 30650 at Wed Nov 28 11:09:47 EST 2012
kill -USR1 30650
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 30650 killed at Wed Nov 28 11:09:47 EST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Wed Nov 28 11:09:47 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 30707 >/dev/null 2>/dev/null
selfserv with PID 30707 found at Wed Nov 28 11:09:47 EST 2012
selfserv with PID 30707 started at Wed Nov 28 11:09:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V :ssl3 -n ExtendedSSLUser -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5896: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30707 at Wed Nov 28 11:09:47 EST 2012
kill -USR1 30707
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 30707 killed at Wed Nov 28 11:09:47 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:09:47 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 30764 >/dev/null 2>/dev/null
selfserv with PID 30764 found at Wed Nov 28 11:09:47 EST 2012
selfserv with PID 30764 started at Wed Nov 28 11:09:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5897: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30764 at Wed Nov 28 11:09:47 EST 2012
kill -USR1 30764
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 30764 killed at Wed Nov 28 11:09:47 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:09:47 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 30821 >/dev/null 2>/dev/null
selfserv with PID 30821 found at Wed Nov 28 11:09:47 EST 2012
selfserv with PID 30821 started at Wed Nov 28 11:09:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3: -w bogus -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5898: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30821 at Wed Nov 28 11:09:47 EST 2012
kill -USR1 30821
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 30821 killed at Wed Nov 28 11:09:47 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:09:47 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 30878 >/dev/null 2>/dev/null
selfserv with PID 30878 found at Wed Nov 28 11:09:47 EST 2012
selfserv with PID 30878 started at Wed Nov 28 11:09:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3: -w nss -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5899: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30878 at Wed Nov 28 11:09:47 EST 2012
kill -USR1 30878
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 30878 killed at Wed Nov 28 11:09:47 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:09:47 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 30935 >/dev/null 2>/dev/null
selfserv with PID 30935 found at Wed Nov 28 11:09:47 EST 2012
selfserv with PID 30935 started at Wed Nov 28 11:09:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #5900: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 30935 at Wed Nov 28 11:09:47 EST 2012
kill -USR1 30935
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 30935 killed at Wed Nov 28 11:09:47 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:09:47 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 30992 >/dev/null 2>/dev/null
selfserv with PID 30992 found at Wed Nov 28 11:09:47 EST 2012
selfserv with PID 30992 started at Wed Nov 28 11:09:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3: -w bogus -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #5901: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 30992 at Wed Nov 28 11:09:48 EST 2012
kill -USR1 30992
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 30992 killed at Wed Nov 28 11:09:48 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:09:48 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 31049 >/dev/null 2>/dev/null
selfserv with PID 31049 found at Wed Nov 28 11:09:48 EST 2012
selfserv with PID 31049 started at Wed Nov 28 11:09:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3: -w nss -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5902: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31049 at Wed Nov 28 11:09:48 EST 2012
kill -USR1 31049
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 31049 killed at Wed Nov 28 11:09:48 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:09:48 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 31106 >/dev/null 2>/dev/null
selfserv with PID 31106 found at Wed Nov 28 11:09:48 EST 2012
selfserv with PID 31106 started at Wed Nov 28 11:09:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5903: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31106 at Wed Nov 28 11:09:48 EST 2012
kill -USR1 31106
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 31106 killed at Wed Nov 28 11:09:48 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:09:48 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 31163 >/dev/null 2>/dev/null
selfserv with PID 31163 found at Wed Nov 28 11:09:48 EST 2012
selfserv with PID 31163 started at Wed Nov 28 11:09:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5904: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31163 at Wed Nov 28 11:09:48 EST 2012
kill -USR1 31163
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 31163 killed at Wed Nov 28 11:09:48 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:09:48 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 31220 >/dev/null 2>/dev/null
selfserv with PID 31220 found at Wed Nov 28 11:09:48 EST 2012
selfserv with PID 31220 started at Wed Nov 28 11:09:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5905: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31220 at Wed Nov 28 11:09:48 EST 2012
kill -USR1 31220
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 31220 killed at Wed Nov 28 11:09:48 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:09:48 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 31277 >/dev/null 2>/dev/null
selfserv with PID 31277 found at Wed Nov 28 11:09:48 EST 2012
selfserv with PID 31277 started at Wed Nov 28 11:09:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #5906: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 31277 at Wed Nov 28 11:09:48 EST 2012
kill -USR1 31277
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 31277 killed at Wed Nov 28 11:09:48 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:09:48 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 31334 >/dev/null 2>/dev/null
selfserv with PID 31334 found at Wed Nov 28 11:09:48 EST 2012
selfserv with PID 31334 started at Wed Nov 28 11:09:49 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #5907: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 31334 at Wed Nov 28 11:09:49 EST 2012
kill -USR1 31334
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 31334 killed at Wed Nov 28 11:09:49 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:09:49 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:49 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 31391 >/dev/null 2>/dev/null
selfserv with PID 31391 found at Wed Nov 28 11:09:49 EST 2012
selfserv with PID 31391 started at Wed Nov 28 11:09:49 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5908: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31391 at Wed Nov 28 11:09:49 EST 2012
kill -USR1 31391
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 31391 killed at Wed Nov 28 11:09:49 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:09:49 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:49 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 31448 >/dev/null 2>/dev/null
selfserv with PID 31448 found at Wed Nov 28 11:09:49 EST 2012
selfserv with PID 31448 started at Wed Nov 28 11:09:49 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5909: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31448 at Wed Nov 28 11:09:49 EST 2012
kill -USR1 31448
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 31448 killed at Wed Nov 28 11:09:49 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:09:49 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:49 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 31505 >/dev/null 2>/dev/null
selfserv with PID 31505 found at Wed Nov 28 11:09:49 EST 2012
selfserv with PID 31505 started at Wed Nov 28 11:09:49 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5910: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31505 at Wed Nov 28 11:09:49 EST 2012
kill -USR1 31505
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 31505 killed at Wed Nov 28 11:09:49 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:09:49 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:49 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 31562 >/dev/null 2>/dev/null
selfserv with PID 31562 found at Wed Nov 28 11:09:49 EST 2012
selfserv with PID 31562 started at Wed Nov 28 11:09:49 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5911: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31562 at Wed Nov 28 11:09:49 EST 2012
kill -USR1 31562
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 31562 killed at Wed Nov 28 11:09:49 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:09:49 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:49 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 31619 >/dev/null 2>/dev/null
selfserv with PID 31619 found at Wed Nov 28 11:09:49 EST 2012
selfserv with PID 31619 started at Wed Nov 28 11:09:49 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #5912: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 31619 at Wed Nov 28 11:09:49 EST 2012
kill -USR1 31619
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 31619 killed at Wed Nov 28 11:09:49 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:09:50 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:50 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 31676 >/dev/null 2>/dev/null
selfserv with PID 31676 found at Wed Nov 28 11:09:50 EST 2012
selfserv with PID 31676 started at Wed Nov 28 11:09:50 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #5913: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 31676 at Wed Nov 28 11:09:50 EST 2012
kill -USR1 31676
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 31676 killed at Wed Nov 28 11:09:50 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:09:50 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:50 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 31733 >/dev/null 2>/dev/null
selfserv with PID 31733 found at Wed Nov 28 11:09:50 EST 2012
selfserv with PID 31733 started at Wed Nov 28 11:09:50 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5914: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31733 at Wed Nov 28 11:09:50 EST 2012
kill -USR1 31733
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 31733 killed at Wed Nov 28 11:09:50 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:09:50 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:50 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 31805 >/dev/null 2>/dev/null
selfserv with PID 31805 found at Wed Nov 28 11:09:50 EST 2012
selfserv with PID 31805 started at Wed Nov 28 11:09:50 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -w bogus -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5915: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31805 at Wed Nov 28 11:09:50 EST 2012
kill -USR1 31805
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 31805 killed at Wed Nov 28 11:09:50 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:09:50 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:50 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 31862 >/dev/null 2>/dev/null
selfserv with PID 31862 found at Wed Nov 28 11:09:50 EST 2012
selfserv with PID 31862 started at Wed Nov 28 11:09:50 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -w nss -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5916: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31862 at Wed Nov 28 11:09:50 EST 2012
kill -USR1 31862
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 31862 killed at Wed Nov 28 11:09:50 EST 2012
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:09:50 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:50 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 31919 >/dev/null 2>/dev/null
selfserv with PID 31919 found at Wed Nov 28 11:09:50 EST 2012
selfserv with PID 31919 started at Wed Nov 28 11:09:50 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -w bogus -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #5917: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 31919 at Wed Nov 28 11:09:50 EST 2012
kill -USR1 31919
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 31919 killed at Wed Nov 28 11:09:50 EST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:09:50 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:50 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 31976 >/dev/null 2>/dev/null
selfserv with PID 31976 found at Wed Nov 28 11:09:50 EST 2012
selfserv with PID 31976 started at Wed Nov 28 11:09:50 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -w nss -n ExtendedSSLUser-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5918: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31976 at Wed Nov 28 11:09:51 EST 2012
kill -USR1 31976
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 31976 killed at Wed Nov 28 11:09:51 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:09:51 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:51 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 32033 >/dev/null 2>/dev/null
selfserv with PID 32033 found at Wed Nov 28 11:09:51 EST 2012
selfserv with PID 32033 started at Wed Nov 28 11:09:51 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V :ssl3 -n ExtendedSSLUser-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5919: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32033 at Wed Nov 28 11:09:51 EST 2012
kill -USR1 32033
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 32033 killed at Wed Nov 28 11:09:51 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:09:51 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:51 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 32090 >/dev/null 2>/dev/null
selfserv with PID 32090 found at Wed Nov 28 11:09:51 EST 2012
selfserv with PID 32090 started at Wed Nov 28 11:09:51 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V :ssl3 -n ExtendedSSLUser-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5920: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32090 at Wed Nov 28 11:09:51 EST 2012
kill -USR1 32090
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 32090 killed at Wed Nov 28 11:09:51 EST 2012
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:09:51 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:51 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 32147 >/dev/null 2>/dev/null
selfserv with PID 32147 found at Wed Nov 28 11:09:51 EST 2012
selfserv with PID 32147 started at Wed Nov 28 11:09:51 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V :ssl3 -n ExtendedSSLUser-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #5921: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 32147 at Wed Nov 28 11:09:51 EST 2012
kill -USR1 32147
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 32147 killed at Wed Nov 28 11:09:51 EST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:09:51 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:51 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 32204 >/dev/null 2>/dev/null
selfserv with PID 32204 found at Wed Nov 28 11:09:51 EST 2012
selfserv with PID 32204 started at Wed Nov 28 11:09:51 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V :ssl3 -n ExtendedSSLUser-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5922: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32204 at Wed Nov 28 11:09:51 EST 2012
kill -USR1 32204
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 32204 killed at Wed Nov 28 11:09:51 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:09:51 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:51 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 32261 >/dev/null 2>/dev/null
selfserv with PID 32261 found at Wed Nov 28 11:09:51 EST 2012
selfserv with PID 32261 started at Wed Nov 28 11:09:51 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3: -w bogus -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5923: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32261 at Wed Nov 28 11:09:52 EST 2012
kill -USR1 32261
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 32261 killed at Wed Nov 28 11:09:52 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:09:52 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:52 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 32318 >/dev/null 2>/dev/null
selfserv with PID 32318 found at Wed Nov 28 11:09:52 EST 2012
selfserv with PID 32318 started at Wed Nov 28 11:09:52 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3: -w nss -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5924: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32318 at Wed Nov 28 11:09:52 EST 2012
kill -USR1 32318
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 32318 killed at Wed Nov 28 11:09:52 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:09:52 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:52 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 32375 >/dev/null 2>/dev/null
selfserv with PID 32375 found at Wed Nov 28 11:09:52 EST 2012
selfserv with PID 32375 started at Wed Nov 28 11:09:52 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3: -w bogus -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #5925: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 32375 at Wed Nov 28 11:09:52 EST 2012
kill -USR1 32375
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 32375 killed at Wed Nov 28 11:09:52 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:09:52 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:52 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 32432 >/dev/null 2>/dev/null
selfserv with PID 32432 found at Wed Nov 28 11:09:52 EST 2012
selfserv with PID 32432 started at Wed Nov 28 11:09:52 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3: -w nss -n ExtendedSSLUser-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5926: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32432 at Wed Nov 28 11:09:52 EST 2012
kill -USR1 32432
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 32432 killed at Wed Nov 28 11:09:52 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:09:52 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:52 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 32489 >/dev/null 2>/dev/null
selfserv with PID 32489 found at Wed Nov 28 11:09:52 EST 2012
selfserv with PID 32489 started at Wed Nov 28 11:09:52 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5927: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32489 at Wed Nov 28 11:09:52 EST 2012
kill -USR1 32489
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 32489 killed at Wed Nov 28 11:09:52 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:09:52 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:52 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 32546 >/dev/null 2>/dev/null
selfserv with PID 32546 found at Wed Nov 28 11:09:52 EST 2012
selfserv with PID 32546 started at Wed Nov 28 11:09:52 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5928: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32546 at Wed Nov 28 11:09:53 EST 2012
kill -USR1 32546
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 32546 killed at Wed Nov 28 11:09:53 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:09:53 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:53 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 32603 >/dev/null 2>/dev/null
selfserv with PID 32603 found at Wed Nov 28 11:09:53 EST 2012
selfserv with PID 32603 started at Wed Nov 28 11:09:53 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #5929: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 32603 at Wed Nov 28 11:09:53 EST 2012
kill -USR1 32603
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 32603 killed at Wed Nov 28 11:09:53 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:09:53 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:53 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 32660 >/dev/null 2>/dev/null
selfserv with PID 32660 found at Wed Nov 28 11:09:53 EST 2012
selfserv with PID 32660 started at Wed Nov 28 11:09:53 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5930: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32660 at Wed Nov 28 11:09:53 EST 2012
kill -USR1 32660
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 32660 killed at Wed Nov 28 11:09:53 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:09:53 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:53 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 32717 >/dev/null 2>/dev/null
selfserv with PID 32717 found at Wed Nov 28 11:09:53 EST 2012
selfserv with PID 32717 started at Wed Nov 28 11:09:53 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5931: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32717 at Wed Nov 28 11:09:53 EST 2012
kill -USR1 32717
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 32717 killed at Wed Nov 28 11:09:53 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:09:53 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:53 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 306 >/dev/null 2>/dev/null
selfserv with PID 306 found at Wed Nov 28 11:09:53 EST 2012
selfserv with PID 306 started at Wed Nov 28 11:09:53 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5932: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 306 at Wed Nov 28 11:09:53 EST 2012
kill -USR1 306
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 306 killed at Wed Nov 28 11:09:53 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:09:53 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:53 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 368 >/dev/null 2>/dev/null
selfserv with PID 368 found at Wed Nov 28 11:09:53 EST 2012
selfserv with PID 368 started at Wed Nov 28 11:09:53 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #5933: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 368 at Wed Nov 28 11:09:53 EST 2012
kill -USR1 368
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 368 killed at Wed Nov 28 11:09:53 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:09:54 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:54 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 429 >/dev/null 2>/dev/null
selfserv with PID 429 found at Wed Nov 28 11:09:54 EST 2012
selfserv with PID 429 started at Wed Nov 28 11:09:54 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5934: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 429 at Wed Nov 28 11:09:54 EST 2012
kill -USR1 429
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 429 killed at Wed Nov 28 11:09:54 EST 2012
ssl.sh: skipping  TLS Server hello response without SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI for Extended Test
ssl.sh: skipping  TLS Server response with alert for Extended Test
ssl.sh: skipping  SSL3 Server hello response without SNI for Extended Test
ssl.sh: skipping  SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test
ssl.sh: skipping  TLS Server hello response without SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI: Change name on 2d HS for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test
ssl.sh: skipping  TLS Server response with alert for Extended Test
ssl.sh: SSL Stress Test Extended Test - server bypass/client bypass  - with ECC ===============================
ssl.sh: skipping  Stress SSL2 RC4 128 with MD5 for Extended Test
ssl.sh: Stress SSL3 RC4 128 with MD5 ----
selfserv starting at Wed Nov 28 11:09:54 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:54 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 633 >/dev/null 2>/dev/null
selfserv with PID 633 found at Wed Nov 28 11:09:54 EST 2012
selfserv with PID 633 started at Wed Nov 28 11:09:54 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 1000 -C c -V :ssl3 \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:09:54 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:09:54 EST 2012
ssl.sh: #5935: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 633 at Wed Nov 28 11:09:54 EST 2012
kill -USR1 633
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 633 killed at Wed Nov 28 11:09:54 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 ----
selfserv starting at Wed Nov 28 11:09:54 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:54 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 723 >/dev/null 2>/dev/null
selfserv with PID 723 found at Wed Nov 28 11:09:54 EST 2012
selfserv with PID 723 started at Wed Nov 28 11:09:54 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 1000 -C c \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:09:54 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:09:54 EST 2012
ssl.sh: #5936: Stress TLS  RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 723 at Wed Nov 28 11:09:55 EST 2012
kill -USR1 723
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 723 killed at Wed Nov 28 11:09:55 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (false start) ----
selfserv starting at Wed Nov 28 11:09:55 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:55 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 801 >/dev/null 2>/dev/null
selfserv with PID 801 found at Wed Nov 28 11:09:55 EST 2012
selfserv with PID 801 started at Wed Nov 28 11:09:55 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 1000 -C c -g \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:09:55 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:09:55 EST 2012
ssl.sh: #5937: Stress TLS  RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 801 at Wed Nov 28 11:09:55 EST 2012
kill -USR1 801
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 801 killed at Wed Nov 28 11:09:55 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket) ----
selfserv starting at Wed Nov 28 11:09:55 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:55 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 902 >/dev/null 2>/dev/null
selfserv with PID 902 found at Wed Nov 28 11:09:55 EST 2012
selfserv with PID 902 started at Wed Nov 28 11:09:55 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:09:55 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Wed Nov 28 11:09:55 EST 2012
ssl.sh: #5938: Stress TLS  RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 902 at Wed Nov 28 11:09:55 EST 2012
kill -USR1 902
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 902 killed at Wed Nov 28 11:09:55 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (compression) ----
selfserv starting at Wed Nov 28 11:09:55 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:55 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 1009 >/dev/null 2>/dev/null
selfserv with PID 1009 found at Wed Nov 28 11:09:55 EST 2012
selfserv with PID 1009 started at Wed Nov 28 11:09:55 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -z \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:09:55 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:09:55 EST 2012
ssl.sh: #5939: Stress TLS  RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 1009 at Wed Nov 28 11:09:55 EST 2012
kill -USR1 1009
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 1009 killed at Wed Nov 28 11:09:55 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression) ----
selfserv starting at Wed Nov 28 11:09:56 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:56 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 1085 >/dev/null 2>/dev/null
selfserv with PID 1085 found at Wed Nov 28 11:09:56 EST 2012
selfserv with PID 1085 started at Wed Nov 28 11:09:56 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u -z \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:09:56 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Wed Nov 28 11:09:56 EST 2012
ssl.sh: #5940: Stress TLS  RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 1085 at Wed Nov 28 11:09:56 EST 2012
kill -USR1 1085
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 1085 killed at Wed Nov 28 11:09:56 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) ----
selfserv starting at Wed Nov 28 11:09:56 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:56 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 1161 >/dev/null 2>/dev/null
selfserv with PID 1161 found at Wed Nov 28 11:09:56 EST 2012
selfserv with PID 1161 started at Wed Nov 28 11:09:56 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:09:56 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Wed Nov 28 11:09:56 EST 2012
ssl.sh: #5941: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 1161 at Wed Nov 28 11:09:56 EST 2012
kill -USR1 1161
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 1161 killed at Wed Nov 28 11:09:56 EST 2012
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test
ssl.sh: skipping  Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Wed Nov 28 11:09:56 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:56 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 1266 >/dev/null 2>/dev/null
selfserv with PID 1266 found at Wed Nov 28 11:09:56 EST 2012
selfserv with PID 1266 started at Wed Nov 28 11:09:56 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 100 -C c -V :ssl3 -N -n ExtendedSSLUser \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:09:56 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed Nov 28 11:09:57 EST 2012
ssl.sh: #5942: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 1266 at Wed Nov 28 11:09:57 EST 2012
kill -USR1 1266
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 1266 killed at Wed Nov 28 11:09:57 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Wed Nov 28 11:09:57 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:57 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 1341 >/dev/null 2>/dev/null
selfserv with PID 1341 found at Wed Nov 28 11:09:57 EST 2012
selfserv with PID 1341 started at Wed Nov 28 11:09:57 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 100 -C c -N -n ExtendedSSLUser \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:09:57 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed Nov 28 11:09:57 EST 2012
ssl.sh: #5943: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 1341 at Wed Nov 28 11:09:57 EST 2012
kill -USR1 1341
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 1341 killed at Wed Nov 28 11:09:57 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Wed Nov 28 11:09:57 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:57 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 1416 >/dev/null 2>/dev/null
selfserv with PID 1416 found at Wed Nov 28 11:09:57 EST 2012
selfserv with PID 1416 started at Wed Nov 28 11:09:57 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:09:57 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Wed Nov 28 11:09:57 EST 2012
ssl.sh: #5944: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 1416 at Wed Nov 28 11:09:57 EST 2012
kill -USR1 1416
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 1416 killed at Wed Nov 28 11:09:57 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Wed Nov 28 11:09:58 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:58 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 1492 >/dev/null 2>/dev/null
selfserv with PID 1492 found at Wed Nov 28 11:09:58 EST 2012
selfserv with PID 1492 started at Wed Nov 28 11:09:58 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:09:58 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:09:58 EST 2012
ssl.sh: #5945: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 1492 at Wed Nov 28 11:09:58 EST 2012
kill -USR1 1492
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 1492 killed at Wed Nov 28 11:09:58 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Wed Nov 28 11:09:58 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:58 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 1568 >/dev/null 2>/dev/null
selfserv with PID 1568 found at Wed Nov 28 11:09:58 EST 2012
selfserv with PID 1568 started at Wed Nov 28 11:09:58 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:09:58 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:09:58 EST 2012
ssl.sh: #5946: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 1568 at Wed Nov 28 11:09:58 EST 2012
kill -USR1 1568
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 1568 killed at Wed Nov 28 11:09:58 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Wed Nov 28 11:09:58 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:58 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 1644 >/dev/null 2>/dev/null
selfserv with PID 1644 found at Wed Nov 28 11:09:58 EST 2012
selfserv with PID 1644 started at Wed Nov 28 11:09:58 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:09:58 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Wed Nov 28 11:09:58 EST 2012
ssl.sh: #5947: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 1644 at Wed Nov 28 11:09:58 EST 2012
kill -USR1 1644
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 1644 killed at Wed Nov 28 11:09:58 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Wed Nov 28 11:09:58 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:58 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 1720 >/dev/null 2>/dev/null
selfserv with PID 1720 found at Wed Nov 28 11:09:58 EST 2012
selfserv with PID 1720 started at Wed Nov 28 11:09:58 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:09:58 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Wed Nov 28 11:09:58 EST 2012
ssl.sh: #5948: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 1720 at Wed Nov 28 11:09:58 EST 2012
kill -USR1 1720
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 1720 killed at Wed Nov 28 11:09:58 EST 2012
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Wed Nov 28 11:09:58 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C009 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:58 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 1825 >/dev/null 2>/dev/null
selfserv with PID 1825 found at Wed Nov 28 11:09:58 EST 2012
selfserv with PID 1825 started at Wed Nov 28 11:09:59 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 100 -C :C009 -N -V :ssl3 \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:09:59 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed Nov 28 11:09:59 EST 2012
ssl.sh: #5949: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 1825 at Wed Nov 28 11:09:59 EST 2012
kill -USR1 1825
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 1825 killed at Wed Nov 28 11:09:59 EST 2012
ssl.sh: Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Wed Nov 28 11:09:59 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C013 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:59 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 1901 >/dev/null 2>/dev/null
selfserv with PID 1901 found at Wed Nov 28 11:09:59 EST 2012
selfserv with PID 1901 started at Wed Nov 28 11:09:59 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 1000 -C :C013 -V :ssl3 \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:09:59 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:09:59 EST 2012
ssl.sh: #5950: Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 1901 at Wed Nov 28 11:09:59 EST 2012
kill -USR1 1901
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 1901 killed at Wed Nov 28 11:09:59 EST 2012
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) ----
selfserv starting at Wed Nov 28 11:09:59 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C004 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:09:59 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 1977 >/dev/null 2>/dev/null
selfserv with PID 1977 found at Wed Nov 28 11:09:59 EST 2012
selfserv with PID 1977 started at Wed Nov 28 11:09:59 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C004 -N \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:09:59 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed Nov 28 11:10:00 EST 2012
ssl.sh: #5951: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 1977 at Wed Nov 28 11:10:00 EST 2012
kill -USR1 1977
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 1977 killed at Wed Nov 28 11:10:00 EST 2012
ssl.sh: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) ----
selfserv starting at Wed Nov 28 11:10:00 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c :C00E -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:10:00 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 2052 >/dev/null 2>/dev/null
selfserv with PID 2052 found at Wed Nov 28 11:10:00 EST 2012
selfserv with PID 2052 started at Wed Nov 28 11:10:00 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C00E -N \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:10:00 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed Nov 28 11:10:01 EST 2012
ssl.sh: #5952: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 2052 at Wed Nov 28 11:10:01 EST 2012
kill -USR1 2052
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 2052 killed at Wed Nov 28 11:10:01 EST 2012
ssl.sh: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Wed Nov 28 11:10:01 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C013 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:10:01 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 2127 >/dev/null 2>/dev/null
selfserv with PID 2127 found at Wed Nov 28 11:10:01 EST 2012
selfserv with PID 2127 started at Wed Nov 28 11:10:01 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :C013 \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:10:01 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:10:01 EST 2012
ssl.sh: #5953: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 2127 at Wed Nov 28 11:10:01 EST 2012
kill -USR1 2127
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 2127 killed at Wed Nov 28 11:10:01 EST 2012
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) ----
selfserv starting at Wed Nov 28 11:10:01 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C004 -u -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:10:01 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 2212 >/dev/null 2>/dev/null
selfserv with PID 2212 found at Wed Nov 28 11:10:01 EST 2012
selfserv with PID 2212 started at Wed Nov 28 11:10:01 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :C004 -u \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:10:01 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Wed Nov 28 11:10:01 EST 2012
ssl.sh: #5954: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 2212 at Wed Nov 28 11:10:01 EST 2012
kill -USR1 2212
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 2212 killed at Wed Nov 28 11:10:01 EST 2012
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Wed Nov 28 11:10:01 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C009 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:10:01 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 2310 >/dev/null 2>/dev/null
selfserv with PID 2310 found at Wed Nov 28 11:10:02 EST 2012
selfserv with PID 2310 started at Wed Nov 28 11:10:02 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 10 -C :C009 -N -V :ssl3 -n ExtendedSSLUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:10:02 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Wed Nov 28 11:10:02 EST 2012
ssl.sh: #5955: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 2310 at Wed Nov 28 11:10:02 EST 2012
kill -USR1 2310
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 2310 killed at Wed Nov 28 11:10:02 EST 2012
ssl.sh: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) ----
selfserv starting at Wed Nov 28 11:10:02 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:10:02 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 2385 >/dev/null 2>/dev/null
selfserv with PID 2385 found at Wed Nov 28 11:10:02 EST 2012
selfserv with PID 2385 started at Wed Nov 28 11:10:02 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 100 -C :C013 -V :ssl3 -n ExtendedSSLUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:10:02 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:10:02 EST 2012
ssl.sh: #5956: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 2385 at Wed Nov 28 11:10:02 EST 2012
kill -USR1 2385
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 2385 killed at Wed Nov 28 11:10:02 EST 2012
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Wed Nov 28 11:10:02 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C004 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:10:02 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 2461 >/dev/null 2>/dev/null
selfserv with PID 2461 found at Wed Nov 28 11:10:02 EST 2012
selfserv with PID 2461 started at Wed Nov 28 11:10:02 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 10 -C :C004 -N -n ExtendedSSLUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:10:02 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Wed Nov 28 11:10:02 EST 2012
ssl.sh: #5957: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 2461 at Wed Nov 28 11:10:02 EST 2012
kill -USR1 2461
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 2461 killed at Wed Nov 28 11:10:02 EST 2012
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Wed Nov 28 11:10:02 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -r -r -c :C00E -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:10:02 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 2536 >/dev/null 2>/dev/null
selfserv with PID 2536 found at Wed Nov 28 11:10:02 EST 2012
selfserv with PID 2536 started at Wed Nov 28 11:10:02 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 10 -C :C00E -N -n ExtendedSSLUser-ecmixed \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:10:02 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Wed Nov 28 11:10:03 EST 2012
ssl.sh: #5958: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 2536 at Wed Nov 28 11:10:03 EST 2012
kill -USR1 2536
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 2536 killed at Wed Nov 28 11:10:03 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ----
selfserv starting at Wed Nov 28 11:10:03 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:10:03 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 2612 >/dev/null 2>/dev/null
selfserv with PID 2612 found at Wed Nov 28 11:10:03 EST 2012
selfserv with PID 2612 started at Wed Nov 28 11:10:03 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 100 -C :C013 -n ExtendedSSLUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:10:03 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:10:03 EST 2012
ssl.sh: #5959: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 2612 at Wed Nov 28 11:10:03 EST 2012
kill -USR1 2612
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 2612 killed at Wed Nov 28 11:10:03 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ----
selfserv starting at Wed Nov 28 11:10:03 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -u -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:10:03 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 2688 >/dev/null 2>/dev/null
selfserv with PID 2688 found at Wed Nov 28 11:10:03 EST 2012
selfserv with PID 2688 started at Wed Nov 28 11:10:03 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec -u \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:10:03 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Wed Nov 28 11:10:03 EST 2012
ssl.sh: #5960: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 2688 at Wed Nov 28 11:10:03 EST 2012
kill -USR1 2688
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 2688 killed at Wed Nov 28 11:10:03 EST 2012
TIMESTAMP ssl END: Wed Nov 28 11:10:03 EST 2012
Running tests for ocsp
TIMESTAMP ocsp BEGIN: Wed Nov 28 11:10:03 EST 2012
ocsp.sh: OCSP tests ===============================
TIMESTAMP ocsp END: Wed Nov 28 11:10:03 EST 2012
Running tests for pkits
TIMESTAMP pkits BEGIN: Wed Nov 28 11:10:03 EST 2012
pkits.sh Start of logfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/pkits.log
HOSTDIR /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix
PKITSDIR /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits
PKITSdb /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb
PKITSbkp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSbkp
PKITS_DATA /home/tinderbox/pkits/data/
certs /home/tinderbox/pkits/data//certs
crls /home/tinderbox/pkits/data//crls

***************************************************************
NIST PKITS Section 4.1: Signature Verification
***************************************************************

--------------------------------------------------------------------
Test case Valid Signatures Test1

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n GoodCACert -i /home/tinderbox/pkits/data//certs/GoodCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/GoodCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidCertificatePathTest1EE.crt /home/tinderbox/pkits/data//certs/GoodCACert.crt
Chain is good!
pkits.sh: #5961: Valid Signatures Test1 - PASSED
pkits.sh SUCCESS: Valid Signatures Test1 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid CA Signature Test2

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n BadSignedCACert -i /home/tinderbox/pkits/data//certs/BadSignedCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/BadSignedCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidCASignatureTest2EE.crt /home/tinderbox/pkits/data//certs/BadSignedCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. TrustAnchorRootCertificate [Certificate Authority]:
  ERROR -8182: Peer's certificate has an invalid signature.
pkits.sh: #5962: Invalid CA Signature Test2 (2)  - PASSED
pkits.sh SUCCESS: Invalid CA Signature Test2 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid EE Signature Test3

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n GoodCACert -i /home/tinderbox/pkits/data//certs/GoodCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/GoodCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidEESignatureTest3EE.crt /home/tinderbox/pkits/data//certs/GoodCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. TrustAnchorRootCertificate [Certificate Authority]:
  ERROR -8182: Peer's certificate has an invalid signature.
pkits.sh: #5963: Invalid EE Signature Test3 (2)  - PASSED
pkits.sh SUCCESS: Invalid EE Signature Test3 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid DSA Signatures Test4

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n DSACACert -i /home/tinderbox/pkits/data//certs/DSACACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/DSACACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidDSASignaturesTest4EE.crt /home/tinderbox/pkits/data//certs/DSACACert.crt
Chain is good!
pkits.sh: #5964: Valid DSA Signatures Test4 - PASSED
pkits.sh SUCCESS: Valid DSA Signatures Test4 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Valid DSA Parameter Inheritance Test5

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n DSACACert -i /home/tinderbox/pkits/data//certs/DSACACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/DSACACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n DSAParametersInheritedCACert -i /home/tinderbox/pkits/data//certs/DSAParametersInheritedCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/DSAParametersInheritedCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidDSAParameterInheritanceTest5EE.crt /home/tinderbox/pkits/data//certs/DSAParametersInheritedCACert.crt /home/tinderbox/pkits/data//certs/DSACACert.crt
Chain is good!
pkits.sh: #5965: Valid DSA Parameter Inheritance Test5 - PASSED
pkits.sh SUCCESS: Valid DSA Parameter Inheritance Test5 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid DSA Signature Test6

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n DSACACert -i /home/tinderbox/pkits/data//certs/DSACACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/DSACACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDSASignatureTest6EE.crt /home/tinderbox/pkits/data//certs/DSACACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. TrustAnchorRootCertificate [Certificate Authority]:
  ERROR -8182: Peer's certificate has an invalid signature.
pkits.sh: #5966: Invalid DSA Signature Test6 (2)  - PASSED
pkits.sh SUCCESS: Invalid DSA Signature Test6 returned as expected 2
Restore DB

***************************************************************
NIST PKITS Section 4.2: Validity Periods
***************************************************************

--------------------------------------------------------------------
Test case Invalid CA notBefore Date Test1

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n BadnotBeforeDateCACert -i /home/tinderbox/pkits/data//certs/BadnotBeforeDateCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/BadnotBeforeDateCACRL.crl
crlutil: unable to import CRL: The CRL for the certificate's issuer has an invalid signature.
pkits.sh: #5967: Invalid CA notBefore Date Test1 (1)  - PASSED
pkits.sh SUCCESS: Invalid CA notBefore Date Test1 returned as expected 1
Restore DB

--------------------------------------------------------------------
Test case Invalid EE notBefore Date Test2

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n GoodCACert -i /home/tinderbox/pkits/data//certs/GoodCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/GoodCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidEEnotBeforeDateTest2EE.crt /home/tinderbox/pkits/data//certs/GoodCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=Invalid EE notBefore Date EE Certificate Test2,O=Test Certificates 2011,C=US :
  ERROR -8181: Peer's Certificate has expired.
pkits.sh: #5968: Invalid EE notBefore Date Test2 (2)  - PASSED
pkits.sh SUCCESS: Invalid EE notBefore Date Test2 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid pre2000 UTC notBefore Date Test3

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n GoodCACert -i /home/tinderbox/pkits/data//certs/GoodCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/GoodCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/Validpre2000UTCnotBeforeDateTest3EE.crt /home/tinderbox/pkits/data//certs/GoodCACert.crt
Chain is good!
pkits.sh: #5969: Valid pre2000 UTC notBefore Date Test3 - PASSED
pkits.sh SUCCESS: Valid pre2000 UTC notBefore Date Test3 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Valid GeneralizedTime notBefore Date Test4

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n GoodCACert -i /home/tinderbox/pkits/data//certs/GoodCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/GoodCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidGeneralizedTimenotBeforeDateTest4EE.crt /home/tinderbox/pkits/data//certs/GoodCACert.crt
Chain is good!
pkits.sh: #5970: Valid GeneralizedTime notBefore Date Test4 - PASSED
pkits.sh SUCCESS: Valid GeneralizedTime notBefore Date Test4 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid CA notAfter Date Test5

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n BadnotAfterDateCACert -i /home/tinderbox/pkits/data//certs/BadnotAfterDateCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/BadnotAfterDateCACRL.crl
crlutil: unable to import CRL: The CRL for the certificate's issuer has an invalid signature.
pkits.sh: #5971: Invalid CA notAfter Date Test5 (1)  - PASSED
pkits.sh SUCCESS: Invalid CA notAfter Date Test5 returned as expected 1
Restore DB

--------------------------------------------------------------------
Test case Invalid EE notAfter Date Test6

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n GoodCACert -i /home/tinderbox/pkits/data//certs/GoodCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/GoodCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidEEnotAfterDateTest6EE.crt /home/tinderbox/pkits/data//certs/GoodCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=Invalid EE notAfter Date EE Certificate Test6,O=Test Certificates 2011,C=US :
  ERROR -8181: Peer's Certificate has expired.
pkits.sh: #5972: Invalid EE notAfter Date Test6 (2)  - PASSED
pkits.sh SUCCESS: Invalid EE notAfter Date Test6 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid pre2000 UTC EE notAfter Date Test7

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n GoodCACert -i /home/tinderbox/pkits/data//certs/GoodCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/GoodCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/Invalidpre2000UTCEEnotAfterDateTest7EE.crt /home/tinderbox/pkits/data//certs/GoodCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=Invalid pre2000 UTC EE notAfter Date EE Certificate Test7,O=Test Certificates 2011,C=US :
  ERROR -8181: Peer's Certificate has expired.
pkits.sh: #5973: Invalid pre2000 UTC EE notAfter Date Test7 (2)  - PASSED
pkits.sh SUCCESS: Invalid pre2000 UTC EE notAfter Date Test7 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case ValidGeneralizedTime notAfter Date Test8

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n GoodCACert -i /home/tinderbox/pkits/data//certs/GoodCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/GoodCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidGeneralizedTimenotAfterDateTest8EE.crt /home/tinderbox/pkits/data//certs/GoodCACert.crt
Chain is good!
pkits.sh: #5974: ValidGeneralizedTime notAfter Date Test8 - PASSED
pkits.sh SUCCESS: ValidGeneralizedTime notAfter Date Test8 returned as expected 0
Restore DB

***************************************************************
NIST PKITS Section 4.3: Verifying NameChaining
***************************************************************

--------------------------------------------------------------------
Test case Invalid Name Chaining EE Test1

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n GoodCACert -i /home/tinderbox/pkits/data//certs/GoodCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/GoodCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidNameChainingTest1EE.crt /home/tinderbox/pkits/data//certs/GoodCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=Invalid Name Chaining EE Certificate Test1,O=Test Certificates 2011,C=US :
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Good CA Root,O=Test Certificates 2011,C=US
pkits.sh: #5975: Invalid Name Chaining EE Test1 (2)  - PASSED
pkits.sh SUCCESS: Invalid Name Chaining EE Test1 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid Name Chaining Order Test2

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n NameOrderingCACert -i /home/tinderbox/pkits/data//certs/NameOrderingCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/NameOrderCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidNameChainingOrderTest2EE.crt /home/tinderbox/pkits/data//certs/NameOrderingCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=Invalid Name Chaining Order EE Certificate Test2,O=Test Certificates 2011,C=US :
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Name Ordering CA,OU=Organizational Unit Name 1,OU=Organizational Unit Name 2,O=Test Certificates 2011,C=US
pkits.sh: #5976: Invalid Name Chaining Order Test2 (2)  - PASSED
pkits.sh SUCCESS: Invalid Name Chaining Order Test2 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid Name Chaining UIDs Test6

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n UIDCACert -i /home/tinderbox/pkits/data//certs/UIDCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/UIDCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidNameUIDsTest6EE.crt /home/tinderbox/pkits/data//certs/UIDCACert.crt
Chain is good!
pkits.sh: #5977: Valid Name Chaining UIDs Test6 - PASSED
pkits.sh SUCCESS: Valid Name Chaining UIDs Test6 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Valid RFC3280 Mandatory Attribute Types Test7

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n RFC3280MandatoryAttributeTypesCACert -i /home/tinderbox/pkits/data//certs/RFC3280MandatoryAttributeTypesCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/RFC3280MandatoryAttributeTypesCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidRFC3280MandatoryAttributeTypesTest7EE.crt /home/tinderbox/pkits/data//certs/RFC3280MandatoryAttributeTypesCACert.crt
Chain is good!
pkits.sh: #5978: Valid RFC3280 Mandatory Attribute Types Test7 - PASSED
pkits.sh SUCCESS: Valid RFC3280 Mandatory Attribute Types Test7 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Valid RFC3280 Optional Attribute Types Test8

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n RFC3280OptionalAttributeTypesCACert -i /home/tinderbox/pkits/data//certs/RFC3280OptionalAttributeTypesCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/RFC3280OptionalAttributeTypesCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidRFC3280OptionalAttributeTypesTest8EE.crt /home/tinderbox/pkits/data//certs/RFC3280OptionalAttributeTypesCACert.crt
Chain is good!
pkits.sh: #5979: Valid RFC3280 Optional Attribute Types Test8 - PASSED
pkits.sh SUCCESS: Valid RFC3280 Optional Attribute Types Test8 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Valid UTF8String Encoded Names Test9

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n UTF8StringEncodedNamesCACert -i /home/tinderbox/pkits/data//certs/UTF8StringEncodedNamesCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/UTF8StringEncodedNamesCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidUTF8StringEncodedNamesTest9EE.crt /home/tinderbox/pkits/data//certs/UTF8StringEncodedNamesCACert.crt
Chain is good!
pkits.sh: #5980: Valid UTF8String Encoded Names Test9 - PASSED
pkits.sh SUCCESS: Valid UTF8String Encoded Names Test9 returned as expected 0
Restore DB

***************************************************************
NIST PKITS Section 4.4: Basic Certificate Revocation Tests
***************************************************************

--------------------------------------------------------------------
Test case Invalid Revoked CA Test2

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n RevokedsubCACert -i /home/tinderbox/pkits/data//certs/RevokedsubCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/RevokedsubCACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n GoodCACert -i /home/tinderbox/pkits/data//certs/GoodCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/GoodCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidRevokedCATest2EE.crt /home/tinderbox/pkits/data//certs/RevokedsubCACert.crt /home/tinderbox/pkits/data//certs/GoodCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. TrustAnchorRootCertificate [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
pkits.sh: #5981: Invalid Revoked CA Test2 (2)  - PASSED
pkits.sh SUCCESS: Invalid Revoked CA Test2 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid Revoked EE Test3

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n GoodCACert -i /home/tinderbox/pkits/data//certs/GoodCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/GoodCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidRevokedEETest3EE.crt /home/tinderbox/pkits/data//certs/GoodCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. TrustAnchorRootCertificate [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
pkits.sh: #5982: Invalid Revoked EE Test3 (2)  - PASSED
pkits.sh SUCCESS: Invalid Revoked EE Test3 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid Bad CRL Signature Test4

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n BadCRLSignatureCACert -i /home/tinderbox/pkits/data//certs/BadCRLSignatureCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/BadCRLSignatureCACRL.crl
crlutil: unable to import CRL: The CRL for the certificate's issuer has an invalid signature.
pkits.sh: #5983: Invalid Bad CRL Signature Test4 (1)  - PASSED
pkits.sh SUCCESS: Invalid Bad CRL Signature Test4 returned as expected 1
Restore DB

--------------------------------------------------------------------
Test case Invalid Bad CRL Issuer Name Test5

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n BadCRLIssuerNameCACert -i /home/tinderbox/pkits/data//certs/BadCRLIssuerNameCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/BadCRLIssuerNameCACRL.crl
crlutil: unable to import CRL: Peer's Certificate issuer is not recognized.
pkits.sh: #5984: Invalid Bad CRL Issuer Name Test5 (1)  - PASSED
pkits.sh SUCCESS: Invalid Bad CRL Issuer Name Test5 returned as expected 1
Restore DB

--------------------------------------------------------------------
Test case Valid Two CRLs Test7

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n TwoCRLsCACert -i /home/tinderbox/pkits/data//certs/TwoCRLsCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/TwoCRLsCAGoodCRL.crl
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/TwoCRLsCABadCRL.crl
crlutil: unable to import CRL: Peer's Certificate issuer is not recognized.
pkits.sh: #5985: Valid Two CRLs Test7 (1)  - PASSED
pkits.sh SUCCESS: Valid Two CRLs Test7 returned as expected 1
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidTwoCRLsTest7EE.crt /home/tinderbox/pkits/data//certs/TwoCRLsCACert.crt
Chain is good!
pkits.sh: #5986: Valid Two CRLs Test7 - PASSED
pkits.sh SUCCESS: Valid Two CRLs Test7 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid Unknown CRL Entry Extension Test8

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n UnknownCRLEntryExtensionCACert -i /home/tinderbox/pkits/data//certs/UnknownCRLEntryExtensionCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/UnknownCRLEntryExtensionCACRL.crl
crlutil: unable to import CRL: Issuer's V2 Certificate Revocation List has an unknown critical extension.
pkits.sh: #5987: Invalid Unknown CRL Entry Extension Test8 (1)  - PASSED
pkits.sh SUCCESS: Invalid Unknown CRL Entry Extension Test8 returned as expected 1
Restore DB

--------------------------------------------------------------------
Test case Invalid Unknown CRL Extension Test9

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n UnknownCRLExtensionCACert -i /home/tinderbox/pkits/data//certs/UnknownCRLExtensionCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/UnknownCRLExtensionCACRL.crl
crlutil: unable to import CRL: Issuer's V2 Certificate Revocation List has an unknown critical extension.
pkits.sh: #5988: Invalid Unknown CRL Extension Test9 (1)  - PASSED
pkits.sh SUCCESS: Invalid Unknown CRL Extension Test9 returned as expected 1
Restore DB

--------------------------------------------------------------------
Test case Invalid Unknown CRL Extension Test10

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n UnknownCRLExtensionCACert -i /home/tinderbox/pkits/data//certs/UnknownCRLExtensionCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/UnknownCRLExtensionCACRL.crl
crlutil: unable to import CRL: Issuer's V2 Certificate Revocation List has an unknown critical extension.
pkits.sh: #5989: Invalid Unknown CRL Extension Test10 (1)  - PASSED
pkits.sh SUCCESS: Invalid Unknown CRL Extension Test10 returned as expected 1
Restore DB

--------------------------------------------------------------------
Test case Valid GeneralizedTime CRL nextUpdate Test13

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n GeneralizedTimeCRLnextUpdateCACert -i /home/tinderbox/pkits/data//certs/GeneralizedTimeCRLnextUpdateCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/GeneralizedTimeCRLnextUpdateCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidGeneralizedTimeCRLnextUpdateTest13EE.crt /home/tinderbox/pkits/data//certs/GeneralizedTimeCRLnextUpdateCACert.crt
Chain is good!
pkits.sh: #5990: Valid GeneralizedTime CRL nextUpdate Test13 - PASSED
pkits.sh SUCCESS: Valid GeneralizedTime CRL nextUpdate Test13 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Valid Negative Serial Number Test14

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n NegativeSerialNumberCACert -i /home/tinderbox/pkits/data//certs/NegativeSerialNumberCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/NegativeSerialNumberCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidNegativeSerialNumberTest14EE.crt /home/tinderbox/pkits/data//certs/NegativeSerialNumberCACert.crt
Chain is good!
pkits.sh: #5991: Valid Negative Serial Number Test14 - PASSED
pkits.sh SUCCESS: Valid Negative Serial Number Test14 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid Negative Serial Number Test15

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n NegativeSerialNumberCACert -i /home/tinderbox/pkits/data//certs/NegativeSerialNumberCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/NegativeSerialNumberCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidNegativeSerialNumberTest15EE.crt /home/tinderbox/pkits/data//certs/NegativeSerialNumberCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. TrustAnchorRootCertificate [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
pkits.sh: #5992: Invalid Negative Serial Number Test15 (2)  - PASSED
pkits.sh SUCCESS: Invalid Negative Serial Number Test15 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid Long Serial Number Test16

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n LongSerialNumberCACert -i /home/tinderbox/pkits/data//certs/LongSerialNumberCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/LongSerialNumberCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidLongSerialNumberTest16EE.crt /home/tinderbox/pkits/data//certs/LongSerialNumberCACert.crt
Chain is good!
pkits.sh: #5993: Valid Long Serial Number Test16 - PASSED
pkits.sh SUCCESS: Valid Long Serial Number Test16 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Valid Long Serial Number Test17

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n LongSerialNumberCACert -i /home/tinderbox/pkits/data//certs/LongSerialNumberCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/LongSerialNumberCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidLongSerialNumberTest17EE.crt /home/tinderbox/pkits/data//certs/LongSerialNumberCACert.crt
Chain is good!
pkits.sh: #5994: Valid Long Serial Number Test17 - PASSED
pkits.sh SUCCESS: Valid Long Serial Number Test17 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid Long Serial Number Test18

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n LongSerialNumberCACert -i /home/tinderbox/pkits/data//certs/LongSerialNumberCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/LongSerialNumberCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidLongSerialNumberTest18EE.crt /home/tinderbox/pkits/data//certs/LongSerialNumberCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. TrustAnchorRootCertificate [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
pkits.sh: #5995: Invalid Long Serial Number Test18 (2)  - PASSED
pkits.sh SUCCESS: Invalid Long Serial Number Test18 returned as expected 2
Restore DB

***************************************************************
NIST PKITS Section 4.5: Self-Issued Certificates
***************************************************************

***************************************************************
NIST PKITS Section 4.6: Verifying Basic Constraints
***************************************************************

--------------------------------------------------------------------
Test case Invalid Missing basicConstraints Test1

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n MissingbasicConstraintsCACert -i /home/tinderbox/pkits/data//certs/MissingbasicConstraintsCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/MissingbasicConstraintsCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidMissingbasicConstraintsTest1EE.crt /home/tinderbox/pkits/data//certs/MissingbasicConstraintsCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. MissingbasicConstraintsCACert [Certificate Authority]:
  ERROR -8156: Issuer certificate is invalid.
pkits.sh: #5996: Invalid Missing basicConstraints Test1 (2)  - PASSED
pkits.sh SUCCESS: Invalid Missing basicConstraints Test1 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid cA False Test2

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n basicConstraintsCriticalcAFalseCACert -i /home/tinderbox/pkits/data//certs/basicConstraintsCriticalcAFalseCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/basicConstraintsCriticalcAFalseCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidcAFalseTest2EE.crt /home/tinderbox/pkits/data//certs/basicConstraintsCriticalcAFalseCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. basicConstraintsCriticalcAFalseCACert [Certificate Authority]:
  ERROR -8156: Issuer certificate is invalid.
pkits.sh: #5997: Invalid cA False Test2 (2)  - PASSED
pkits.sh SUCCESS: Invalid cA False Test2 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid cA False Test3

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n basicConstraintsNotCriticalcAFalseCACert -i /home/tinderbox/pkits/data//certs/basicConstraintsNotCriticalcAFalseCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/basicConstraintsNotCriticalcAFalseCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidcAFalseTest3EE.crt /home/tinderbox/pkits/data//certs/basicConstraintsNotCriticalcAFalseCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. basicConstraintsNotCriticalcAFalseCACert [Certificate Authority]:
  ERROR -8156: Issuer certificate is invalid.
pkits.sh: #5998: Invalid cA False Test3 (2)  - PASSED
pkits.sh SUCCESS: Invalid cA False Test3 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid basicConstraints Not Critical Test4

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n basicConstraintsNotCriticalCACert -i /home/tinderbox/pkits/data//certs/basicConstraintsNotCriticalCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/basicConstraintsNotCriticalCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidbasicConstraintsNotCriticalTest4EE.crt /home/tinderbox/pkits/data//certs/basicConstraintsNotCriticalCACert.crt
Chain is good!
pkits.sh: #5999: Valid basicConstraints Not Critical Test4 - PASSED
pkits.sh SUCCESS: Valid basicConstraints Not Critical Test4 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid pathLenConstraint Test5

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n pathLenConstraint0CACert -i /home/tinderbox/pkits/data//certs/pathLenConstraint0CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint0CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n pathLenConstraint0subCACert -i /home/tinderbox/pkits/data//certs/pathLenConstraint0subCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint0subCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidpathLenConstraintTest5EE.crt /home/tinderbox/pkits/data//certs/pathLenConstraint0subCACert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint0CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. pathLenConstraint0CACert [Certificate Authority]:
  ERROR -8155: Certificate path length constraint is invalid.
pkits.sh: #6000: Invalid pathLenConstraint Test5 (2)  - PASSED
pkits.sh SUCCESS: Invalid pathLenConstraint Test5 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid pathLenConstraint Test6

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n pathLenConstraint0CACert -i /home/tinderbox/pkits/data//certs/pathLenConstraint0CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint0CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n pathLenConstraint0subCACert -i /home/tinderbox/pkits/data//certs/pathLenConstraint0subCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint0subCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidpathLenConstraintTest6EE.crt /home/tinderbox/pkits/data//certs/pathLenConstraint0subCACert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint0CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. pathLenConstraint0CACert [Certificate Authority]:
  ERROR -8155: Certificate path length constraint is invalid.
pkits.sh: #6001: Invalid pathLenConstraint Test6 (2)  - PASSED
pkits.sh SUCCESS: Invalid pathLenConstraint Test6 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid pathLenConstraint Test7

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n pathLenConstraint0CACert -i /home/tinderbox/pkits/data//certs/pathLenConstraint0CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint0CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidpathLenConstraintTest7EE.crt /home/tinderbox/pkits/data//certs/pathLenConstraint0CACert.crt
Chain is good!
pkits.sh: #6002: Valid pathLenConstraint Test7 - PASSED
pkits.sh SUCCESS: Valid pathLenConstraint Test7 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Valid pathLenConstraint test8

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n pathLenConstraint0CACert -i /home/tinderbox/pkits/data//certs/pathLenConstraint0CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint0CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidpathLenConstraintTest8EE.crt /home/tinderbox/pkits/data//certs/pathLenConstraint0CACert.crt
Chain is good!
pkits.sh: #6003: Valid pathLenConstraint test8 - PASSED
pkits.sh SUCCESS: Valid pathLenConstraint test8 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid pathLenConstraint Test9

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n pathLenConstraint6CACert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subCA0Cert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subCA0Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subCA0CRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subsubCA00Cert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubCA00Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subsubCA00CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidpathLenConstraintTest9EE.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubCA00Cert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subCA0Cert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. pathLenConstraint6subCA0Cert [Certificate Authority]:
  ERROR -8155: Certificate path length constraint is invalid.
pkits.sh: #6004: Invalid pathLenConstraint Test9 (2)  - PASSED
pkits.sh SUCCESS: Invalid pathLenConstraint Test9 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid pathLenConstraint Test10

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n pathLenConstraint6CACert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subCA0Cert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subCA0Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subCA0CRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subsubCA00Cert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubCA00Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subsubCA00CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidpathLenConstraintTest10EE.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubCA00Cert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subCA0Cert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. pathLenConstraint6subCA0Cert [Certificate Authority]:
  ERROR -8155: Certificate path length constraint is invalid.
pkits.sh: #6005: Invalid pathLenConstraint Test10 (2)  - PASSED
pkits.sh SUCCESS: Invalid pathLenConstraint Test10 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid pathLenConstraint Test11

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n pathLenConstraint6CACert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subCA1Cert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subCA1Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subCA1CRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subsubCA11Cert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubCA11Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subsubCA11CRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subsubsubCA11XCert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubsubCA11XCert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subsubsubCA11XCRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidpathLenConstraintTest11EE.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubsubCA11XCert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubCA11Cert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subCA1Cert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. pathLenConstraint6subCA1Cert [Certificate Authority]:
  ERROR -8155: Certificate path length constraint is invalid.
pkits.sh: #6006: Invalid pathLenConstraint Test11 (2)  - PASSED
pkits.sh SUCCESS: Invalid pathLenConstraint Test11 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid pathLenConstraint test12

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n pathLenConstraint6CACert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subCA1Cert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subCA1Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subCA1CRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subsubCA11Cert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubCA11Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subsubCA11CRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subsubsubCA11XCert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubsubCA11XCert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subsubsubCA11XCRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidpathLenConstraintTest12EE.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubsubCA11XCert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubCA11Cert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subCA1Cert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. pathLenConstraint6subCA1Cert [Certificate Authority]:
  ERROR -8155: Certificate path length constraint is invalid.
pkits.sh: #6007: Invalid pathLenConstraint test12 (2)  - PASSED
pkits.sh SUCCESS: Invalid pathLenConstraint test12 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid pathLenConstraint Test13

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n pathLenConstraint6CACert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subCA4Cert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subCA4Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subCA4CRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subsubCA41Cert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubCA41Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subsubCA41CRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subsubsubCA41XCert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubsubCA41XCert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subsubsubCA41XCRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidpathLenConstraintTest13EE.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubsubCA41XCert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubCA41Cert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subCA4Cert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6CACert.crt
Chain is good!
pkits.sh: #6008: Valid pathLenConstraint Test13 - PASSED
pkits.sh SUCCESS: Valid pathLenConstraint Test13 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Valid pathLenConstraint Test14

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n pathLenConstraint6CACert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subCA4Cert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subCA4Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subCA4CRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subsubCA41Cert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubCA41Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subsubCA41CRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subsubsubCA41XCert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubsubCA41XCert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subsubsubCA41XCRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidpathLenConstraintTest14EE.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubsubCA41XCert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubCA41Cert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subCA4Cert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6CACert.crt
Chain is good!
pkits.sh: #6009: Valid pathLenConstraint Test14 - PASSED
pkits.sh SUCCESS: Valid pathLenConstraint Test14 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid Self-Issued pathLenConstraint Test16

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n pathLenConstraint0CACert -i /home/tinderbox/pkits/data//certs/pathLenConstraint0CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint0CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n pathLenConstraint0subCA2Cert -i /home/tinderbox/pkits/data//certs/pathLenConstraint0subCA2Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint0subCA2CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidSelfIssuedpathLenConstraintTest16EE.crt /home/tinderbox/pkits/data//certs/pathLenConstraint0subCA2Cert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint0SelfIssuedCACert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint0CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. pathLenConstraint0CACert [Certificate Authority]:
  ERROR -8155: Certificate path length constraint is invalid.
CERT 3. CN=pathLenConstraint0 CA,O=Test Certificates 2011,C=US [Certificate Authority]:
  ERROR -8157: Certificate extension not found.
  ERROR -8155: Certificate path length constraint is invalid.
pkits.sh: #6010: Invalid Self-Issued pathLenConstraint Test16 (4)  - PASSED
pkits.sh SUCCESS: Invalid Self-Issued pathLenConstraint Test16 returned as expected 4
Restore DB

***************************************************************
NIST PKITS Section 4.7: Key Usage
***************************************************************

--------------------------------------------------------------------
Test case Invalid keyUsage Critical keyCertSign False Test1

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n keyUsageCriticalkeyCertSignFalseCACert -i /home/tinderbox/pkits/data//certs/keyUsageCriticalkeyCertSignFalseCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/keyUsageCriticalkeyCertSignFalseCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidkeyUsageCriticalkeyCertSignFalseTest1EE.crt /home/tinderbox/pkits/data//certs/keyUsageCriticalkeyCertSignFalseCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. keyUsageCriticalkeyCertSignFalseCACert [Certificate Authority]:
  ERROR -8102: Certificate key usage inadequate for attempted operation.
    CN=Trust Anchor,O=Test Certificates 2011,C=US
pkits.sh: #6011: Invalid keyUsage Critical keyCertSign False Test1 (2)  - PASSED
pkits.sh SUCCESS: Invalid keyUsage Critical keyCertSign False Test1 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid keyUsage Not Critical keyCertSign False Test2

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n keyUsageNotCriticalkeyCertSignFalseCACert -i /home/tinderbox/pkits/data//certs/keyUsageNotCriticalkeyCertSignFalseCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/keyUsageNotCriticalkeyCertSignFalseCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidkeyUsageNotCriticalkeyCertSignFalseTest2EE.crt /home/tinderbox/pkits/data//certs/keyUsageNotCriticalkeyCertSignFalseCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. keyUsageNotCriticalkeyCertSignFalseCACert [Certificate Authority]:
  ERROR -8102: Certificate key usage inadequate for attempted operation.
    CN=Trust Anchor,O=Test Certificates 2011,C=US
pkits.sh: #6012: Invalid keyUsage Not Critical keyCertSign False Test2 (2)  - PASSED
pkits.sh SUCCESS: Invalid keyUsage Not Critical keyCertSign False Test2 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid keyUsage Not Critical Test3

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n keyUsageNotCriticalCACert -i /home/tinderbox/pkits/data//certs/keyUsageNotCriticalCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/keyUsageNotCriticalCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidkeyUsageNotCriticalTest3EE.crt /home/tinderbox/pkits/data//certs/keyUsageNotCriticalCACert.crt
Chain is good!
pkits.sh: #6013: Valid keyUsage Not Critical Test3 - PASSED
pkits.sh SUCCESS: Valid keyUsage Not Critical Test3 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid keyUsage Critical cRLSign False Test4

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n keyUsageCriticalcRLSignFalseCACert -i /home/tinderbox/pkits/data//certs/keyUsageCriticalcRLSignFalseCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/keyUsageCriticalcRLSignFalseCACRL.crl
crlutil: unable to import CRL: Certificate usages field is invalid.
pkits.sh: #6014: Invalid keyUsage Critical cRLSign False Test4 (1)  - PASSED
pkits.sh SUCCESS: Invalid keyUsage Critical cRLSign False Test4 returned as expected 1
Restore DB

--------------------------------------------------------------------
Test case Invalid keyUsage Not Critical cRLSign False Test5

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n keyUsageNotCriticalcRLSignFalseCACert -i /home/tinderbox/pkits/data//certs/keyUsageNotCriticalcRLSignFalseCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/keyUsageNotCriticalcRLSignFalseCACRL.crl
crlutil: unable to import CRL: Certificate usages field is invalid.
pkits.sh: #6015: Invalid keyUsage Not Critical cRLSign False Test5 (1)  - PASSED
pkits.sh SUCCESS: Invalid keyUsage Not Critical cRLSign False Test5 returned as expected 1
Restore DB

***************************************************************
NIST PKITS Section 4.13: Name Constraints
***************************************************************

--------------------------------------------------------------------
Test case Valid DN nameConstraints Test1

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidDNnameConstraintsTest1EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
Chain is good!
pkits.sh: #6016: Valid DN nameConstraints Test1 - PASSED
pkits.sh SUCCESS: Valid DN nameConstraints Test1 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid DN nameConstraints Test2

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNnameConstraintsTest2EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. nameConstraintsDN1CACert [Certificate Authority]:
  ERROR -8187: security library: invalid arguments.
pkits.sh: #6017: Invalid DN nameConstraints Test2 (2)  - PASSED
pkits.sh SUCCESS: Invalid DN nameConstraints Test2 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid DN nameConstraints Test3

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNnameConstraintsTest3EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. nameConstraintsDN1CACert [Certificate Authority]:
  ERROR -8187: security library: invalid arguments.
pkits.sh: #6018: Invalid DN nameConstraints Test3 (2)  - PASSED
pkits.sh SUCCESS: Invalid DN nameConstraints Test3 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid DN nameConstraints Test4

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidDNnameConstraintsTest4EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
Chain is good!
pkits.sh: #6019: Valid DN nameConstraints Test4 - PASSED
pkits.sh SUCCESS: Valid DN nameConstraints Test4 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Valid DN nameConstraints Test5

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsDN2CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN2CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN2CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidDNnameConstraintsTest5EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN2CACert.crt
Chain is good!
pkits.sh: #6020: Valid DN nameConstraints Test5 - PASSED
pkits.sh SUCCESS: Valid DN nameConstraints Test5 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Valid DN nameConstraints Test6

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsDN3CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN3CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN3CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidDNnameConstraintsTest6EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN3CACert.crt
Chain is good!
pkits.sh: #6021: Valid DN nameConstraints Test6 - PASSED
pkits.sh SUCCESS: Valid DN nameConstraints Test6 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid DN nameConstraints Test7

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsDN3CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN3CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN3CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNnameConstraintsTest7EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN3CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. nameConstraintsDN3CACert [Certificate Authority]:
  ERROR -8187: security library: invalid arguments.
pkits.sh: #6022: Invalid DN nameConstraints Test7 (2)  - PASSED
pkits.sh SUCCESS: Invalid DN nameConstraints Test7 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid DN nameConstraints Test8

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsDN4CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN4CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN4CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNnameConstraintsTest8EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN4CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. nameConstraintsDN4CACert [Certificate Authority]:
  ERROR -8187: security library: invalid arguments.
pkits.sh: #6023: Invalid DN nameConstraints Test8 (2)  - PASSED
pkits.sh SUCCESS: Invalid DN nameConstraints Test8 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid DN nameConstraints Test9

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsDN4CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN4CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN4CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNnameConstraintsTest9EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN4CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. nameConstraintsDN4CACert [Certificate Authority]:
  ERROR -8187: security library: invalid arguments.
pkits.sh: #6024: Invalid DN nameConstraints Test9 (2)  - PASSED
pkits.sh SUCCESS: Invalid DN nameConstraints Test9 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid DN nameConstraints Test10

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsDN5CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN5CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN5CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNnameConstraintsTest10EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN5CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. nameConstraintsDN5CACert [Certificate Authority]:
  ERROR -8187: security library: invalid arguments.
pkits.sh: #6025: Invalid DN nameConstraints Test10 (2)  - PASSED
pkits.sh SUCCESS: Invalid DN nameConstraints Test10 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid DN nameConstraints Test11

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsDN5CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN5CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN5CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidDNnameConstraintsTest11EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN5CACert.crt
Chain is good!
pkits.sh: #6026: Valid DN nameConstraints Test11 - PASSED
pkits.sh SUCCESS: Valid DN nameConstraints Test11 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid DN nameConstraints Test12

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1subCA1Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1subCA1Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1subCA1CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNnameConstraintsTest12EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1subCA1Cert.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. nameConstraintsDN1subCA1Cert [Certificate Authority]:
  ERROR -8187: security library: invalid arguments.
pkits.sh: #6027: Invalid DN nameConstraints Test12 (2)  - PASSED
pkits.sh SUCCESS: Invalid DN nameConstraints Test12 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid DN nameConstraints Test13

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1subCA2Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1subCA2Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1subCA2CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNnameConstraintsTest13EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1subCA2Cert.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. nameConstraintsDN1subCA2Cert [Certificate Authority]:
  ERROR -8187: security library: invalid arguments.
pkits.sh: #6028: Invalid DN nameConstraints Test13 (2)  - PASSED
pkits.sh SUCCESS: Invalid DN nameConstraints Test13 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid DN nameConstraints Test14

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1subCA2Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1subCA2Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1subCA2CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidDNnameConstraintsTest14EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1subCA2Cert.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
Chain is good!
pkits.sh: #6029: Valid DN nameConstraints Test14 - PASSED
pkits.sh SUCCESS: Valid DN nameConstraints Test14 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid DN nameConstraints Test15

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsDN3CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN3CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN3CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsDN3subCA1Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN3subCA1Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN3subCA1CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNnameConstraintsTest15EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN3subCA1Cert.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN3CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. nameConstraintsDN3CACert [Certificate Authority]:
  ERROR -8187: security library: invalid arguments.
pkits.sh: #6030: Invalid DN nameConstraints Test15 (2)  - PASSED
pkits.sh SUCCESS: Invalid DN nameConstraints Test15 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid DN nameConstraints Test16

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsDN3CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN3CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN3CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsDN3subCA1Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN3subCA1Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN3subCA1CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNnameConstraintsTest16EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN3subCA1Cert.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN3CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. nameConstraintsDN3subCA1Cert [Certificate Authority]:
  ERROR -8187: security library: invalid arguments.
pkits.sh: #6031: Invalid DN nameConstraints Test16 (2)  - PASSED
pkits.sh SUCCESS: Invalid DN nameConstraints Test16 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid DN nameConstraints Test17

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsDN3CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN3CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN3CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsDN3subCA2Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN3subCA2Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN3subCA2CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNnameConstraintsTest17EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN3subCA2Cert.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN3CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. nameConstraintsDN3CACert [Certificate Authority]:
  ERROR -8187: security library: invalid arguments.
pkits.sh: #6032: Invalid DN nameConstraints Test17 (2)  - PASSED
pkits.sh SUCCESS: Invalid DN nameConstraints Test17 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid DN nameConstraints Test18

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsDN3CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN3CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN3CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsDN3subCA2Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN3subCA2Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN3subCA2CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidDNnameConstraintsTest18EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN3subCA2Cert.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN3CACert.crt
Chain is good!
pkits.sh: #6033: Valid DN nameConstraints Test18 - PASSED
pkits.sh SUCCESS: Valid DN nameConstraints Test18 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid Self-Issued DN nameConstraints Test20

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNnameConstraintsTest20EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=nameConstraints DN1 CA,O=Test Certificates 2011,C=US [Certificate Authority]:
  ERROR -8156: Issuer certificate is invalid.
  ERROR -8157: Certificate extension not found.
pkits.sh: #6034: Invalid Self-Issued DN nameConstraints Test20 (3)  - PASSED
pkits.sh SUCCESS: Invalid Self-Issued DN nameConstraints Test20 returned as expected 3
Restore DB

--------------------------------------------------------------------
Test case Valid RFC822 nameConstraints Test21

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsRFC822CA1Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsRFC822CA1Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsRFC822CA1CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidRFC822nameConstraintsTest21EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsRFC822CA1Cert.crt
Chain is good!
pkits.sh: #6035: Valid RFC822 nameConstraints Test21 - PASSED
pkits.sh SUCCESS: Valid RFC822 nameConstraints Test21 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid RFC822 nameConstraints Test22

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsRFC822CA1Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsRFC822CA1Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsRFC822CA1CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidRFC822nameConstraintsTest22EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsRFC822CA1Cert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. nameConstraintsRFC822CA1Cert [Certificate Authority]:
  ERROR -8187: security library: invalid arguments.
pkits.sh: #6036: Invalid RFC822 nameConstraints Test22 (2)  - PASSED
pkits.sh SUCCESS: Invalid RFC822 nameConstraints Test22 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid RFC822 nameConstraints Test23

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsRFC822CA2Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsRFC822CA2Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsRFC822CA2CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidRFC822nameConstraintsTest23EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsRFC822CA2Cert.crt
Chain is good!
pkits.sh: #6037: Valid RFC822 nameConstraints Test23 - PASSED
pkits.sh SUCCESS: Valid RFC822 nameConstraints Test23 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid RFC822 nameConstraints Test24

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsRFC822CA2Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsRFC822CA2Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsRFC822CA2CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidRFC822nameConstraintsTest24EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsRFC822CA2Cert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. nameConstraintsRFC822CA2Cert [Certificate Authority]:
  ERROR -8187: security library: invalid arguments.
pkits.sh: #6038: Invalid RFC822 nameConstraints Test24 (2)  - PASSED
pkits.sh SUCCESS: Invalid RFC822 nameConstraints Test24 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid RFC822 nameConstraints Test25

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsRFC822CA3Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsRFC822CA3Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsRFC822CA3CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidRFC822nameConstraintsTest25EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsRFC822CA3Cert.crt
Chain is good!
pkits.sh: #6039: Valid RFC822 nameConstraints Test25 - PASSED
pkits.sh SUCCESS: Valid RFC822 nameConstraints Test25 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid RFC822 nameConstraints Test26

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsRFC822CA3Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsRFC822CA3Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsRFC822CA3CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidRFC822nameConstraintsTest26EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsRFC822CA3Cert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. nameConstraintsRFC822CA3Cert [Certificate Authority]:
  ERROR -8187: security library: invalid arguments.
pkits.sh: #6040: Invalid RFC822 nameConstraints Test26 (2)  - PASSED
pkits.sh SUCCESS: Invalid RFC822 nameConstraints Test26 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid DN and RFC822 nameConstraints Test27

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1subCA3Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1subCA3Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1subCA3CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidDNandRFC822nameConstraintsTest27EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1subCA3Cert.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
Chain is good!
pkits.sh: #6041: Valid DN and RFC822 nameConstraints Test27 - PASSED
pkits.sh SUCCESS: Valid DN and RFC822 nameConstraints Test27 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid DN and RFC822 nameConstraints Test28

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1subCA3Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1subCA3Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1subCA3CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNandRFC822nameConstraintsTest28EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1subCA3Cert.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. nameConstraintsDN1subCA3Cert [Certificate Authority]:
  ERROR -8187: security library: invalid arguments.
pkits.sh: #6042: Invalid DN and RFC822 nameConstraints Test28 (2)  - PASSED
pkits.sh SUCCESS: Invalid DN and RFC822 nameConstraints Test28 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid DN and RFC822 nameConstraints Test29

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1subCA3Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1subCA3Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1subCA3CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNandRFC822nameConstraintsTest29EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1subCA3Cert.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. nameConstraintsDN1subCA3Cert [Certificate Authority]:
  ERROR -8187: security library: invalid arguments.
pkits.sh: #6043: Invalid DN and RFC822 nameConstraints Test29 (2)  - PASSED
pkits.sh SUCCESS: Invalid DN and RFC822 nameConstraints Test29 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid DNS nameConstraints Test30

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsDNS1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDNS1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDNS1CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidDNSnameConstraintsTest30EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDNS1CACert.crt
Chain is good!
pkits.sh: #6044: Valid DNS nameConstraints Test30 - PASSED
pkits.sh SUCCESS: Valid DNS nameConstraints Test30 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid DNS nameConstraints Test31

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsDNS1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDNS1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDNS1CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNSnameConstraintsTest31EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDNS1CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. nameConstraintsDNS1CACert [Certificate Authority]:
  ERROR -8187: security library: invalid arguments.
pkits.sh: #6045: Invalid DNS nameConstraints Test31 (2)  - PASSED
pkits.sh SUCCESS: Invalid DNS nameConstraints Test31 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid DNS nameConstraints Test32

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsDNS2CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDNS2CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDNS2CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidDNSnameConstraintsTest32EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDNS2CACert.crt
Chain is good!
pkits.sh: #6046: Valid DNS nameConstraints Test32 - PASSED
pkits.sh SUCCESS: Valid DNS nameConstraints Test32 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid DNS nameConstraints Test33

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsDNS2CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDNS2CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDNS2CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNSnameConstraintsTest33EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDNS2CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. nameConstraintsDNS2CACert [Certificate Authority]:
  ERROR -8187: security library: invalid arguments.
pkits.sh: #6047: Invalid DNS nameConstraints Test33 (2)  - PASSED
pkits.sh SUCCESS: Invalid DNS nameConstraints Test33 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid URI nameConstraints Test34

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsURI1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsURI1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsURI1CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidURInameConstraintsTest34EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsURI1CACert.crt
Chain is good!
pkits.sh: #6048: Valid URI nameConstraints Test34 - PASSED
pkits.sh SUCCESS: Valid URI nameConstraints Test34 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid URI nameConstraints Test35

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsURI1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsURI1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsURI1CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidURInameConstraintsTest35EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsURI1CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. nameConstraintsURI1CACert [Certificate Authority]:
  ERROR -8187: security library: invalid arguments.
pkits.sh: #6049: Invalid URI nameConstraints Test35 (2)  - PASSED
pkits.sh SUCCESS: Invalid URI nameConstraints Test35 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid URI nameConstraints Test36

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsURI2CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsURI2CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsURI2CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidURInameConstraintsTest36EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsURI2CACert.crt
Chain is good!
pkits.sh: #6050: Valid URI nameConstraints Test36 - PASSED
pkits.sh SUCCESS: Valid URI nameConstraints Test36 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid URI nameConstraints Test37

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsURI2CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsURI2CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsURI2CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidURInameConstraintsTest37EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsURI2CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. nameConstraintsURI2CACert [Certificate Authority]:
  ERROR -8187: security library: invalid arguments.
pkits.sh: #6051: Invalid URI nameConstraints Test37 (2)  - PASSED
pkits.sh SUCCESS: Invalid URI nameConstraints Test37 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid DNS nameConstraints Test38

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsDNS1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDNS1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDNS1CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNSnameConstraintsTest38EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDNS1CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. nameConstraintsDNS1CACert [Certificate Authority]:
  ERROR -8187: security library: invalid arguments.
pkits.sh: #6052: Invalid DNS nameConstraints Test38 (2)  - PASSED
pkits.sh SUCCESS: Invalid DNS nameConstraints Test38 returned as expected 2
Restore DB

***************************************************************
NIST PKITS Section 4.16: Private Certificate Extensions
***************************************************************

--------------------------------------------------------------------
Test case Valid Unknown Not Critical Certificate Extension Test1

vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidUnknownNotCriticalCertificateExtensionTest1EE.crt
Chain is good!
pkits.sh: #6053: Valid Unknown Not Critical Certificate Extension Test1 - PASSED
pkits.sh SUCCESS: Valid Unknown Not Critical Certificate Extension Test1 returned as expected 0

--------------------------------------------------------------------
Test case Invalid Unknown Critical Certificate Extension Test2

vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidUnknownCriticalCertificateExtensionTest2EE.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. TrustAnchorRootCertificate [Certificate Authority]:
  ERROR -8151: Certificate contains unknown critical extension.
pkits.sh: #6054: Invalid Unknown Critical Certificate Extension Test2 (2)  - PASSED
pkits.sh SUCCESS: Invalid Unknown Critical Certificate Extension Test2 returned as expected 2
TIMESTAMP pkits END: Wed Nov 28 11:10:10 EST 2012
Running tests for chains
TIMESTAMP chains BEGIN: Wed Nov 28 11:10:10 EST 2012
~/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/aiahttp ~/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/chains
httpserv starting at Wed Nov 28 11:10:10 EST 2012
httpserv -D -p 8556  \
         -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/aiahttp/http_pid.10869  &
trying to connect to httpserv at Wed Nov 28 11:10:10 EST 2012
tstclnt -p 8556 -h buildnss02.usersys.redhat.com -q -v
tstclnt: connecting to buildnss02.usersys.redhat.com:8556 (address=10.16.79.157)
kill -0 4732 >/dev/null 2>/dev/null
httpserv with PID 4732 found at Wed Nov 28 11:10:10 EST 2012
httpserv with PID 4732 started at Wed Nov 28 11:10:10 EST 2012
~/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/chains
chains.sh: Certificate Chains Tests ===============================
chains.sh: Creating DB ArmyDB
certutil -N -d ArmyDB -f ArmyDB/dbpasswd
chains.sh: #6055: Bridge: Creating DB ArmyDB  - PASSED
chains.sh: Creating Root CA Army
certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army  -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -m 1128111011 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #6056: Bridge: Creating Root CA Army  - PASSED
chains.sh: Exporting Root CA Army.der
certutil -L -d ArmyDB -r -n Army -o Army.der
chains.sh: #6057: Bridge: Exporting Root CA Army.der  - PASSED
chains.sh: Creating DB NavyDB
certutil -N -d NavyDB -f NavyDB/dbpasswd
chains.sh: #6058: Bridge: Creating DB NavyDB  - PASSED
chains.sh: Creating Root CA Navy
certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy  -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -m 1128111012 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #6059: Bridge: Creating Root CA Navy  - PASSED
chains.sh: Exporting Root CA Navy.der
certutil -L -d NavyDB -r -n Navy -o Navy.der
chains.sh: #6060: Bridge: Exporting Root CA Navy.der  - PASSED
chains.sh: Creating DB BridgeDB
certutil -N -d BridgeDB -f BridgeDB/dbpasswd
chains.sh: #6061: Bridge: Creating DB BridgeDB  - PASSED
chains.sh: Creating Bridge certifiate request BridgeReq.der
certutil -s "CN=Bridge Bridge, O=Bridge, C=US"  -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o BridgeReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6062: Bridge: Creating Bridge certifiate request BridgeReq.der  - PASSED
chains.sh: Creating certficate BridgeArmy.der signed by Army
certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1128111013 -7 Bridge@Army  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6063: Bridge: Creating certficate BridgeArmy.der signed by Army  - PASSED
chains.sh: Importing certificate BridgeArmy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der
chains.sh: #6064: Bridge: Importing certificate BridgeArmy.der to BridgeDB database  - PASSED
chains.sh: Creating certficate BridgeNavy.der signed by Navy
certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1128111014 -7 Bridge@Navy  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6065: Bridge: Creating certficate BridgeNavy.der signed by Navy  - PASSED
chains.sh: Importing certificate BridgeNavy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der
chains.sh: #6066: Bridge: Importing certificate BridgeNavy.der to BridgeDB database  - PASSED
chains.sh: Generating PKCS7 package from BridgeDB database
cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7
chains.sh: #6067: Bridge: Generating PKCS7 package from BridgeDB database  - PASSED
chains.sh: Creating DB UserDB
certutil -N -d UserDB -f UserDB/dbpasswd
chains.sh: #6068: Bridge: Creating DB UserDB  - PASSED
chains.sh: Creating EE certifiate request UserReq.der
certutil -s "CN=User EE, O=User, C=US"  -R  -d UserDB -f UserDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o UserReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6069: Bridge: Creating EE certifiate request UserReq.der  - PASSED
chains.sh: Creating certficate UserBridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 1128111015   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6070: Bridge: Creating certficate UserBridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate UserBridge.der to UserDB database
certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der
chains.sh: #6071: Bridge: Importing certificate UserBridge.der to UserDB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #6072: Bridge: Creating DB AllDB  - PASSED
chains.sh: Importing certificate Army.der to AllDB database
certutil -A -n Army  -t "" -d AllDB -f AllDB/dbpasswd -i Army.der
chains.sh: #6073: Bridge: Importing certificate Army.der to AllDB database  - PASSED
chains.sh: Importing certificate Navy.der to AllDB database
certutil -A -n Navy  -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der
chains.sh: #6074: Bridge: Importing certificate Navy.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags  -d AllDB     -t Navy
vfychain -d AllDB -pp -vv      UserBridge.der BridgeNavy.der  -t Navy
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128111012 (0x433d9ba4)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 16:10:10 2012
            Not After : Tue Nov 28 16:10:10 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e3:fc:4f:5f:75:30:7c:7b:9e:48:fa:2f:89:42:00:40:
                    75:48:3e:8d:74:2a:0f:83:5c:fd:a3:63:cc:70:e9:f5:
                    8e:9f:6a:50:21:f1:ac:e8:d9:59:b2:07:2c:9b:39:b1:
                    06:c2:97:99:77:21:8a:6a:78:ce:62:43:fe:65:eb:33:
                    41:cf:bb:0f:2b:93:fa:53:32:fc:fe:d9:7c:9d:f7:9b:
                    d9:a3:df:d7:09:54:a9:6d:01:91:3d:0b:b9:35:91:a7:
                    97:7a:fe:17:38:f0:70:1b:22:e0:b8:b5:66:de:ea:3e:
                    52:5c:b8:3d:42:89:69:4e:25:89:a1:09:bf:3b:8a:8d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        40:bd:f3:79:eb:60:66:0c:99:e2:9b:a3:3f:bf:fa:d7:
        57:30:49:31:2d:a3:4c:f9:dd:f9:c5:18:cd:b4:d3:67:
        eb:e2:66:d9:c6:83:e5:1d:51:ce:65:09:cb:5f:bf:e7:
        26:be:c8:b1:95:b8:92:8d:c3:d5:11:8f:71:91:59:2d:
        d7:36:2e:10:96:fd:4c:05:80:41:76:a8:b3:51:fb:66:
        7a:ce:17:f9:92:2c:25:5c:83:7c:ec:07:26:b1:5a:5c:
        b7:42:b7:72:b2:23:f0:27:12:53:b1:bd:10:f3:91:44:
        b5:79:64:d1:ca:6e:9f:f3:0c:98:e3:50:5a:e0:48:91
    Fingerprint (MD5):
        F1:82:3C:2C:DB:14:7A:E8:74:04:CA:4F:DC:45:0B:62
    Fingerprint (SHA1):
        A7:01:06:85:35:2C:EF:56:B2:BE:20:6E:D0:9D:88:02:A9:63:8E:76

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #6075: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags  -d AllDB     -t Navy - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags  -d AllDB     -t Army
vfychain -d AllDB -pp -vv      UserBridge.der BridgeArmy.der  -t Army
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128111011 (0x433d9ba3)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Wed Nov 28 16:10:10 2012
            Not After : Tue Nov 28 16:10:10 2062
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e4:4d:2c:9f:78:41:3b:e5:45:1e:4e:0e:17:4d:f6:53:
                    28:cb:6a:73:53:01:2e:84:15:fe:88:81:32:b3:1b:10:
                    96:d0:79:96:9b:5a:b5:ca:65:94:0b:ee:a8:33:ec:b3:
                    37:14:46:e2:de:72:12:9e:0b:de:19:8a:e0:67:d6:7b:
                    05:4d:2f:f1:65:d6:2d:50:c0:88:4f:a4:2f:19:fa:a6:
                    61:04:08:f3:76:8b:0f:cf:1b:1d:e5:7e:08:c5:15:b4:
                    3b:12:b0:52:f7:d0:03:cc:03:d1:6f:69:e8:e1:98:5b:
                    5c:0a:3e:d2:ac:36:73:20:ce:fc:06:71:7e:48:d9:3b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        54:dc:da:cf:43:e0:b5:8f:94:bf:80:95:28:df:aa:e8:
        45:b0:fe:1b:4e:67:ac:a2:09:a7:2d:6f:83:a8:19:c4:
        dc:2b:66:cb:36:2d:e8:c5:c9:97:56:c1:50:1a:4f:0d:
        ff:da:41:43:fa:20:7f:cd:fa:c5:0a:02:da:b5:e5:33:
        3a:67:41:79:b4:2d:61:16:b4:21:a0:82:f3:05:2c:77:
        ec:a9:59:85:ea:a8:13:e7:be:d6:b6:f5:91:fa:1b:4b:
        71:47:4d:b8:95:11:c9:4e:93:03:ba:a3:8f:30:97:94:
        1b:2d:63:1d:9d:6a:dd:77:39:05:90:4a:2b:47:cd:7b
    Fingerprint (MD5):
        CA:8A:C2:7D:CE:73:69:45:A4:DD:82:C5:19:F2:F3:DC
    Fingerprint (SHA1):
        6A:C8:45:22:B5:7F:BE:54:86:2D:1A:FC:71:26:ED:9C:2D:E3:2D:0A

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #6076: Bridge: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags  -d AllDB     -t Army - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags  -d AllDB     -t Army
vfychain -d AllDB -pp -vv      UserBridge.der BridgeNavy.der  -t Army
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Navy [Certificate Authority]:
  ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user.
    CN=Navy ROOT CA,O=Navy,C=US
Returned value is 1, expected result is fail
chains.sh: #6077: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags  -d AllDB     -t Army - PASSED
chains.sh: Importing certificate BridgeArmy.der to AllDB database
certutil -A -n Bridge  -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der
chains.sh: #6078: Bridge: Importing certificate BridgeArmy.der to AllDB database  - PASSED
chains.sh: Importing certificate BridgeNavy.der to AllDB database
certutil -A -n Bridge  -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der
chains.sh: #6079: Bridge: Importing certificate BridgeNavy.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der with flags  -d AllDB     -t Army
vfychain -d AllDB -pp -vv      UserBridge.der  -t Army
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128111011 (0x433d9ba3)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Wed Nov 28 16:10:10 2012
            Not After : Tue Nov 28 16:10:10 2062
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e4:4d:2c:9f:78:41:3b:e5:45:1e:4e:0e:17:4d:f6:53:
                    28:cb:6a:73:53:01:2e:84:15:fe:88:81:32:b3:1b:10:
                    96:d0:79:96:9b:5a:b5:ca:65:94:0b:ee:a8:33:ec:b3:
                    37:14:46:e2:de:72:12:9e:0b:de:19:8a:e0:67:d6:7b:
                    05:4d:2f:f1:65:d6:2d:50:c0:88:4f:a4:2f:19:fa:a6:
                    61:04:08:f3:76:8b:0f:cf:1b:1d:e5:7e:08:c5:15:b4:
                    3b:12:b0:52:f7:d0:03:cc:03:d1:6f:69:e8:e1:98:5b:
                    5c:0a:3e:d2:ac:36:73:20:ce:fc:06:71:7e:48:d9:3b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        54:dc:da:cf:43:e0:b5:8f:94:bf:80:95:28:df:aa:e8:
        45:b0:fe:1b:4e:67:ac:a2:09:a7:2d:6f:83:a8:19:c4:
        dc:2b:66:cb:36:2d:e8:c5:c9:97:56:c1:50:1a:4f:0d:
        ff:da:41:43:fa:20:7f:cd:fa:c5:0a:02:da:b5:e5:33:
        3a:67:41:79:b4:2d:61:16:b4:21:a0:82:f3:05:2c:77:
        ec:a9:59:85:ea:a8:13:e7:be:d6:b6:f5:91:fa:1b:4b:
        71:47:4d:b8:95:11:c9:4e:93:03:ba:a3:8f:30:97:94:
        1b:2d:63:1d:9d:6a:dd:77:39:05:90:4a:2b:47:cd:7b
    Fingerprint (MD5):
        CA:8A:C2:7D:CE:73:69:45:A4:DD:82:C5:19:F2:F3:DC
    Fingerprint (SHA1):
        6A:C8:45:22:B5:7F:BE:54:86:2D:1A:FC:71:26:ED:9C:2D:E3:2D:0A

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #6080: Bridge: Verifying certificate(s)  UserBridge.der with flags  -d AllDB     -t Army - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der with flags  -d AllDB     -t Navy
vfychain -d AllDB -pp -vv      UserBridge.der  -t Navy
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128111012 (0x433d9ba4)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 16:10:10 2012
            Not After : Tue Nov 28 16:10:10 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e3:fc:4f:5f:75:30:7c:7b:9e:48:fa:2f:89:42:00:40:
                    75:48:3e:8d:74:2a:0f:83:5c:fd:a3:63:cc:70:e9:f5:
                    8e:9f:6a:50:21:f1:ac:e8:d9:59:b2:07:2c:9b:39:b1:
                    06:c2:97:99:77:21:8a:6a:78:ce:62:43:fe:65:eb:33:
                    41:cf:bb:0f:2b:93:fa:53:32:fc:fe:d9:7c:9d:f7:9b:
                    d9:a3:df:d7:09:54:a9:6d:01:91:3d:0b:b9:35:91:a7:
                    97:7a:fe:17:38:f0:70:1b:22:e0:b8:b5:66:de:ea:3e:
                    52:5c:b8:3d:42:89:69:4e:25:89:a1:09:bf:3b:8a:8d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        40:bd:f3:79:eb:60:66:0c:99:e2:9b:a3:3f:bf:fa:d7:
        57:30:49:31:2d:a3:4c:f9:dd:f9:c5:18:cd:b4:d3:67:
        eb:e2:66:d9:c6:83:e5:1d:51:ce:65:09:cb:5f:bf:e7:
        26:be:c8:b1:95:b8:92:8d:c3:d5:11:8f:71:91:59:2d:
        d7:36:2e:10:96:fd:4c:05:80:41:76:a8:b3:51:fb:66:
        7a:ce:17:f9:92:2c:25:5c:83:7c:ec:07:26:b1:5a:5c:
        b7:42:b7:72:b2:23:f0:27:12:53:b1:bd:10:f3:91:44:
        b5:79:64:d1:ca:6e:9f:f3:0c:98:e3:50:5a:e0:48:91
    Fingerprint (MD5):
        F1:82:3C:2C:DB:14:7A:E8:74:04:CA:4F:DC:45:0B:62
    Fingerprint (SHA1):
        A7:01:06:85:35:2C:EF:56:B2:BE:20:6E:D0:9D:88:02:A9:63:8E:76

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #6081: Bridge: Verifying certificate(s)  UserBridge.der with flags  -d AllDB     -t Navy - PASSED
chains.sh: Creating DB ArmyOnlyDB
certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd
chains.sh: #6082: Bridge: Creating DB ArmyOnlyDB  - PASSED
chains.sh: Importing certificate Army.der to ArmyOnlyDB database
certutil -A -n Army  -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der
chains.sh: #6083: Bridge: Importing certificate Army.der to ArmyOnlyDB database  - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der with flags  -d ArmyOnlyDB    
vfychain -d ArmyOnlyDB -pp -vv      UserBridge.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=User EE,O=User,C=US :
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Bridge Bridge,O=Bridge,C=US
Returned value is 1, expected result is fail
chains.sh: #6084: Bridge: Verifying certificate(s)  UserBridge.der with flags  -d ArmyOnlyDB     - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags  -d ArmyOnlyDB    
vfychain -d ArmyOnlyDB -pp -vv      UserBridge.der BridgeNavy.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. bridge@navy [Certificate Authority]:
Email Address(es): bridge@navy
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Navy ROOT CA,O=Navy,C=US
Returned value is 1, expected result is fail
chains.sh: #6085: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags  -d ArmyOnlyDB     - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der Navy.der with flags  -d ArmyOnlyDB    
vfychain -d ArmyOnlyDB -pp -vv      UserBridge.der BridgeNavy.der Navy.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user.
    CN=Navy ROOT CA,O=Navy,C=US
Returned value is 1, expected result is fail
chains.sh: #6086: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der Navy.der with flags  -d ArmyOnlyDB     - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der Navy.der with flags  -d ArmyOnlyDB     -t Navy.der
vfychain -d ArmyOnlyDB -pp -vv      UserBridge.der BridgeNavy.der Navy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128111012 (0x433d9ba4)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 16:10:10 2012
            Not After : Tue Nov 28 16:10:10 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e3:fc:4f:5f:75:30:7c:7b:9e:48:fa:2f:89:42:00:40:
                    75:48:3e:8d:74:2a:0f:83:5c:fd:a3:63:cc:70:e9:f5:
                    8e:9f:6a:50:21:f1:ac:e8:d9:59:b2:07:2c:9b:39:b1:
                    06:c2:97:99:77:21:8a:6a:78:ce:62:43:fe:65:eb:33:
                    41:cf:bb:0f:2b:93:fa:53:32:fc:fe:d9:7c:9d:f7:9b:
                    d9:a3:df:d7:09:54:a9:6d:01:91:3d:0b:b9:35:91:a7:
                    97:7a:fe:17:38:f0:70:1b:22:e0:b8:b5:66:de:ea:3e:
                    52:5c:b8:3d:42:89:69:4e:25:89:a1:09:bf:3b:8a:8d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        40:bd:f3:79:eb:60:66:0c:99:e2:9b:a3:3f:bf:fa:d7:
        57:30:49:31:2d:a3:4c:f9:dd:f9:c5:18:cd:b4:d3:67:
        eb:e2:66:d9:c6:83:e5:1d:51:ce:65:09:cb:5f:bf:e7:
        26:be:c8:b1:95:b8:92:8d:c3:d5:11:8f:71:91:59:2d:
        d7:36:2e:10:96:fd:4c:05:80:41:76:a8:b3:51:fb:66:
        7a:ce:17:f9:92:2c:25:5c:83:7c:ec:07:26:b1:5a:5c:
        b7:42:b7:72:b2:23:f0:27:12:53:b1:bd:10:f3:91:44:
        b5:79:64:d1:ca:6e:9f:f3:0c:98:e3:50:5a:e0:48:91
    Fingerprint (MD5):
        F1:82:3C:2C:DB:14:7A:E8:74:04:CA:4F:DC:45:0B:62
    Fingerprint (SHA1):
        A7:01:06:85:35:2C:EF:56:B2:BE:20:6E:D0:9D:88:02:A9:63:8E:76


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #6087: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der Navy.der with flags  -d ArmyOnlyDB     -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags  -d ArmyOnlyDB     -t Navy.der
vfychain -d ArmyOnlyDB -pp -vv      UserBridge.der BridgeNavy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128111012 (0x433d9ba4)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 16:10:10 2012
            Not After : Tue Nov 28 16:10:10 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e3:fc:4f:5f:75:30:7c:7b:9e:48:fa:2f:89:42:00:40:
                    75:48:3e:8d:74:2a:0f:83:5c:fd:a3:63:cc:70:e9:f5:
                    8e:9f:6a:50:21:f1:ac:e8:d9:59:b2:07:2c:9b:39:b1:
                    06:c2:97:99:77:21:8a:6a:78:ce:62:43:fe:65:eb:33:
                    41:cf:bb:0f:2b:93:fa:53:32:fc:fe:d9:7c:9d:f7:9b:
                    d9:a3:df:d7:09:54:a9:6d:01:91:3d:0b:b9:35:91:a7:
                    97:7a:fe:17:38:f0:70:1b:22:e0:b8:b5:66:de:ea:3e:
                    52:5c:b8:3d:42:89:69:4e:25:89:a1:09:bf:3b:8a:8d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        40:bd:f3:79:eb:60:66:0c:99:e2:9b:a3:3f:bf:fa:d7:
        57:30:49:31:2d:a3:4c:f9:dd:f9:c5:18:cd:b4:d3:67:
        eb:e2:66:d9:c6:83:e5:1d:51:ce:65:09:cb:5f:bf:e7:
        26:be:c8:b1:95:b8:92:8d:c3:d5:11:8f:71:91:59:2d:
        d7:36:2e:10:96:fd:4c:05:80:41:76:a8:b3:51:fb:66:
        7a:ce:17:f9:92:2c:25:5c:83:7c:ec:07:26:b1:5a:5c:
        b7:42:b7:72:b2:23:f0:27:12:53:b1:bd:10:f3:91:44:
        b5:79:64:d1:ca:6e:9f:f3:0c:98:e3:50:5a:e0:48:91
    Fingerprint (MD5):
        F1:82:3C:2C:DB:14:7A:E8:74:04:CA:4F:DC:45:0B:62
    Fingerprint (SHA1):
        A7:01:06:85:35:2C:EF:56:B2:BE:20:6E:D0:9D:88:02:A9:63:8E:76


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #6088: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags  -d ArmyOnlyDB     -t Navy.der - PASSED
chains.sh: Creating DB NavyOnlyDB
certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd
chains.sh: #6089: Bridge: Creating DB NavyOnlyDB  - PASSED
chains.sh: Importing certificate Navy.der to NavyOnlyDB database
certutil -A -n Navy  -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der
chains.sh: #6090: Bridge: Importing certificate Navy.der to NavyOnlyDB database  - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der with flags  -d NavyOnlyDB    
vfychain -d NavyOnlyDB -pp -vv      UserBridge.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=User EE,O=User,C=US :
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Bridge Bridge,O=Bridge,C=US
Returned value is 1, expected result is fail
chains.sh: #6091: Bridge: Verifying certificate(s)  UserBridge.der with flags  -d NavyOnlyDB     - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags  -d NavyOnlyDB    
vfychain -d NavyOnlyDB -pp -vv      UserBridge.der BridgeArmy.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. bridge@army [Certificate Authority]:
Email Address(es): bridge@army
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Army ROOT CA,O=Army,C=US
Returned value is 1, expected result is fail
chains.sh: #6092: Bridge: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags  -d NavyOnlyDB     - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeArmy.der Army.der with flags  -d NavyOnlyDB    
vfychain -d NavyOnlyDB -pp -vv      UserBridge.der BridgeArmy.der Army.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user.
    CN=Army ROOT CA,O=Army,C=US
Returned value is 1, expected result is fail
chains.sh: #6093: Bridge: Verifying certificate(s)  UserBridge.der BridgeArmy.der Army.der with flags  -d NavyOnlyDB     - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeArmy.der Army.der with flags  -d NavyOnlyDB     -t Army.der
vfychain -d NavyOnlyDB -pp -vv      UserBridge.der BridgeArmy.der Army.der  -t Army.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128111011 (0x433d9ba3)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Wed Nov 28 16:10:10 2012
            Not After : Tue Nov 28 16:10:10 2062
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e4:4d:2c:9f:78:41:3b:e5:45:1e:4e:0e:17:4d:f6:53:
                    28:cb:6a:73:53:01:2e:84:15:fe:88:81:32:b3:1b:10:
                    96:d0:79:96:9b:5a:b5:ca:65:94:0b:ee:a8:33:ec:b3:
                    37:14:46:e2:de:72:12:9e:0b:de:19:8a:e0:67:d6:7b:
                    05:4d:2f:f1:65:d6:2d:50:c0:88:4f:a4:2f:19:fa:a6:
                    61:04:08:f3:76:8b:0f:cf:1b:1d:e5:7e:08:c5:15:b4:
                    3b:12:b0:52:f7:d0:03:cc:03:d1:6f:69:e8:e1:98:5b:
                    5c:0a:3e:d2:ac:36:73:20:ce:fc:06:71:7e:48:d9:3b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        54:dc:da:cf:43:e0:b5:8f:94:bf:80:95:28:df:aa:e8:
        45:b0:fe:1b:4e:67:ac:a2:09:a7:2d:6f:83:a8:19:c4:
        dc:2b:66:cb:36:2d:e8:c5:c9:97:56:c1:50:1a:4f:0d:
        ff:da:41:43:fa:20:7f:cd:fa:c5:0a:02:da:b5:e5:33:
        3a:67:41:79:b4:2d:61:16:b4:21:a0:82:f3:05:2c:77:
        ec:a9:59:85:ea:a8:13:e7:be:d6:b6:f5:91:fa:1b:4b:
        71:47:4d:b8:95:11:c9:4e:93:03:ba:a3:8f:30:97:94:
        1b:2d:63:1d:9d:6a:dd:77:39:05:90:4a:2b:47:cd:7b
    Fingerprint (MD5):
        CA:8A:C2:7D:CE:73:69:45:A4:DD:82:C5:19:F2:F3:DC
    Fingerprint (SHA1):
        6A:C8:45:22:B5:7F:BE:54:86:2D:1A:FC:71:26:ED:9C:2D:E3:2D:0A


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #6094: Bridge: Verifying certificate(s)  UserBridge.der BridgeArmy.der Army.der with flags  -d NavyOnlyDB     -t Army.der - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags  -d NavyOnlyDB     -t Army.der
vfychain -d NavyOnlyDB -pp -vv      UserBridge.der BridgeArmy.der  -t Army.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128111011 (0x433d9ba3)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Wed Nov 28 16:10:10 2012
            Not After : Tue Nov 28 16:10:10 2062
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e4:4d:2c:9f:78:41:3b:e5:45:1e:4e:0e:17:4d:f6:53:
                    28:cb:6a:73:53:01:2e:84:15:fe:88:81:32:b3:1b:10:
                    96:d0:79:96:9b:5a:b5:ca:65:94:0b:ee:a8:33:ec:b3:
                    37:14:46:e2:de:72:12:9e:0b:de:19:8a:e0:67:d6:7b:
                    05:4d:2f:f1:65:d6:2d:50:c0:88:4f:a4:2f:19:fa:a6:
                    61:04:08:f3:76:8b:0f:cf:1b:1d:e5:7e:08:c5:15:b4:
                    3b:12:b0:52:f7:d0:03:cc:03:d1:6f:69:e8:e1:98:5b:
                    5c:0a:3e:d2:ac:36:73:20:ce:fc:06:71:7e:48:d9:3b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        54:dc:da:cf:43:e0:b5:8f:94:bf:80:95:28:df:aa:e8:
        45:b0:fe:1b:4e:67:ac:a2:09:a7:2d:6f:83:a8:19:c4:
        dc:2b:66:cb:36:2d:e8:c5:c9:97:56:c1:50:1a:4f:0d:
        ff:da:41:43:fa:20:7f:cd:fa:c5:0a:02:da:b5:e5:33:
        3a:67:41:79:b4:2d:61:16:b4:21:a0:82:f3:05:2c:77:
        ec:a9:59:85:ea:a8:13:e7:be:d6:b6:f5:91:fa:1b:4b:
        71:47:4d:b8:95:11:c9:4e:93:03:ba:a3:8f:30:97:94:
        1b:2d:63:1d:9d:6a:dd:77:39:05:90:4a:2b:47:cd:7b
    Fingerprint (MD5):
        CA:8A:C2:7D:CE:73:69:45:A4:DD:82:C5:19:F2:F3:DC
    Fingerprint (SHA1):
        6A:C8:45:22:B5:7F:BE:54:86:2D:1A:FC:71:26:ED:9C:2D:E3:2D:0A


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #6095: Bridge: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags  -d NavyOnlyDB     -t Army.der - PASSED
chains.sh: Creating DB Root1DB
certutil -N -d Root1DB -f Root1DB/dbpasswd
chains.sh: #6096: MegaBridge_3_2: Creating DB Root1DB  - PASSED
chains.sh: Creating Root CA Root1
certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1  -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -m 1128111016 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #6097: MegaBridge_3_2: Creating Root CA Root1  - PASSED
chains.sh: Exporting Root CA Root1.der
certutil -L -d Root1DB -r -n Root1 -o Root1.der
chains.sh: #6098: MegaBridge_3_2: Exporting Root CA Root1.der  - PASSED
chains.sh: Creating DB Root2DB
certutil -N -d Root2DB -f Root2DB/dbpasswd
chains.sh: #6099: MegaBridge_3_2: Creating DB Root2DB  - PASSED
chains.sh: Creating Root CA Root2
certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2  -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -m 1128111017 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #6100: MegaBridge_3_2: Creating Root CA Root2  - PASSED
chains.sh: Exporting Root CA Root2.der
certutil -L -d Root2DB -r -n Root2 -o Root2.der
chains.sh: #6101: MegaBridge_3_2: Exporting Root CA Root2.der  - PASSED
chains.sh: Creating DB Root3DB
certutil -N -d Root3DB -f Root3DB/dbpasswd
chains.sh: #6102: MegaBridge_3_2: Creating DB Root3DB  - PASSED
chains.sh: Creating Root CA Root3
certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3  -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -m 1128111018 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #6103: MegaBridge_3_2: Creating Root CA Root3  - PASSED
chains.sh: Exporting Root CA Root3.der
certutil -L -d Root3DB -r -n Root3 -o Root3.der
chains.sh: #6104: MegaBridge_3_2: Exporting Root CA Root3.der  - PASSED
chains.sh: Creating DB Root4DB
certutil -N -d Root4DB -f Root4DB/dbpasswd
chains.sh: #6105: MegaBridge_3_2: Creating DB Root4DB  - PASSED
chains.sh: Creating Root CA Root4
certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4  -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -m 1128111019 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #6106: MegaBridge_3_2: Creating Root CA Root4  - PASSED
chains.sh: Exporting Root CA Root4.der
certutil -L -d Root4DB -r -n Root4 -o Root4.der
chains.sh: #6107: MegaBridge_3_2: Exporting Root CA Root4.der  - PASSED
chains.sh: Creating DB Root5DB
certutil -N -d Root5DB -f Root5DB/dbpasswd
chains.sh: #6108: MegaBridge_3_2: Creating DB Root5DB  - PASSED
chains.sh: Creating Root CA Root5
certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5  -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -m 1128111020 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #6109: MegaBridge_3_2: Creating Root CA Root5  - PASSED
chains.sh: Exporting Root CA Root5.der
certutil -L -d Root5DB -r -n Root5 -o Root5.der
chains.sh: #6110: MegaBridge_3_2: Exporting Root CA Root5.der  - PASSED
chains.sh: Creating DB Root6DB
certutil -N -d Root6DB -f Root6DB/dbpasswd
chains.sh: #6111: MegaBridge_3_2: Creating DB Root6DB  - PASSED
chains.sh: Creating Root CA Root6
certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6  -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -m 1128111021 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #6112: MegaBridge_3_2: Creating Root CA Root6  - PASSED
chains.sh: Exporting Root CA Root6.der
certutil -L -d Root6DB -r -n Root6 -o Root6.der
chains.sh: #6113: MegaBridge_3_2: Exporting Root CA Root6.der  - PASSED
chains.sh: Creating DB Root7DB
certutil -N -d Root7DB -f Root7DB/dbpasswd
chains.sh: #6114: MegaBridge_3_2: Creating DB Root7DB  - PASSED
chains.sh: Creating Root CA Root7
certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7  -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -m 1128111022 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #6115: MegaBridge_3_2: Creating Root CA Root7  - PASSED
chains.sh: Exporting Root CA Root7.der
certutil -L -d Root7DB -r -n Root7 -o Root7.der
chains.sh: #6116: MegaBridge_3_2: Exporting Root CA Root7.der  - PASSED
chains.sh: Creating DB Root8DB
certutil -N -d Root8DB -f Root8DB/dbpasswd
chains.sh: #6117: MegaBridge_3_2: Creating DB Root8DB  - PASSED
chains.sh: Creating Root CA Root8
certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8  -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -m 1128111023 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #6118: MegaBridge_3_2: Creating Root CA Root8  - PASSED
chains.sh: Exporting Root CA Root8.der
certutil -L -d Root8DB -r -n Root8 -o Root8.der
chains.sh: #6119: MegaBridge_3_2: Exporting Root CA Root8.der  - PASSED
chains.sh: Creating DB Root9DB
certutil -N -d Root9DB -f Root9DB/dbpasswd
chains.sh: #6120: MegaBridge_3_2: Creating DB Root9DB  - PASSED
chains.sh: Creating Root CA Root9
certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9  -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -m 1128111024 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #6121: MegaBridge_3_2: Creating Root CA Root9  - PASSED
chains.sh: Exporting Root CA Root9.der
certutil -L -d Root9DB -r -n Root9 -o Root9.der
chains.sh: #6122: MegaBridge_3_2: Exporting Root CA Root9.der  - PASSED
chains.sh: Creating DB Bridge11DB
certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd
chains.sh: #6123: MegaBridge_3_2: Creating DB Bridge11DB  - PASSED
chains.sh: Creating Bridge certifiate request Bridge11Req.der
certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US"  -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o Bridge11Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6124: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der  - PASSED
chains.sh: Creating certficate Bridge11Root1.der signed by Root1
certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 1128111025 -7 Bridge11@Root1  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6125: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1  - PASSED
chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database
certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der
chains.sh: #6126: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database  - PASSED
chains.sh: Creating certficate Bridge11Root2.der signed by Root2
certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 1128111026 -7 Bridge11@Root2  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6127: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2  - PASSED
chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database
certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der
chains.sh: #6128: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database  - PASSED
chains.sh: Creating certficate Bridge11Root3.der signed by Root3
certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 1128111027 -7 Bridge11@Root3  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6129: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3  - PASSED
chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database
certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der
chains.sh: #6130: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database  - PASSED
chains.sh: Generating PKCS7 package from Bridge11DB database
cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7
chains.sh: #6131: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database  - PASSED
chains.sh: Creating DB Bridge12DB
certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd
chains.sh: #6132: MegaBridge_3_2: Creating DB Bridge12DB  - PASSED
chains.sh: Creating Bridge certifiate request Bridge12Req.der
certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US"  -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o Bridge12Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6133: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der  - PASSED
chains.sh: Creating certficate Bridge12Root4.der signed by Root4
certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 1128111028 -7 Bridge12@Root4  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6134: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4  - PASSED
chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database
certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der
chains.sh: #6135: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database  - PASSED
chains.sh: Creating certficate Bridge12Root5.der signed by Root5
certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 1128111029 -7 Bridge12@Root5  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6136: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5  - PASSED
chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database
certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der
chains.sh: #6137: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database  - PASSED
chains.sh: Creating certficate Bridge12Root6.der signed by Root6
certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 1128111030 -7 Bridge12@Root6  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6138: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6  - PASSED
chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database
certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der
chains.sh: #6139: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database  - PASSED
chains.sh: Generating PKCS7 package from Bridge12DB database
cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7
chains.sh: #6140: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database  - PASSED
chains.sh: Creating DB Bridge13DB
certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd
chains.sh: #6141: MegaBridge_3_2: Creating DB Bridge13DB  - PASSED
chains.sh: Creating Bridge certifiate request Bridge13Req.der
certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US"  -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o Bridge13Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6142: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der  - PASSED
chains.sh: Creating certficate Bridge13Root7.der signed by Root7
certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 1128111031 -7 Bridge13@Root7  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6143: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7  - PASSED
chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database
certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der
chains.sh: #6144: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database  - PASSED
chains.sh: Creating certficate Bridge13Root8.der signed by Root8
certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 1128111032 -7 Bridge13@Root8  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6145: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8  - PASSED
chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database
certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der
chains.sh: #6146: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database  - PASSED
chains.sh: Creating certficate Bridge13Root9.der signed by Root9
certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 1128111033 -7 Bridge13@Root9  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6147: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9  - PASSED
chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database
certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der
chains.sh: #6148: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database  - PASSED
chains.sh: Generating PKCS7 package from Bridge13DB database
cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7
chains.sh: #6149: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database  - PASSED
chains.sh: Creating DB Bridge21DB
certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd
chains.sh: #6150: MegaBridge_3_2: Creating DB Bridge21DB  - PASSED
chains.sh: Creating Bridge certifiate request Bridge21Req.der
certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US"  -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o Bridge21Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6151: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der  - PASSED
chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11
certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 1128111034 -7 Bridge21@Bridge11  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6152: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11  - PASSED
chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database
certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der
chains.sh: #6153: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database  - PASSED
chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12
certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 1128111035 -7 Bridge21@Bridge12  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6154: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12  - PASSED
chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database
certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der
chains.sh: #6155: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database  - PASSED
chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13
certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 1128111036 -7 Bridge21@Bridge13  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6156: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13  - PASSED
chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database
certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der
chains.sh: #6157: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database  - PASSED
chains.sh: Generating PKCS7 package from Bridge21DB database
cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7
chains.sh: #6158: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #6159: MegaBridge_3_2: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6160: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21
certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 1128111037   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6161: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21  - PASSED
chains.sh: Importing certificate CA1Bridge21.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der
chains.sh: #6162: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #6163: MegaBridge_3_2: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o EE1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6164: MegaBridge_3_2: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1128111038   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6165: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE1CA1.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der
chains.sh: #6166: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database  - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags  -d EE1DB     -t Root1.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der  -t Root1.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128111016 (0x433d9ba8)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root1 ROOT CA,O=Root1,C=US"
        Validity:
            Not Before: Wed Nov 28 16:10:12 2012
            Not After : Tue Nov 28 16:10:12 2062
        Subject: "CN=Root1 ROOT CA,O=Root1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    f2:4a:e0:8e:ef:13:0a:c4:c0:0a:36:73:a4:25:ba:22:
                    d6:41:7f:bc:3c:de:c8:2f:7f:95:3b:f9:e4:8f:26:21:
                    ed:98:fa:24:f8:e8:c8:ef:cd:23:31:85:09:19:4b:cd:
                    21:e5:e7:7b:8b:6a:81:50:de:4b:0a:b4:97:eb:e6:6d:
                    fa:fe:bc:d6:a0:27:da:1a:ab:1b:4d:8f:ff:53:87:ea:
                    c1:08:b7:bf:50:d7:92:99:67:30:12:f6:93:fa:b8:d9:
                    58:1f:f0:30:0d:de:43:9b:e6:0d:38:eb:d0:3d:f2:31:
                    84:e3:3d:df:51:fb:11:fe:64:d8:9e:bb:ff:50:47:e9
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        77:2c:66:41:a0:92:c1:18:48:a2:1b:b6:b2:ef:3f:2a:
        1a:ef:7f:5c:92:4d:b2:b9:e3:73:c7:e2:87:1f:b5:21:
        83:05:66:c3:e9:c2:0a:4c:ca:1b:7c:41:8f:e1:66:55:
        2d:0c:e5:80:d5:01:78:df:03:b1:cb:74:71:5f:fc:11:
        21:69:bf:a3:ee:5f:89:62:1c:50:ca:fa:2e:9c:ac:20:
        5c:41:fd:6e:83:2f:9e:cb:e3:db:9f:b2:9b:d0:07:a0:
        e5:87:84:9f:e2:54:7e:d3:9c:73:ed:ab:6c:77:10:6d:
        70:52:5f:fe:96:9b:81:71:6b:e4:97:48:74:1b:aa:ed
    Fingerprint (MD5):
        34:56:E7:03:34:2A:8D:E6:2A:00:A4:C6:E6:58:4F:96
    Fingerprint (SHA1):
        8B:DB:2D:68:F7:9C:82:D0:EE:78:96:C9:6F:35:EE:C9:97:39:DF:BF


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US"
Returned value is 0, expected result is pass
chains.sh: #6167: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags  -d EE1DB     -t Root1.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags  -d EE1DB     -t Root2.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der  -t Root2.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128111017 (0x433d9ba9)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root2 ROOT CA,O=Root2,C=US"
        Validity:
            Not Before: Wed Nov 28 16:10:12 2012
            Not After : Tue Nov 28 16:10:12 2062
        Subject: "CN=Root2 ROOT CA,O=Root2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bd:5d:63:9f:13:59:f2:36:9e:49:95:e7:e6:da:e2:20:
                    fb:ef:db:35:98:10:b9:7e:b9:0d:b7:34:b5:ed:82:49:
                    04:38:bf:c7:f0:3d:72:10:06:36:ad:e8:4d:41:7f:34:
                    36:b2:1c:20:17:31:87:be:d1:89:d0:58:c8:d1:a1:32:
                    ef:e7:d9:2d:11:4f:be:b5:aa:73:e1:bd:10:f6:fa:2d:
                    13:5e:24:2e:92:d3:95:48:2d:cb:bc:83:c2:5c:c8:de:
                    47:74:b4:bd:00:47:16:d1:ca:96:05:60:1b:5e:4f:0a:
                    5f:5f:3d:4e:fc:5f:e6:73:df:7a:19:c2:e0:f3:d0:71
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3d:48:b4:df:6b:79:84:cf:13:9b:f3:05:d2:fe:51:23:
        7e:59:6d:4a:38:cb:65:1c:70:0e:85:05:2b:06:72:66:
        1c:33:f0:f5:b3:a0:fe:ed:45:5a:d8:29:29:1c:7c:7c:
        fb:74:46:55:0a:d3:16:7d:87:15:b7:4b:87:92:ef:fe:
        b1:dc:01:7f:80:2a:3a:24:ed:33:95:7e:ae:35:ba:ca:
        38:f6:65:ab:0c:f3:ea:4f:2a:86:af:61:ca:7f:89:39:
        ba:d7:19:3e:b7:f1:ed:18:2e:c9:d4:af:61:ee:ad:cc:
        3e:de:03:b2:aa:2e:47:cf:93:bd:f0:29:3c:9c:2e:7e
    Fingerprint (MD5):
        A8:4A:65:37:5D:23:3A:E9:A3:59:3E:5D:16:EE:48:E0
    Fingerprint (SHA1):
        AC:02:54:4F:16:0F:72:05:8F:68:D9:0B:33:F3:4C:91:5F:FC:CD:3F


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US"
Returned value is 0, expected result is pass
chains.sh: #6168: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags  -d EE1DB     -t Root2.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags  -d EE1DB     -t Root3.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der  -t Root3.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128111018 (0x433d9baa)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root3 ROOT CA,O=Root3,C=US"
        Validity:
            Not Before: Wed Nov 28 16:10:13 2012
            Not After : Tue Nov 28 16:10:13 2062
        Subject: "CN=Root3 ROOT CA,O=Root3,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c7:76:4b:3a:c5:04:de:e7:a5:d9:05:84:2c:24:a8:cf:
                    ce:49:5a:52:7e:40:ae:0b:41:d5:6d:52:ab:aa:e2:2c:
                    a0:61:65:93:e7:a5:a9:be:92:11:ac:fa:bc:ec:56:ef:
                    e7:97:54:a6:ec:aa:d4:7b:83:6b:52:b0:a4:ee:0e:b5:
                    2c:34:c1:b1:57:29:b9:da:72:ed:a5:72:00:d8:2d:59:
                    35:0a:92:91:c2:d6:43:09:39:62:c5:97:3d:6d:11:93:
                    ed:aa:c2:4a:13:80:0c:27:4e:2b:f0:7c:d0:41:86:39:
                    3a:08:dc:96:38:66:dd:f5:48:6e:86:06:58:a3:1f:6d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        a7:ae:56:67:d2:6e:df:8c:a3:0f:af:2e:21:88:54:a3:
        22:a8:81:b8:90:49:38:29:3d:e7:d9:0a:da:2a:32:d3:
        5c:ef:b6:67:72:c3:a8:74:2a:4a:66:87:c5:d9:61:e3:
        40:31:d2:56:32:81:ea:48:d8:e1:ee:50:83:1f:b6:67:
        d5:41:3f:c4:bf:a7:e3:40:37:2c:be:38:80:0e:db:05:
        f0:4c:d8:d4:c9:d3:00:84:b6:bd:d6:dd:8b:27:74:14:
        20:c7:b4:38:17:75:0b:df:2e:50:77:7e:db:d2:cc:c9:
        e7:83:cf:52:b7:00:d7:71:29:6b:ab:87:ef:e0:b0:78
    Fingerprint (MD5):
        EC:4F:12:3D:0B:E5:18:68:C3:60:8D:C3:55:5F:E5:1A
    Fingerprint (SHA1):
        E3:90:F3:C8:14:65:00:62:97:71:77:AE:41:49:9B:D0:F9:E6:64:C9


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US"
Returned value is 0, expected result is pass
chains.sh: #6169: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags  -d EE1DB     -t Root3.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags  -d EE1DB     -t Root4.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der  -t Root4.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128111019 (0x433d9bab)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root4 ROOT CA,O=Root4,C=US"
        Validity:
            Not Before: Wed Nov 28 16:10:13 2012
            Not After : Tue Nov 28 16:10:13 2062
        Subject: "CN=Root4 ROOT CA,O=Root4,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cd:0c:0d:d3:82:08:30:b2:e7:98:41:7d:18:0d:24:60:
                    a9:17:46:d5:5a:50:77:ab:d4:4b:9f:33:35:4a:36:ea:
                    47:06:fc:55:17:c2:c6:f2:02:6e:95:60:5d:b6:c3:3b:
                    1d:b4:b9:95:57:43:c0:17:39:06:25:6b:5b:b7:70:37:
                    18:64:82:2a:90:8c:d8:f7:c8:b6:37:47:a8:12:9c:46:
                    1f:bd:15:83:0b:6d:5c:1c:39:82:58:c6:24:63:f8:4a:
                    e6:63:36:c4:4c:af:d8:ca:90:ee:5c:5a:49:14:84:aa:
                    fe:85:88:d0:eb:40:70:ee:eb:a8:45:ec:2c:04:ea:fb
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        76:55:ed:20:95:fe:62:e4:80:b4:e7:40:4e:54:c4:e9:
        55:dd:99:68:49:7d:0f:ce:58:de:7c:0c:b9:10:fd:35:
        3c:59:86:bb:14:5c:30:2e:3f:0c:e3:37:89:24:f5:25:
        cc:47:d7:cd:1a:d2:d6:bf:aa:56:a8:d8:ed:f8:1b:8e:
        5c:55:b7:97:bc:83:6e:79:cf:2f:b0:58:d5:fb:18:57:
        ab:cb:e9:2f:65:20:bd:e1:1d:ea:bc:25:d0:07:12:1a:
        52:91:c5:60:67:08:e8:c3:1a:80:29:37:3b:39:c0:63:
        9d:52:38:32:1c:8c:b9:04:01:44:ae:d6:0a:8b:a4:75
    Fingerprint (MD5):
        BD:BF:EE:5A:31:80:9F:52:CF:14:75:83:B2:D2:2D:D8
    Fingerprint (SHA1):
        1B:DC:1D:43:19:40:47:75:9C:A6:7E:67:FA:84:AE:8C:D8:AC:20:23


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US"
Returned value is 0, expected result is pass
chains.sh: #6170: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags  -d EE1DB     -t Root4.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags  -d EE1DB     -t Root5.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der  -t Root5.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128111020 (0x433d9bac)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root5 ROOT CA,O=Root5,C=US"
        Validity:
            Not Before: Wed Nov 28 16:10:13 2012
            Not After : Tue Nov 28 16:10:13 2062
        Subject: "CN=Root5 ROOT CA,O=Root5,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b6:d2:8d:3b:91:fe:f8:e8:41:5c:87:ac:37:1c:c3:8e:
                    36:1d:85:ad:47:e1:0e:dc:93:e9:27:a6:86:5b:6b:26:
                    2f:34:8f:0d:a4:ca:06:89:3b:eb:0f:8f:0c:06:4c:4b:
                    5c:36:74:7a:ce:40:d4:63:6b:d1:b5:19:c5:89:80:73:
                    e3:62:e9:99:cf:69:25:e2:74:dc:59:31:9b:a8:59:a9:
                    22:c3:a3:6c:a9:90:2f:c3:96:21:64:34:8b:2d:f7:ba:
                    77:ec:13:ea:45:41:5b:25:d3:db:64:16:94:7d:fe:a6:
                    0b:d7:75:9e:4a:e0:d4:66:aa:81:51:a9:35:16:17:0f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        5d:05:1e:55:7e:92:45:f9:ed:f8:c5:b9:d8:4a:26:e0:
        6d:c9:a8:85:0c:46:c8:08:72:90:e3:a4:ec:9a:ba:a8:
        e4:91:34:3e:38:b7:c2:0a:4f:08:c6:9c:05:2d:48:67:
        e3:cc:e7:1a:d6:eb:39:eb:21:03:07:96:44:14:9c:42:
        13:ee:c4:7e:d6:e8:d3:9e:3e:76:fe:38:46:ba:49:7a:
        0a:98:e1:39:36:74:c4:ae:a8:f0:b0:a2:49:03:87:84:
        92:4f:66:82:21:09:3f:60:70:ea:ce:27:81:36:1f:af:
        84:3c:10:6c:98:1f:a8:1d:a6:fa:28:d1:b4:3d:14:82
    Fingerprint (MD5):
        D5:5A:F9:97:0E:76:1A:42:C1:39:74:3E:69:0F:AE:01
    Fingerprint (SHA1):
        C7:CE:66:C2:D7:87:A3:2B:D9:87:F9:CD:81:F8:06:2A:81:31:C8:4A


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US"
Returned value is 0, expected result is pass
chains.sh: #6171: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags  -d EE1DB     -t Root5.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags  -d EE1DB     -t Root6.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der  -t Root6.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128111021 (0x433d9bad)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root6 ROOT CA,O=Root6,C=US"
        Validity:
            Not Before: Wed Nov 28 16:10:13 2012
            Not After : Tue Nov 28 16:10:13 2062
        Subject: "CN=Root6 ROOT CA,O=Root6,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c0:4d:54:c1:c9:6d:67:18:1a:0b:bc:af:51:28:9a:6d:
                    43:6e:11:33:71:de:a7:86:e1:f8:c6:73:9f:69:58:24:
                    70:df:89:31:87:b0:9f:e6:b5:3e:35:c2:79:b9:09:01:
                    aa:7d:41:8e:b3:e7:21:0b:f2:47:d9:8a:38:01:ee:8e:
                    19:aa:72:bb:96:05:c9:a5:29:e3:2c:b6:59:20:94:87:
                    1b:43:08:a6:88:fb:97:d4:0f:54:91:93:9d:39:0b:51:
                    ed:32:71:76:3a:12:05:b1:3e:c2:70:b9:ad:ae:a4:7f:
                    fa:2a:50:59:69:63:ae:da:e1:10:14:6e:50:ff:93:7f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        90:83:9e:c8:83:69:d7:d3:cc:82:ce:26:a2:6a:b4:c3:
        10:b1:fb:f4:d9:d4:a2:53:4a:b7:a2:d5:4a:42:8b:a0:
        bf:29:a3:5c:e0:7a:4c:f9:48:8f:4d:78:f3:bf:f0:95:
        6d:45:e5:f9:48:3a:90:34:71:d2:a0:9e:f3:2f:93:5d:
        ab:4e:97:b0:e5:a9:74:44:c2:9d:03:d0:af:b2:b1:8c:
        3d:24:2e:a5:5b:2d:98:61:15:84:87:f0:a8:e3:94:f3:
        67:65:fa:a1:ed:29:10:3b:77:6f:ec:15:d6:94:9e:62:
        dc:80:76:60:d7:64:98:72:4b:b5:e1:7e:e6:ac:ea:d1
    Fingerprint (MD5):
        34:69:E4:36:F8:BA:CE:07:97:35:59:20:B3:DD:92:16
    Fingerprint (SHA1):
        E6:5A:34:7B:A2:F0:E8:A8:12:63:60:A7:01:61:50:D4:21:B0:EF:BF


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US"
Returned value is 0, expected result is pass
chains.sh: #6172: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags  -d EE1DB     -t Root6.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags  -d EE1DB     -t Root7.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der  -t Root7.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128111022 (0x433d9bae)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root7 ROOT CA,O=Root7,C=US"
        Validity:
            Not Before: Wed Nov 28 16:10:14 2012
            Not After : Tue Nov 28 16:10:14 2062
        Subject: "CN=Root7 ROOT CA,O=Root7,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:24:db:e6:55:8f:01:05:ad:c7:be:ca:4e:f0:15:09:
                    d2:78:24:ad:ed:49:87:5f:4e:62:1a:90:45:ca:0d:93:
                    84:ca:52:ff:18:77:15:73:81:04:61:b5:ae:84:88:70:
                    6a:90:e3:58:e9:6c:d6:18:b5:12:cc:30:f6:25:62:fd:
                    85:eb:5b:56:fa:73:a0:5e:f8:cb:27:4f:5e:92:ef:7d:
                    90:54:68:0c:af:d9:32:90:cd:89:9e:71:85:a1:ba:71:
                    55:15:50:8d:59:89:8f:0a:8f:36:ea:b0:e5:58:b9:ce:
                    45:ad:36:01:2e:74:be:3a:01:62:8c:c3:c7:97:d4:0d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        04:a5:33:fc:eb:54:09:22:27:05:42:78:f7:64:df:e4:
        d8:7b:11:d3:3c:a3:6a:c3:ed:dc:0d:30:a7:8c:13:f9:
        73:42:56:e6:dc:42:dc:ad:9b:25:c4:34:34:61:01:87:
        e2:66:03:4a:96:54:93:69:f2:a5:82:82:b2:24:86:15:
        9d:4d:f6:83:ca:8a:4b:ba:e8:04:53:d0:e2:13:35:56:
        bb:8b:6c:77:a1:f7:f7:6c:11:d2:4c:a5:37:11:94:ac:
        1e:5c:38:f9:69:3f:ac:c1:1e:5e:be:9d:42:8e:ae:8f:
        4e:38:00:80:b1:9f:62:5e:03:95:31:44:47:b5:c1:b7
    Fingerprint (MD5):
        27:4F:B9:71:37:6B:C8:12:F9:47:F7:C4:B7:64:AF:B0
    Fingerprint (SHA1):
        02:85:13:DB:48:66:1F:CF:53:93:3F:84:57:E4:69:9B:F2:C5:07:BB


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US"
Returned value is 0, expected result is pass
chains.sh: #6173: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags  -d EE1DB     -t Root7.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags  -d EE1DB     -t Root8.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der  -t Root8.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128111023 (0x433d9baf)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root8 ROOT CA,O=Root8,C=US"
        Validity:
            Not Before: Wed Nov 28 16:10:14 2012
            Not After : Tue Nov 28 16:10:14 2062
        Subject: "CN=Root8 ROOT CA,O=Root8,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d8:e6:7b:01:03:22:b9:f5:62:c7:58:c9:aa:cf:0f:67:
                    55:90:25:7e:47:21:91:b1:29:2a:1f:64:b7:72:77:b1:
                    ad:5f:60:56:78:fd:79:09:69:5a:f2:33:3f:b8:94:aa:
                    1d:51:dc:f4:fe:ce:33:1d:3d:15:58:85:57:d9:62:37:
                    3f:9b:cc:e2:5f:b8:89:c6:ae:80:03:18:37:05:e7:53:
                    82:9f:cd:f8:4f:cd:95:4a:a4:ca:70:72:99:72:43:0b:
                    0d:ab:a3:5f:3e:d4:36:ff:9a:5b:89:0e:f8:b1:a8:69:
                    b3:0d:74:37:8a:8a:17:8f:98:8b:5e:b7:44:79:ac:a9
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9c:59:62:9e:75:16:c5:8b:d3:57:ff:14:af:79:f6:a1:
        aa:65:63:c5:60:8a:51:85:51:5a:46:e6:32:56:b1:e7:
        81:d5:78:dd:1a:f2:69:f0:5f:f3:57:bb:a7:40:30:e0:
        73:87:a9:18:b4:f5:a0:b3:36:ec:45:09:ef:1c:b8:9b:
        37:6c:d2:bd:e7:de:cf:30:4f:49:1a:99:e6:c1:48:2b:
        36:4b:4a:35:6b:2b:6f:2e:87:dc:d6:bf:f7:64:48:37:
        82:91:6a:1b:66:42:b0:62:b3:87:4e:4e:81:be:93:7f:
        41:6b:4b:6f:e9:72:8b:f8:40:ae:08:d2:19:46:13:d4
    Fingerprint (MD5):
        7B:42:18:7B:25:02:D6:BF:9D:CE:84:26:E3:80:B0:E0
    Fingerprint (SHA1):
        40:17:7D:38:AE:36:59:41:7A:38:90:E2:82:01:35:B8:2D:11:CB:83


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US"
Returned value is 0, expected result is pass
chains.sh: #6174: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags  -d EE1DB     -t Root8.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags  -d EE1DB     -t Root9.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der  -t Root9.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128111024 (0x433d9bb0)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root9 ROOT CA,O=Root9,C=US"
        Validity:
            Not Before: Wed Nov 28 16:10:14 2012
            Not After : Tue Nov 28 16:10:14 2062
        Subject: "CN=Root9 ROOT CA,O=Root9,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    f1:4d:a1:ce:f3:06:0c:59:53:50:7e:fb:7c:50:30:3a:
                    bb:02:cc:84:91:67:51:18:c8:71:46:1f:82:15:d7:b9:
                    1e:96:59:ff:45:6b:a3:b1:67:f6:d7:66:be:80:c3:b0:
                    c0:53:a0:a8:14:7f:19:e4:e6:bb:e0:ba:43:75:7b:1d:
                    3b:b1:fe:3f:a2:df:a6:17:2f:ea:73:44:d6:58:21:34:
                    7f:82:58:d5:7f:d8:a4:1c:75:8b:8a:34:a9:88:a0:b6:
                    83:71:16:47:38:10:25:94:35:9e:e6:e3:51:06:c7:4b:
                    cc:47:23:14:73:91:c4:a7:26:2c:31:d7:40:24:a2:01
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        34:2d:07:19:e7:da:76:2a:30:e0:c6:2a:16:7d:4b:f3:
        46:86:01:f5:31:eb:f5:2a:c5:b5:85:2d:c0:f6:ca:a5:
        ac:07:6e:77:89:62:3e:43:eb:de:d9:15:ab:bb:67:44:
        39:86:04:0e:56:22:04:55:b8:05:ae:f7:57:0a:90:dc:
        04:c2:62:1d:89:20:e8:2d:93:6a:07:a2:99:5d:87:46:
        fe:87:cb:4b:f4:5e:58:63:ae:a6:58:be:b1:8e:a2:80:
        e7:b9:05:a0:5c:b8:d2:e2:ae:16:6f:7f:cf:5c:e6:b2:
        47:65:82:20:dd:72:36:c1:bf:51:b4:b9:e4:74:05:ff
    Fingerprint (MD5):
        D9:89:2A:2F:CC:F8:B1:40:59:58:93:DE:8E:0B:27:42
    Fingerprint (SHA1):
        0C:8C:22:A6:04:4B:65:FF:A1:34:E9:74:3C:68:7F:47:39:CE:1D:11


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US"
Returned value is 0, expected result is pass
chains.sh: #6175: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags  -d EE1DB     -t Root9.der - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #6176: Extension: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -m 1128111039 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #6177: Extension: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #6178: Extension: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #6179: Extension: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6180: Extension: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1128111040   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6181: Extension: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
chains.sh: #6182: Extension: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #6183: Extension: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6184: Extension: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1128111041   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6185: Extension: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
chains.sh: #6186: Extension: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB UserDB
certutil -N -d UserDB -f UserDB/dbpasswd
chains.sh: #6187: Extension: Creating DB UserDB  - PASSED
chains.sh: Creating EE certifiate request UserReq.der
certutil -s "CN=User EE, O=User, C=US"  -R  -d UserDB -f UserDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o UserReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6188: Extension: Creating EE certifiate request UserReq.der  - PASSED
chains.sh: Creating certficate UserCA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1128111042   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6189: Extension: Creating certficate UserCA2.der signed by CA2  - PASSED
chains.sh: Importing certificate UserCA2.der to UserDB database
certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der
chains.sh: #6190: Extension: Importing certificate UserCA2.der to UserDB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #6191: Extension: Creating DB AllDB  - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der CA2CA1.der CA1Root.der Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128111039 (0x433d9bbf)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:10:18 2012
            Not After : Tue Nov 28 16:10:18 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b1:82:50:2f:27:6c:cf:94:d4:0c:3c:10:22:2b:dd:f9:
                    fb:87:7e:67:74:ac:41:1e:a6:b8:76:10:df:64:3f:ec:
                    dd:87:b5:e0:15:a0:7c:68:89:3a:f6:85:e4:62:23:1d:
                    44:c3:38:d8:f2:39:c7:99:82:59:fe:19:c0:c4:09:0b:
                    5e:14:3b:42:ac:26:11:0a:58:e6:1f:e3:5f:cb:b7:e1:
                    ab:46:8f:4c:7d:4d:a6:80:25:42:b4:23:b4:40:69:71:
                    4b:59:48:54:cb:06:bd:1d:10:0f:a8:f7:57:10:18:be:
                    bd:30:28:bf:8d:7c:fd:d9:7e:2c:dd:9e:0f:b2:fe:c9
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        31:ad:78:e3:94:26:d3:e8:24:42:e2:61:35:e1:63:7a:
        2f:f8:23:a1:24:cf:46:33:86:41:c6:5c:d8:55:40:da:
        b4:b2:96:11:ba:5f:3f:d4:bd:88:6f:05:e3:b5:b3:d7:
        97:73:d6:86:33:fc:68:f6:e9:d5:d2:5b:bf:6a:37:2b:
        7a:5c:f9:c0:c6:f4:30:b5:9d:ba:ba:89:b3:2c:c7:c0:
        73:96:bf:9d:79:1f:e1:7e:e6:13:10:0d:ab:09:15:c6:
        47:10:d0:d6:8b:1b:39:61:a0:73:4a:82:c6:46:54:d8:
        fc:cc:b3:0d:4e:dd:d5:f8:20:b8:dd:de:33:0d:c5:89
    Fingerprint (MD5):
        9C:C1:97:77:6A:AB:1E:F1:9D:5C:85:D1:83:3E:02:A3
    Fingerprint (SHA1):
        C7:8B:95:1F:57:7E:97:6B:9A:C0:D7:E5:F9:41:91:1F:F8:02:0A:75


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #6192: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der Root.der with flags  -d AllDB    -o OID.2.0  -t Root.der
vfychain -d AllDB -pp -vv     -o OID.2.0  UserCA2.der CA2CA1.der CA1Root.der Root.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6193: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der Root.der with flags  -d AllDB    -o OID.2.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der with flags  -d AllDB    -o OID.1.0  -t CA1Root.der
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der CA2CA1.der CA1Root.der  -t CA1Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128111040 (0x433d9bc0)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:10:18 2012
            Not After : Tue Nov 28 16:10:18 2017
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    9c:26:ef:fc:0c:f4:87:e0:23:0b:4f:bc:14:f2:82:94:
                    77:6c:cc:5d:5b:ab:72:c9:60:85:da:3d:66:dc:e4:19:
                    cb:72:54:66:99:ab:b3:61:a8:ab:7d:e7:53:48:1b:0c:
                    21:3d:70:30:f4:8c:4d:01:31:34:38:27:6d:9f:71:9d:
                    1e:ca:14:2e:2e:f4:58:5f:80:74:e9:89:62:45:0f:44:
                    e9:11:03:69:ba:72:7c:f9:f8:72:8e:5c:89:4c:c2:6e:
                    67:48:0a:da:4b:9b:54:7e:49:34:05:a6:d7:b2:8d:9b:
                    7f:66:77:99:cf:96:30:2d:dc:17:1c:17:e1:ee:df:75
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3e:bb:1d:d0:8a:aa:0e:0d:19:d0:61:2b:18:81:77:68:
        4e:00:f6:1a:7a:e1:02:f4:83:62:d3:61:36:69:3a:7b:
        63:55:79:06:69:d7:fc:4c:ac:ab:da:a0:41:8e:8e:c2:
        29:71:ec:86:01:c3:82:0e:95:e9:55:c1:3f:15:a4:b7:
        c2:85:78:ca:ec:d4:a9:a9:aa:5f:25:1c:d8:60:e8:ca:
        ee:cc:c1:16:db:55:36:20:42:71:ec:55:bd:8a:12:6c:
        80:c9:d8:03:bc:43:de:ee:ab:97:4f:bc:41:08:b2:99:
        64:2c:8b:35:0c:df:a0:7d:8d:24:89:30:e0:07:0e:1e
    Fingerprint (MD5):
        9D:E7:A1:47:3B:87:8F:D3:40:A0:D5:FE:BF:74:6A:38
    Fingerprint (SHA1):
        80:E6:E5:47:03:B8:0B:7B:68:54:87:47:BD:97:52:AD:A5:68:4F:05


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #6194: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der with flags  -d AllDB    -o OID.1.0  -t CA1Root.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der with flags  -d AllDB    -o OID.2.0  -t CA1Root.der
vfychain -d AllDB -pp -vv     -o OID.2.0  UserCA2.der CA2CA1.der CA1Root.der  -t CA1Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6195: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der with flags  -d AllDB    -o OID.2.0  -t CA1Root.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags  -d AllDB    -o OID.1.0  -t CA2CA1.der
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der CA2CA1.der  -t CA2CA1.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128111041 (0x433d9bc1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Wed Nov 28 16:10:18 2012
            Not After : Tue Nov 28 16:10:18 2017
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:c0:6b:8a:2c:44:5c:2b:01:89:a9:4e:78:78:a2:de:
                    e3:71:f5:82:df:9f:57:0b:63:c7:cb:ff:6c:9c:60:b9:
                    05:29:d4:05:ba:3a:dd:53:8c:b2:40:ed:33:b2:57:f9:
                    c6:ff:86:d5:43:d0:26:f4:92:38:8b:52:cd:a8:8e:7e:
                    75:89:9f:21:51:e8:76:73:0c:06:2b:69:fc:04:dc:0c:
                    a2:7a:89:c1:c2:fb:6e:df:aa:e1:3c:b3:78:72:83:99:
                    0e:11:63:cd:b4:ab:ea:4c:87:aa:bd:4e:8f:1e:19:7c:
                    ac:92:66:b1:a2:60:0e:99:3f:d7:b4:25:a2:0d:f7:3f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        35:5b:e1:7e:d6:41:fb:df:58:5e:aa:a1:48:59:00:2b:
        28:78:af:84:6e:2c:70:1b:a2:87:67:94:d5:c9:a9:c3:
        99:fc:a4:d4:70:89:9f:38:09:42:a1:ec:3f:f3:6c:fc:
        83:f5:8a:bb:2f:39:50:ea:21:b2:cc:2b:56:72:53:8e:
        b7:3a:6a:17:4d:96:53:46:2f:08:e1:25:24:df:64:81:
        13:e6:a3:f9:df:11:25:f5:7d:53:64:9c:be:8c:a4:91:
        17:13:41:aa:49:db:10:08:56:af:bc:4e:d5:a5:d0:cb:
        7f:79:b6:c5:05:7f:67:25:a5:e3:e0:ff:6f:07:83:e6
    Fingerprint (MD5):
        EE:DC:85:8A:59:51:70:CE:AE:79:3D:50:7C:CC:51:BF
    Fingerprint (SHA1):
        D2:3E:DE:54:42:97:A7:67:DF:8C:40:EC:D0:CE:F5:AC:81:16:4D:82


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Returned value is 0, expected result is pass
chains.sh: #6196: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags  -d AllDB    -o OID.1.0  -t CA2CA1.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags  -d AllDB    -o OID.2.0  -t CA2CA1.der
vfychain -d AllDB -pp -vv     -o OID.2.0  UserCA2.der CA2CA1.der  -t CA2CA1.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6197: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags  -d AllDB    -o OID.2.0  -t CA2CA1.der - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #6198: Extension: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA1Root.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der
chains.sh: #6199: Extension: Importing certificate CA1Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA1.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der
chains.sh: #6200: Extension: Importing certificate CA2CA1.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t Root
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128111039 (0x433d9bbf)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:10:18 2012
            Not After : Tue Nov 28 16:10:18 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b1:82:50:2f:27:6c:cf:94:d4:0c:3c:10:22:2b:dd:f9:
                    fb:87:7e:67:74:ac:41:1e:a6:b8:76:10:df:64:3f:ec:
                    dd:87:b5:e0:15:a0:7c:68:89:3a:f6:85:e4:62:23:1d:
                    44:c3:38:d8:f2:39:c7:99:82:59:fe:19:c0:c4:09:0b:
                    5e:14:3b:42:ac:26:11:0a:58:e6:1f:e3:5f:cb:b7:e1:
                    ab:46:8f:4c:7d:4d:a6:80:25:42:b4:23:b4:40:69:71:
                    4b:59:48:54:cb:06:bd:1d:10:0f:a8:f7:57:10:18:be:
                    bd:30:28:bf:8d:7c:fd:d9:7e:2c:dd:9e:0f:b2:fe:c9
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        31:ad:78:e3:94:26:d3:e8:24:42:e2:61:35:e1:63:7a:
        2f:f8:23:a1:24:cf:46:33:86:41:c6:5c:d8:55:40:da:
        b4:b2:96:11:ba:5f:3f:d4:bd:88:6f:05:e3:b5:b3:d7:
        97:73:d6:86:33:fc:68:f6:e9:d5:d2:5b:bf:6a:37:2b:
        7a:5c:f9:c0:c6:f4:30:b5:9d:ba:ba:89:b3:2c:c7:c0:
        73:96:bf:9d:79:1f:e1:7e:e6:13:10:0d:ab:09:15:c6:
        47:10:d0:d6:8b:1b:39:61:a0:73:4a:82:c6:46:54:d8:
        fc:cc:b3:0d:4e:dd:d5:f8:20:b8:dd:de:33:0d:c5:89
    Fingerprint (MD5):
        9C:C1:97:77:6A:AB:1E:F1:9D:5C:85:D1:83:3E:02:A3
    Fingerprint (SHA1):
        C7:8B:95:1F:57:7E:97:6B:9A:C0:D7:E5:F9:41:91:1F:F8:02:0A:75

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #6201: Extension: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.2.0  -t Root
vfychain -d AllDB -pp -vv     -o OID.2.0  UserCA2.der  -t Root
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6202: Extension: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.2.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t CA1
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128111040 (0x433d9bc0)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:10:18 2012
            Not After : Tue Nov 28 16:10:18 2017
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    9c:26:ef:fc:0c:f4:87:e0:23:0b:4f:bc:14:f2:82:94:
                    77:6c:cc:5d:5b:ab:72:c9:60:85:da:3d:66:dc:e4:19:
                    cb:72:54:66:99:ab:b3:61:a8:ab:7d:e7:53:48:1b:0c:
                    21:3d:70:30:f4:8c:4d:01:31:34:38:27:6d:9f:71:9d:
                    1e:ca:14:2e:2e:f4:58:5f:80:74:e9:89:62:45:0f:44:
                    e9:11:03:69:ba:72:7c:f9:f8:72:8e:5c:89:4c:c2:6e:
                    67:48:0a:da:4b:9b:54:7e:49:34:05:a6:d7:b2:8d:9b:
                    7f:66:77:99:cf:96:30:2d:dc:17:1c:17:e1:ee:df:75
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3e:bb:1d:d0:8a:aa:0e:0d:19:d0:61:2b:18:81:77:68:
        4e:00:f6:1a:7a:e1:02:f4:83:62:d3:61:36:69:3a:7b:
        63:55:79:06:69:d7:fc:4c:ac:ab:da:a0:41:8e:8e:c2:
        29:71:ec:86:01:c3:82:0e:95:e9:55:c1:3f:15:a4:b7:
        c2:85:78:ca:ec:d4:a9:a9:aa:5f:25:1c:d8:60:e8:ca:
        ee:cc:c1:16:db:55:36:20:42:71:ec:55:bd:8a:12:6c:
        80:c9:d8:03:bc:43:de:ee:ab:97:4f:bc:41:08:b2:99:
        64:2c:8b:35:0c:df:a0:7d:8d:24:89:30:e0:07:0e:1e
    Fingerprint (MD5):
        9D:E7:A1:47:3B:87:8F:D3:40:A0:D5:FE:BF:74:6A:38
    Fingerprint (SHA1):
        80:E6:E5:47:03:B8:0B:7B:68:54:87:47:BD:97:52:AD:A5:68:4F:05

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #6203: Extension: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.2.0  -t CA1
vfychain -d AllDB -pp -vv     -o OID.2.0  UserCA2.der  -t CA1
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CA1 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6204: Extension: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.2.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t CA2
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128111041 (0x433d9bc1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Wed Nov 28 16:10:18 2012
            Not After : Tue Nov 28 16:10:18 2017
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:c0:6b:8a:2c:44:5c:2b:01:89:a9:4e:78:78:a2:de:
                    e3:71:f5:82:df:9f:57:0b:63:c7:cb:ff:6c:9c:60:b9:
                    05:29:d4:05:ba:3a:dd:53:8c:b2:40:ed:33:b2:57:f9:
                    c6:ff:86:d5:43:d0:26:f4:92:38:8b:52:cd:a8:8e:7e:
                    75:89:9f:21:51:e8:76:73:0c:06:2b:69:fc:04:dc:0c:
                    a2:7a:89:c1:c2:fb:6e:df:aa:e1:3c:b3:78:72:83:99:
                    0e:11:63:cd:b4:ab:ea:4c:87:aa:bd:4e:8f:1e:19:7c:
                    ac:92:66:b1:a2:60:0e:99:3f:d7:b4:25:a2:0d:f7:3f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        35:5b:e1:7e:d6:41:fb:df:58:5e:aa:a1:48:59:00:2b:
        28:78:af:84:6e:2c:70:1b:a2:87:67:94:d5:c9:a9:c3:
        99:fc:a4:d4:70:89:9f:38:09:42:a1:ec:3f:f3:6c:fc:
        83:f5:8a:bb:2f:39:50:ea:21:b2:cc:2b:56:72:53:8e:
        b7:3a:6a:17:4d:96:53:46:2f:08:e1:25:24:df:64:81:
        13:e6:a3:f9:df:11:25:f5:7d:53:64:9c:be:8c:a4:91:
        17:13:41:aa:49:db:10:08:56:af:bc:4e:d5:a5:d0:cb:
        7f:79:b6:c5:05:7f:67:25:a5:e3:e0:ff:6f:07:83:e6
    Fingerprint (MD5):
        EE:DC:85:8A:59:51:70:CE:AE:79:3D:50:7C:CC:51:BF
    Fingerprint (SHA1):
        D2:3E:DE:54:42:97:A7:67:DF:8C:40:EC:D0:CE:F5:AC:81:16:4D:82

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Returned value is 0, expected result is pass
chains.sh: #6205: Extension: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.2.0  -t CA2
vfychain -d AllDB -pp -vv     -o OID.2.0  UserCA2.der  -t CA2
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CA2 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6206: Extension: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.2.0  -t CA2 - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #6207: Extension2: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -m 1128111043 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #6208: Extension2: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #6209: Extension2: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #6210: Extension2: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6211: Extension2: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1128111044   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6212: Extension2: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
chains.sh: #6213: Extension2: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #6214: Extension2: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6215: Extension2: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1128111045   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6216: Extension2: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
chains.sh: #6217: Extension2: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB User1DB
certutil -N -d User1DB -f User1DB/dbpasswd
chains.sh: #6218: Extension2: Creating DB User1DB  - PASSED
chains.sh: Creating EE certifiate request User1Req.der
certutil -s "CN=User1 EE, O=User1, C=US"  -R  -d User1DB -f User1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o User1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6219: Extension2: Creating EE certifiate request User1Req.der  - PASSED
chains.sh: Creating certficate User1CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1128111046   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6220: Extension2: Creating certficate User1CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate User1CA2.der to User1DB database
certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der
chains.sh: #6221: Extension2: Importing certificate User1CA2.der to User1DB database  - PASSED
chains.sh: Creating DB User2DB
certutil -N -d User2DB -f User2DB/dbpasswd
chains.sh: #6222: Extension2: Creating DB User2DB  - PASSED
chains.sh: Creating EE certifiate request User2Req.der
certutil -s "CN=User2 EE, O=User2, C=US"  -R  -d User2DB -f User2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o User2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6223: Extension2: Creating EE certifiate request User2Req.der  - PASSED
chains.sh: Creating certficate User2CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1128111047   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6224: Extension2: Creating certficate User2CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate User2CA2.der to User2DB database
certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der
chains.sh: #6225: Extension2: Importing certificate User2CA2.der to User2DB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #6226: Extension2: Creating DB AllDB  - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der
vfychain -d AllDB -pp -vv     -o OID.1.0  User1CA2.der CA2CA1.der CA1Root.der Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128111043 (0x433d9bc3)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:10:20 2012
            Not After : Tue Nov 28 16:10:20 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d8:de:7e:2b:38:74:a6:5d:03:57:b7:9a:d2:4d:65:37:
                    3d:b7:17:79:26:42:6e:51:ec:71:67:38:cd:c4:a2:23:
                    ea:f4:96:6d:53:d9:00:e4:18:b4:b7:2e:40:4e:c3:0e:
                    0c:80:14:69:58:79:07:65:16:28:43:cd:1c:04:aa:47:
                    65:7f:b6:a6:37:d3:98:3a:fe:7a:ad:f0:c9:7d:5a:cf:
                    0e:af:ae:a1:41:aa:8b:8c:e4:48:6a:c6:c7:32:12:53:
                    85:b1:e8:6d:e4:34:0b:46:79:8d:77:02:00:61:2b:fb:
                    c4:8f:42:11:7c:ad:fd:aa:17:27:38:2e:fb:76:2b:25
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        bd:b0:e4:8f:a8:87:00:e9:c2:d2:84:5e:ff:e6:87:49:
        90:1e:76:b7:16:72:d3:a9:fb:b1:66:87:2d:bb:71:b3:
        98:ce:65:82:6a:94:fa:38:60:90:25:f2:3e:6a:c8:74:
        bc:33:80:8b:34:d0:d0:0a:9f:65:36:46:f0:4b:25:be:
        f7:41:43:3b:34:21:de:dd:f7:9c:5b:2e:3d:24:6c:f8:
        43:03:2e:2b:7a:57:44:81:45:b0:01:d5:1e:5f:13:89:
        94:03:a4:a5:7f:6c:f4:13:9f:06:b5:73:be:cc:d7:4c:
        78:6a:67:6f:31:56:cd:f1:f5:af:a4:d1:b6:e5:09:ac
    Fingerprint (MD5):
        D2:B1:12:4A:27:4F:5C:CA:4E:C9:68:B4:02:CE:57:A3
    Fingerprint (SHA1):
        86:2E:9C:38:A3:55:59:BD:94:AD:EC:79:C8:73:7C:A5:26:70:C5:20


Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #6227: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der Root.der with flags  -d AllDB    -o OID.2.0  -t Root.der
vfychain -d AllDB -pp -vv     -o OID.2.0  User1CA2.der CA2CA1.der CA1Root.der Root.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6228: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der Root.der with flags  -d AllDB    -o OID.2.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der with flags  -d AllDB    -o OID.1.0  -t CA1Root.der
vfychain -d AllDB -pp -vv     -o OID.1.0  User1CA2.der CA2CA1.der CA1Root.der  -t CA1Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128111044 (0x433d9bc4)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:10:20 2012
            Not After : Tue Nov 28 16:10:20 2017
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:67:b1:c9:15:3e:b7:57:7c:85:25:d3:ce:77:24:b5:
                    ec:47:84:6f:b8:02:db:8a:90:d4:62:1d:8b:45:15:15:
                    2b:77:0d:c9:b2:76:59:3a:0a:af:db:f8:13:7d:b2:a8:
                    ab:a3:4c:2b:ff:82:78:6f:94:e2:a5:15:c0:a7:42:80:
                    19:e1:97:77:e1:70:9d:33:38:09:1b:48:90:9d:7f:e1:
                    22:6d:28:12:30:a1:17:96:b2:5d:1b:8e:5b:61:04:f7:
                    b9:b5:81:93:4a:a1:4b:14:1a:61:e5:ce:9d:a2:13:a7:
                    84:ca:7a:5f:9c:92:4f:92:cd:22:bc:97:c7:73:6d:df
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        2c:58:ff:57:2a:5c:74:3a:f9:20:66:27:e7:d4:c0:7a:
        1f:0d:57:0d:62:99:99:6d:f8:ec:2f:9b:bd:bc:34:2e:
        fc:02:bb:5f:ef:0f:8e:3c:cf:26:31:44:20:f7:7e:96:
        f2:9c:f8:88:5a:0d:7d:f9:92:6e:9d:58:f6:36:64:a1:
        ca:ed:00:14:0b:18:0e:9c:2a:2c:12:f0:6b:32:a2:e2:
        7c:49:80:a9:66:3d:81:23:da:be:fb:5c:34:ce:97:25:
        9b:ae:74:26:49:ff:60:ea:a3:3c:8a:72:72:cf:fe:72:
        6f:97:60:51:d7:64:a2:72:31:c6:1c:96:48:67:49:a1
    Fingerprint (MD5):
        01:C8:02:8B:57:57:F1:12:BF:B4:7E:E9:E1:0B:F3:3F
    Fingerprint (SHA1):
        F1:DE:F6:5E:9B:E8:4B:EA:88:D2:67:A2:47:AF:8C:72:4E:A2:FF:2D


Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #6229: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der with flags  -d AllDB    -o OID.1.0  -t CA1Root.der - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der with flags  -d AllDB    -o OID.2.0  -t CA1Root.der
vfychain -d AllDB -pp -vv     -o OID.2.0  User1CA2.der CA2CA1.der CA1Root.der  -t CA1Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6230: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der with flags  -d AllDB    -o OID.2.0  -t CA1Root.der - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der with flags  -d AllDB    -o OID.1.0  -t CA2CA1.der
vfychain -d AllDB -pp -vv     -o OID.1.0  User1CA2.der CA2CA1.der  -t CA2CA1.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128111045 (0x433d9bc5)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Wed Nov 28 16:10:21 2012
            Not After : Tue Nov 28 16:10:21 2017
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:a7:94:5b:01:cb:a7:52:1b:e6:3a:4b:1c:1c:01:c5:
                    0b:8e:7e:9c:36:65:93:5e:d3:ed:ea:bf:61:47:cf:ff:
                    ce:cc:d2:90:3f:55:33:e7:bc:23:52:23:79:a0:36:38:
                    3d:e6:83:b4:00:03:e2:51:22:87:13:de:5d:64:9b:f6:
                    37:e2:5c:1a:9b:00:67:b3:86:c6:6b:f3:ff:70:1b:1d:
                    d5:8f:1d:35:7b:ff:68:4a:69:a0:d4:99:29:9f:13:b1:
                    f8:a7:20:66:17:08:cd:18:99:39:14:fd:92:b5:88:ed:
                    5e:0f:45:da:a9:2c:59:48:15:50:8e:40:ac:f2:e5:ff
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        34:4b:73:f4:b1:63:6b:33:0b:f9:d6:02:f4:91:4b:1b:
        fa:09:e2:ec:9b:6a:39:e2:93:a3:8a:af:57:c2:da:52:
        93:b0:b7:b4:b1:56:15:f8:e8:94:c4:ef:68:81:0b:2d:
        de:c1:d5:04:a3:e0:a0:af:c0:76:9d:6c:fe:f9:00:c0:
        4f:f3:20:23:7d:69:c0:80:94:c3:a7:e5:ce:59:da:50:
        93:3c:38:86:bb:46:60:d9:b6:77:21:be:99:b3:d8:4c:
        26:86:25:8b:ad:09:73:c1:13:62:72:d5:2a:89:39:f6:
        be:63:b1:7a:2d:49:43:f9:fb:7a:96:55:c3:1e:49:11
    Fingerprint (MD5):
        15:A2:0A:CE:B1:40:57:38:F6:52:C0:AE:33:F8:A1:96
    Fingerprint (SHA1):
        6E:16:20:6E:BE:03:8C:35:CE:5B:F0:98:87:D5:C8:EB:82:CD:5E:EF


Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Returned value is 0, expected result is pass
chains.sh: #6231: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der with flags  -d AllDB    -o OID.1.0  -t CA2CA1.der - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der with flags  -d AllDB    -o OID.2.0  -t CA2CA1.der
vfychain -d AllDB -pp -vv     -o OID.2.0  User1CA2.der CA2CA1.der  -t CA2CA1.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6232: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der with flags  -d AllDB    -o OID.2.0  -t CA2CA1.der - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #6233: Extension2: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA1Root.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der
chains.sh: #6234: Extension2: Importing certificate CA1Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA1.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der
chains.sh: #6235: Extension2: Importing certificate CA2CA1.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.1.0  -t Root
vfychain -d AllDB -pp -vv     -o OID.1.0  User1CA2.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128111043 (0x433d9bc3)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:10:20 2012
            Not After : Tue Nov 28 16:10:20 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d8:de:7e:2b:38:74:a6:5d:03:57:b7:9a:d2:4d:65:37:
                    3d:b7:17:79:26:42:6e:51:ec:71:67:38:cd:c4:a2:23:
                    ea:f4:96:6d:53:d9:00:e4:18:b4:b7:2e:40:4e:c3:0e:
                    0c:80:14:69:58:79:07:65:16:28:43:cd:1c:04:aa:47:
                    65:7f:b6:a6:37:d3:98:3a:fe:7a:ad:f0:c9:7d:5a:cf:
                    0e:af:ae:a1:41:aa:8b:8c:e4:48:6a:c6:c7:32:12:53:
                    85:b1:e8:6d:e4:34:0b:46:79:8d:77:02:00:61:2b:fb:
                    c4:8f:42:11:7c:ad:fd:aa:17:27:38:2e:fb:76:2b:25
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        bd:b0:e4:8f:a8:87:00:e9:c2:d2:84:5e:ff:e6:87:49:
        90:1e:76:b7:16:72:d3:a9:fb:b1:66:87:2d:bb:71:b3:
        98:ce:65:82:6a:94:fa:38:60:90:25:f2:3e:6a:c8:74:
        bc:33:80:8b:34:d0:d0:0a:9f:65:36:46:f0:4b:25:be:
        f7:41:43:3b:34:21:de:dd:f7:9c:5b:2e:3d:24:6c:f8:
        43:03:2e:2b:7a:57:44:81:45:b0:01:d5:1e:5f:13:89:
        94:03:a4:a5:7f:6c:f4:13:9f:06:b5:73:be:cc:d7:4c:
        78:6a:67:6f:31:56:cd:f1:f5:af:a4:d1:b6:e5:09:ac
    Fingerprint (MD5):
        D2:B1:12:4A:27:4F:5C:CA:4E:C9:68:B4:02:CE:57:A3
    Fingerprint (SHA1):
        86:2E:9C:38:A3:55:59:BD:94:AD:EC:79:C8:73:7C:A5:26:70:C5:20

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #6236: Extension2: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.1.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.2.0  -t Root
vfychain -d AllDB -pp -vv     -o OID.2.0  User1CA2.der  -t Root
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6237: Extension2: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.2.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.1.0  -t CA1
vfychain -d AllDB -pp -vv     -o OID.1.0  User1CA2.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128111044 (0x433d9bc4)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:10:20 2012
            Not After : Tue Nov 28 16:10:20 2017
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:67:b1:c9:15:3e:b7:57:7c:85:25:d3:ce:77:24:b5:
                    ec:47:84:6f:b8:02:db:8a:90:d4:62:1d:8b:45:15:15:
                    2b:77:0d:c9:b2:76:59:3a:0a:af:db:f8:13:7d:b2:a8:
                    ab:a3:4c:2b:ff:82:78:6f:94:e2:a5:15:c0:a7:42:80:
                    19:e1:97:77:e1:70:9d:33:38:09:1b:48:90:9d:7f:e1:
                    22:6d:28:12:30:a1:17:96:b2:5d:1b:8e:5b:61:04:f7:
                    b9:b5:81:93:4a:a1:4b:14:1a:61:e5:ce:9d:a2:13:a7:
                    84:ca:7a:5f:9c:92:4f:92:cd:22:bc:97:c7:73:6d:df
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        2c:58:ff:57:2a:5c:74:3a:f9:20:66:27:e7:d4:c0:7a:
        1f:0d:57:0d:62:99:99:6d:f8:ec:2f:9b:bd:bc:34:2e:
        fc:02:bb:5f:ef:0f:8e:3c:cf:26:31:44:20:f7:7e:96:
        f2:9c:f8:88:5a:0d:7d:f9:92:6e:9d:58:f6:36:64:a1:
        ca:ed:00:14:0b:18:0e:9c:2a:2c:12:f0:6b:32:a2:e2:
        7c:49:80:a9:66:3d:81:23:da:be:fb:5c:34:ce:97:25:
        9b:ae:74:26:49:ff:60:ea:a3:3c:8a:72:72:cf:fe:72:
        6f:97:60:51:d7:64:a2:72:31:c6:1c:96:48:67:49:a1
    Fingerprint (MD5):
        01:C8:02:8B:57:57:F1:12:BF:B4:7E:E9:E1:0B:F3:3F
    Fingerprint (SHA1):
        F1:DE:F6:5E:9B:E8:4B:EA:88:D2:67:A2:47:AF:8C:72:4E:A2:FF:2D

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #6238: Extension2: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.1.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.2.0  -t CA1
vfychain -d AllDB -pp -vv     -o OID.2.0  User1CA2.der  -t CA1
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CA1 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6239: Extension2: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.2.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.1.0  -t CA2
vfychain -d AllDB -pp -vv     -o OID.1.0  User1CA2.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128111045 (0x433d9bc5)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Wed Nov 28 16:10:21 2012
            Not After : Tue Nov 28 16:10:21 2017
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:a7:94:5b:01:cb:a7:52:1b:e6:3a:4b:1c:1c:01:c5:
                    0b:8e:7e:9c:36:65:93:5e:d3:ed:ea:bf:61:47:cf:ff:
                    ce:cc:d2:90:3f:55:33:e7:bc:23:52:23:79:a0:36:38:
                    3d:e6:83:b4:00:03:e2:51:22:87:13:de:5d:64:9b:f6:
                    37:e2:5c:1a:9b:00:67:b3:86:c6:6b:f3:ff:70:1b:1d:
                    d5:8f:1d:35:7b:ff:68:4a:69:a0:d4:99:29:9f:13:b1:
                    f8:a7:20:66:17:08:cd:18:99:39:14:fd:92:b5:88:ed:
                    5e:0f:45:da:a9:2c:59:48:15:50:8e:40:ac:f2:e5:ff
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        34:4b:73:f4:b1:63:6b:33:0b:f9:d6:02:f4:91:4b:1b:
        fa:09:e2:ec:9b:6a:39:e2:93:a3:8a:af:57:c2:da:52:
        93:b0:b7:b4:b1:56:15:f8:e8:94:c4:ef:68:81:0b:2d:
        de:c1:d5:04:a3:e0:a0:af:c0:76:9d:6c:fe:f9:00:c0:
        4f:f3:20:23:7d:69:c0:80:94:c3:a7:e5:ce:59:da:50:
        93:3c:38:86:bb:46:60:d9:b6:77:21:be:99:b3:d8:4c:
        26:86:25:8b:ad:09:73:c1:13:62:72:d5:2a:89:39:f6:
        be:63:b1:7a:2d:49:43:f9:fb:7a:96:55:c3:1e:49:11
    Fingerprint (MD5):
        15:A2:0A:CE:B1:40:57:38:F6:52:C0:AE:33:F8:A1:96
    Fingerprint (SHA1):
        6E:16:20:6E:BE:03:8C:35:CE:5B:F0:98:87:D5:C8:EB:82:CD:5E:EF

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Returned value is 0, expected result is pass
chains.sh: #6240: Extension2: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.1.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.2.0  -t CA2
vfychain -d AllDB -pp -vv     -o OID.2.0  User1CA2.der  -t CA2
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CA2 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6241: Extension2: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.2.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.1.0  -t Root
vfychain -d AllDB -pp -vv     -o OID.1.0  User2CA2.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128111043 (0x433d9bc3)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:10:20 2012
            Not After : Tue Nov 28 16:10:20 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d8:de:7e:2b:38:74:a6:5d:03:57:b7:9a:d2:4d:65:37:
                    3d:b7:17:79:26:42:6e:51:ec:71:67:38:cd:c4:a2:23:
                    ea:f4:96:6d:53:d9:00:e4:18:b4:b7:2e:40:4e:c3:0e:
                    0c:80:14:69:58:79:07:65:16:28:43:cd:1c:04:aa:47:
                    65:7f:b6:a6:37:d3:98:3a:fe:7a:ad:f0:c9:7d:5a:cf:
                    0e:af:ae:a1:41:aa:8b:8c:e4:48:6a:c6:c7:32:12:53:
                    85:b1:e8:6d:e4:34:0b:46:79:8d:77:02:00:61:2b:fb:
                    c4:8f:42:11:7c:ad:fd:aa:17:27:38:2e:fb:76:2b:25
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        bd:b0:e4:8f:a8:87:00:e9:c2:d2:84:5e:ff:e6:87:49:
        90:1e:76:b7:16:72:d3:a9:fb:b1:66:87:2d:bb:71:b3:
        98:ce:65:82:6a:94:fa:38:60:90:25:f2:3e:6a:c8:74:
        bc:33:80:8b:34:d0:d0:0a:9f:65:36:46:f0:4b:25:be:
        f7:41:43:3b:34:21:de:dd:f7:9c:5b:2e:3d:24:6c:f8:
        43:03:2e:2b:7a:57:44:81:45:b0:01:d5:1e:5f:13:89:
        94:03:a4:a5:7f:6c:f4:13:9f:06:b5:73:be:cc:d7:4c:
        78:6a:67:6f:31:56:cd:f1:f5:af:a4:d1:b6:e5:09:ac
    Fingerprint (MD5):
        D2:B1:12:4A:27:4F:5C:CA:4E:C9:68:B4:02:CE:57:A3
    Fingerprint (SHA1):
        86:2E:9C:38:A3:55:59:BD:94:AD:EC:79:C8:73:7C:A5:26:70:C5:20

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #6242: Extension2: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.1.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.2.0  -t Root
vfychain -d AllDB -pp -vv     -o OID.2.0  User2CA2.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128111043 (0x433d9bc3)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:10:20 2012
            Not After : Tue Nov 28 16:10:20 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d8:de:7e:2b:38:74:a6:5d:03:57:b7:9a:d2:4d:65:37:
                    3d:b7:17:79:26:42:6e:51:ec:71:67:38:cd:c4:a2:23:
                    ea:f4:96:6d:53:d9:00:e4:18:b4:b7:2e:40:4e:c3:0e:
                    0c:80:14:69:58:79:07:65:16:28:43:cd:1c:04:aa:47:
                    65:7f:b6:a6:37:d3:98:3a:fe:7a:ad:f0:c9:7d:5a:cf:
                    0e:af:ae:a1:41:aa:8b:8c:e4:48:6a:c6:c7:32:12:53:
                    85:b1:e8:6d:e4:34:0b:46:79:8d:77:02:00:61:2b:fb:
                    c4:8f:42:11:7c:ad:fd:aa:17:27:38:2e:fb:76:2b:25
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        bd:b0:e4:8f:a8:87:00:e9:c2:d2:84:5e:ff:e6:87:49:
        90:1e:76:b7:16:72:d3:a9:fb:b1:66:87:2d:bb:71:b3:
        98:ce:65:82:6a:94:fa:38:60:90:25:f2:3e:6a:c8:74:
        bc:33:80:8b:34:d0:d0:0a:9f:65:36:46:f0:4b:25:be:
        f7:41:43:3b:34:21:de:dd:f7:9c:5b:2e:3d:24:6c:f8:
        43:03:2e:2b:7a:57:44:81:45:b0:01:d5:1e:5f:13:89:
        94:03:a4:a5:7f:6c:f4:13:9f:06:b5:73:be:cc:d7:4c:
        78:6a:67:6f:31:56:cd:f1:f5:af:a4:d1:b6:e5:09:ac
    Fingerprint (MD5):
        D2:B1:12:4A:27:4F:5C:CA:4E:C9:68:B4:02:CE:57:A3
    Fingerprint (SHA1):
        86:2E:9C:38:A3:55:59:BD:94:AD:EC:79:C8:73:7C:A5:26:70:C5:20

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #6243: Extension2: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.2.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.1.0  -t CA1
vfychain -d AllDB -pp -vv     -o OID.1.0  User2CA2.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128111044 (0x433d9bc4)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:10:20 2012
            Not After : Tue Nov 28 16:10:20 2017
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:67:b1:c9:15:3e:b7:57:7c:85:25:d3:ce:77:24:b5:
                    ec:47:84:6f:b8:02:db:8a:90:d4:62:1d:8b:45:15:15:
                    2b:77:0d:c9:b2:76:59:3a:0a:af:db:f8:13:7d:b2:a8:
                    ab:a3:4c:2b:ff:82:78:6f:94:e2:a5:15:c0:a7:42:80:
                    19:e1:97:77:e1:70:9d:33:38:09:1b:48:90:9d:7f:e1:
                    22:6d:28:12:30:a1:17:96:b2:5d:1b:8e:5b:61:04:f7:
                    b9:b5:81:93:4a:a1:4b:14:1a:61:e5:ce:9d:a2:13:a7:
                    84:ca:7a:5f:9c:92:4f:92:cd:22:bc:97:c7:73:6d:df
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        2c:58:ff:57:2a:5c:74:3a:f9:20:66:27:e7:d4:c0:7a:
        1f:0d:57:0d:62:99:99:6d:f8:ec:2f:9b:bd:bc:34:2e:
        fc:02:bb:5f:ef:0f:8e:3c:cf:26:31:44:20:f7:7e:96:
        f2:9c:f8:88:5a:0d:7d:f9:92:6e:9d:58:f6:36:64:a1:
        ca:ed:00:14:0b:18:0e:9c:2a:2c:12:f0:6b:32:a2:e2:
        7c:49:80:a9:66:3d:81:23:da:be:fb:5c:34:ce:97:25:
        9b:ae:74:26:49:ff:60:ea:a3:3c:8a:72:72:cf:fe:72:
        6f:97:60:51:d7:64:a2:72:31:c6:1c:96:48:67:49:a1
    Fingerprint (MD5):
        01:C8:02:8B:57:57:F1:12:BF:B4:7E:E9:E1:0B:F3:3F
    Fingerprint (SHA1):
        F1:DE:F6:5E:9B:E8:4B:EA:88:D2:67:A2:47:AF:8C:72:4E:A2:FF:2D

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #6244: Extension2: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.1.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.2.0  -t CA1
vfychain -d AllDB -pp -vv     -o OID.2.0  User2CA2.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128111044 (0x433d9bc4)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:10:20 2012
            Not After : Tue Nov 28 16:10:20 2017
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:67:b1:c9:15:3e:b7:57:7c:85:25:d3:ce:77:24:b5:
                    ec:47:84:6f:b8:02:db:8a:90:d4:62:1d:8b:45:15:15:
                    2b:77:0d:c9:b2:76:59:3a:0a:af:db:f8:13:7d:b2:a8:
                    ab:a3:4c:2b:ff:82:78:6f:94:e2:a5:15:c0:a7:42:80:
                    19:e1:97:77:e1:70:9d:33:38:09:1b:48:90:9d:7f:e1:
                    22:6d:28:12:30:a1:17:96:b2:5d:1b:8e:5b:61:04:f7:
                    b9:b5:81:93:4a:a1:4b:14:1a:61:e5:ce:9d:a2:13:a7:
                    84:ca:7a:5f:9c:92:4f:92:cd:22:bc:97:c7:73:6d:df
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: OID.1.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        2c:58:ff:57:2a:5c:74:3a:f9:20:66:27:e7:d4:c0:7a:
        1f:0d:57:0d:62:99:99:6d:f8:ec:2f:9b:bd:bc:34:2e:
        fc:02:bb:5f:ef:0f:8e:3c:cf:26:31:44:20:f7:7e:96:
        f2:9c:f8:88:5a:0d:7d:f9:92:6e:9d:58:f6:36:64:a1:
        ca:ed:00:14:0b:18:0e:9c:2a:2c:12:f0:6b:32:a2:e2:
        7c:49:80:a9:66:3d:81:23:da:be:fb:5c:34:ce:97:25:
        9b:ae:74:26:49:ff:60:ea:a3:3c:8a:72:72:cf:fe:72:
        6f:97:60:51:d7:64:a2:72:31:c6:1c:96:48:67:49:a1
    Fingerprint (MD5):
        01:C8:02:8B:57:57:F1:12:BF:B4:7E:E9:E1:0B:F3:3F
    Fingerprint (SHA1):
        F1:DE:F6:5E:9B:E8:4B:EA:88:D2:67:A2:47:AF:8C:72:4E:A2:FF:2D

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #6245: Extension2: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.2.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.1.0  -t CA2
vfychain -d AllDB -pp -vv     -o OID.1.0  User2CA2.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128111045 (0x433d9bc5)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Wed Nov 28 16:10:21 2012
            Not After : Tue Nov 28 16:10:21 2017
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:a7:94:5b:01:cb:a7:52:1b:e6:3a:4b:1c:1c:01:c5:
                    0b:8e:7e:9c:36:65:93:5e:d3:ed:ea:bf:61:47:cf:ff:
                    ce:cc:d2:90:3f:55:33:e7:bc:23:52:23:79:a0:36:38:
                    3d:e6:83:b4:00:03:e2:51:22:87:13:de:5d:64:9b:f6:
                    37:e2:5c:1a:9b:00:67:b3:86:c6:6b:f3:ff:70:1b:1d:
                    d5:8f:1d:35:7b:ff:68:4a:69:a0:d4:99:29:9f:13:b1:
                    f8:a7:20:66:17:08:cd:18:99:39:14:fd:92:b5:88:ed:
                    5e:0f:45:da:a9:2c:59:48:15:50:8e:40:ac:f2:e5:ff
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        34:4b:73:f4:b1:63:6b:33:0b:f9:d6:02:f4:91:4b:1b:
        fa:09:e2:ec:9b:6a:39:e2:93:a3:8a:af:57:c2:da:52:
        93:b0:b7:b4:b1:56:15:f8:e8:94:c4:ef:68:81:0b:2d:
        de:c1:d5:04:a3:e0:a0:af:c0:76:9d:6c:fe:f9:00:c0:
        4f:f3:20:23:7d:69:c0:80:94:c3:a7:e5:ce:59:da:50:
        93:3c:38:86:bb:46:60:d9:b6:77:21:be:99:b3:d8:4c:
        26:86:25:8b:ad:09:73:c1:13:62:72:d5:2a:89:39:f6:
        be:63:b1:7a:2d:49:43:f9:fb:7a:96:55:c3:1e:49:11
    Fingerprint (MD5):
        15:A2:0A:CE:B1:40:57:38:F6:52:C0:AE:33:F8:A1:96
    Fingerprint (SHA1):
        6E:16:20:6E:BE:03:8C:35:CE:5B:F0:98:87:D5:C8:EB:82:CD:5E:EF

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Returned value is 0, expected result is pass
chains.sh: #6246: Extension2: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.1.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.2.0  -t CA2
vfychain -d AllDB -pp -vv     -o OID.2.0  User2CA2.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128111045 (0x433d9bc5)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Wed Nov 28 16:10:21 2012
            Not After : Tue Nov 28 16:10:21 2017
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:a7:94:5b:01:cb:a7:52:1b:e6:3a:4b:1c:1c:01:c5:
                    0b:8e:7e:9c:36:65:93:5e:d3:ed:ea:bf:61:47:cf:ff:
                    ce:cc:d2:90:3f:55:33:e7:bc:23:52:23:79:a0:36:38:
                    3d:e6:83:b4:00:03:e2:51:22:87:13:de:5d:64:9b:f6:
                    37:e2:5c:1a:9b:00:67:b3:86:c6:6b:f3:ff:70:1b:1d:
                    d5:8f:1d:35:7b:ff:68:4a:69:a0:d4:99:29:9f:13:b1:
                    f8:a7:20:66:17:08:cd:18:99:39:14:fd:92:b5:88:ed:
                    5e:0f:45:da:a9:2c:59:48:15:50:8e:40:ac:f2:e5:ff
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: OID.1.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        34:4b:73:f4:b1:63:6b:33:0b:f9:d6:02:f4:91:4b:1b:
        fa:09:e2:ec:9b:6a:39:e2:93:a3:8a:af:57:c2:da:52:
        93:b0:b7:b4:b1:56:15:f8:e8:94:c4:ef:68:81:0b:2d:
        de:c1:d5:04:a3:e0:a0:af:c0:76:9d:6c:fe:f9:00:c0:
        4f:f3:20:23:7d:69:c0:80:94:c3:a7:e5:ce:59:da:50:
        93:3c:38:86:bb:46:60:d9:b6:77:21:be:99:b3:d8:4c:
        26:86:25:8b:ad:09:73:c1:13:62:72:d5:2a:89:39:f6:
        be:63:b1:7a:2d:49:43:f9:fb:7a:96:55:c3:1e:49:11
    Fingerprint (MD5):
        15:A2:0A:CE:B1:40:57:38:F6:52:C0:AE:33:F8:A1:96
    Fingerprint (SHA1):
        6E:16:20:6E:BE:03:8C:35:CE:5B:F0:98:87:D5:C8:EB:82:CD:5E:EF

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Returned value is 0, expected result is pass
chains.sh: #6247: Extension2: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.2.0  -t CA2 - PASSED
chains.sh: Creating DB RootCADB
certutil -N -d RootCADB -f RootCADB/dbpasswd
chains.sh: #6248: AnyPolicy: Creating DB RootCADB  - PASSED
chains.sh: Creating Root CA RootCA
certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA  -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -m 1128111048 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #6249: AnyPolicy: Creating Root CA RootCA  - PASSED
chains.sh: Exporting Root CA RootCA.der
certutil -L -d RootCADB -r -n RootCA -o RootCA.der
chains.sh: #6250: AnyPolicy: Exporting Root CA RootCA.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #6251: AnyPolicy: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6252: AnyPolicy: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1RootCA.der signed by RootCA
certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1128111049   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6253: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA  - PASSED
chains.sh: Importing certificate CA1RootCA.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der
chains.sh: #6254: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #6255: AnyPolicy: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6256: AnyPolicy: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1128111050   --extCP --extIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n
0
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter the number of certs in the path permitted to use anyPolicy.
(press Enter for 0) > Is this a critical extension [y/N]?
chains.sh: #6257: AnyPolicy: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
chains.sh: #6258: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB CA3DB
certutil -N -d CA3DB -f CA3DB/dbpasswd
chains.sh: #6259: AnyPolicy: Creating DB CA3DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA3Req.der
certutil -s "CN=CA3 Intermediate, O=CA3, C=US"  -R -2 -d CA3DB -f CA3DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA3Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6260: AnyPolicy: Creating Intermediate certifiate request CA3Req.der  - PASSED
chains.sh: Creating certficate CA3CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 1128111051   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6261: AnyPolicy: Creating certficate CA3CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA3CA1.der to CA3DB database
certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der
chains.sh: #6262: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database  - PASSED
chains.sh: Creating DB User1DB
certutil -N -d User1DB -f User1DB/dbpasswd
chains.sh: #6263: AnyPolicy: Creating DB User1DB  - PASSED
chains.sh: Creating EE certifiate request User1Req.der
certutil -s "CN=User1 EE, O=User1, C=US"  -R  -d User1DB -f User1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o User1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6264: AnyPolicy: Creating EE certifiate request User1Req.der  - PASSED
chains.sh: Creating certficate User1CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1128111052   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6265: AnyPolicy: Creating certficate User1CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate User1CA2.der to User1DB database
certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der
chains.sh: #6266: AnyPolicy: Importing certificate User1CA2.der to User1DB database  - PASSED
chains.sh: Creating DB User2DB
certutil -N -d User2DB -f User2DB/dbpasswd
chains.sh: #6267: AnyPolicy: Creating DB User2DB  - PASSED
chains.sh: Creating EE certifiate request User2Req.der
certutil -s "CN=User2 EE, O=User2, C=US"  -R  -d User2DB -f User2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o User2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6268: AnyPolicy: Creating EE certifiate request User2Req.der  - PASSED
chains.sh: Creating certficate User2CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1128111053   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6269: AnyPolicy: Creating certficate User2CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate User2CA2.der to User2DB database
certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der
chains.sh: #6270: AnyPolicy: Importing certificate User2CA2.der to User2DB database  - PASSED
chains.sh: Creating DB User3DB
certutil -N -d User3DB -f User3DB/dbpasswd
chains.sh: #6271: AnyPolicy: Creating DB User3DB  - PASSED
chains.sh: Creating EE certifiate request User3Req.der
certutil -s "CN=User3 EE, O=User3, C=US"  -R  -d User3DB -f User3DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o User3Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6272: AnyPolicy: Creating EE certifiate request User3Req.der  - PASSED
chains.sh: Creating certficate User3CA3.der signed by CA3
certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 1128111054   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6273: AnyPolicy: Creating certficate User3CA3.der signed by CA3  - PASSED
chains.sh: Importing certificate User3CA3.der to User3DB database
certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der
chains.sh: #6274: AnyPolicy: Importing certificate User3CA3.der to User3DB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #6275: AnyPolicy: Creating DB AllDB  - PASSED
chains.sh: Importing certificate RootCA.der to AllDB database
certutil -A -n RootCA  -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der
chains.sh: #6276: AnyPolicy: Importing certificate RootCA.der to AllDB database  - PASSED
chains.sh: Importing certificate CA1RootCA.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der
chains.sh: #6277: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA1.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der
chains.sh: #6278: AnyPolicy: Importing certificate CA2CA1.der to AllDB database  - PASSED
chains.sh: Importing certificate CA3CA1.der to AllDB database
certutil -A -n CA3  -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der
chains.sh: #6279: AnyPolicy: Importing certificate CA3CA1.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.1.0  -t RootCA
vfychain -d AllDB -pp -vv     -o OID.1.0  User1CA2.der  -t RootCA
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128111048 (0x433d9bc8)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 16:10:23 2012
            Not After : Tue Nov 28 16:10:23 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    da:ef:a5:9c:39:ee:80:fd:83:07:3b:b4:d8:71:50:0e:
                    fb:35:fb:55:ac:04:26:5d:9c:38:f9:72:07:26:9a:30:
                    21:a6:4d:7d:79:10:33:0f:5d:0f:82:78:a4:da:6a:7d:
                    e8:bb:47:27:a6:77:67:ea:89:c0:41:8e:d4:4b:f2:a8:
                    03:f4:e8:9e:fa:3d:fb:1c:5f:86:8c:75:3d:28:34:64:
                    70:cf:b1:a6:3b:4c:43:0f:11:86:7b:f4:b5:e7:0e:de:
                    d6:e5:b9:fa:06:27:65:11:07:25:21:7f:c7:34:f1:1d:
                    95:94:c5:b9:9a:f8:25:1c:39:b9:cd:78:b5:e3:67:9f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        6e:f5:b1:09:c1:b6:2c:20:87:9b:36:90:6d:4b:d4:43:
        ef:ed:47:8d:03:36:69:e8:11:a5:d5:c6:49:3d:03:e4:
        83:03:55:3a:e2:7d:21:1d:49:bc:97:c6:f8:52:b3:e4:
        8e:43:fb:0c:0e:dd:8e:16:a7:c3:0c:16:96:38:a0:a0:
        20:b1:59:5e:a9:0a:a1:30:ec:78:83:fd:84:0e:e6:a7:
        76:6e:03:70:3b:2b:64:79:80:d5:1b:f1:e2:b2:d3:45:
        a1:cd:b7:af:6a:a6:03:b8:ba:21:78:14:6d:00:93:88:
        da:e9:c9:90:61:80:2a:87:84:f2:7a:af:86:40:91:d4
    Fingerprint (MD5):
        CA:8A:38:C9:B5:AC:12:9D:98:D9:FE:52:A7:38:99:93
    Fingerprint (SHA1):
        86:14:09:F7:CA:85:AB:9C:2D:46:AB:D8:CE:56:3D:8E:07:59:39:92

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #6280: AnyPolicy: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.1.0  -t RootCA - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.2.0  -t RootCA
vfychain -d AllDB -pp -vv     -o OID.2.0  User1CA2.der  -t RootCA
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. RootCA [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6281: AnyPolicy: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.2.0  -t RootCA - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.1.0  -t RootCA
vfychain -d AllDB -pp -vv     -o OID.1.0  User2CA2.der  -t RootCA
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. RootCA [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6282: AnyPolicy: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.1.0  -t RootCA - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.2.0  -t RootCA
vfychain -d AllDB -pp -vv     -o OID.2.0  User2CA2.der  -t RootCA
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. RootCA [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6283: AnyPolicy: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.2.0  -t RootCA - PASSED
chains.sh: Verifying certificate(s)  User3CA3.der with flags  -d AllDB    -o OID.1.0  -t RootCA
vfychain -d AllDB -pp -vv     -o OID.1.0  User3CA3.der  -t RootCA
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128111048 (0x433d9bc8)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 16:10:23 2012
            Not After : Tue Nov 28 16:10:23 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    da:ef:a5:9c:39:ee:80:fd:83:07:3b:b4:d8:71:50:0e:
                    fb:35:fb:55:ac:04:26:5d:9c:38:f9:72:07:26:9a:30:
                    21:a6:4d:7d:79:10:33:0f:5d:0f:82:78:a4:da:6a:7d:
                    e8:bb:47:27:a6:77:67:ea:89:c0:41:8e:d4:4b:f2:a8:
                    03:f4:e8:9e:fa:3d:fb:1c:5f:86:8c:75:3d:28:34:64:
                    70:cf:b1:a6:3b:4c:43:0f:11:86:7b:f4:b5:e7:0e:de:
                    d6:e5:b9:fa:06:27:65:11:07:25:21:7f:c7:34:f1:1d:
                    95:94:c5:b9:9a:f8:25:1c:39:b9:cd:78:b5:e3:67:9f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        6e:f5:b1:09:c1:b6:2c:20:87:9b:36:90:6d:4b:d4:43:
        ef:ed:47:8d:03:36:69:e8:11:a5:d5:c6:49:3d:03:e4:
        83:03:55:3a:e2:7d:21:1d:49:bc:97:c6:f8:52:b3:e4:
        8e:43:fb:0c:0e:dd:8e:16:a7:c3:0c:16:96:38:a0:a0:
        20:b1:59:5e:a9:0a:a1:30:ec:78:83:fd:84:0e:e6:a7:
        76:6e:03:70:3b:2b:64:79:80:d5:1b:f1:e2:b2:d3:45:
        a1:cd:b7:af:6a:a6:03:b8:ba:21:78:14:6d:00:93:88:
        da:e9:c9:90:61:80:2a:87:84:f2:7a:af:86:40:91:d4
    Fingerprint (MD5):
        CA:8A:38:C9:B5:AC:12:9D:98:D9:FE:52:A7:38:99:93
    Fingerprint (SHA1):
        86:14:09:F7:CA:85:AB:9C:2D:46:AB:D8:CE:56:3D:8E:07:59:39:92

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User3 EE,O=User3,C=US"
Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #6284: AnyPolicy: Verifying certificate(s)  User3CA3.der with flags  -d AllDB    -o OID.1.0  -t RootCA - PASSED
chains.sh: Verifying certificate(s)  User3CA3.der with flags  -d AllDB    -o OID.2.0  -t RootCA
vfychain -d AllDB -pp -vv     -o OID.2.0  User3CA3.der  -t RootCA
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. RootCA [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6285: AnyPolicy: Verifying certificate(s)  User3CA3.der with flags  -d AllDB    -o OID.2.0  -t RootCA - PASSED
chains.sh: Creating DB RootCADB
certutil -N -d RootCADB -f RootCADB/dbpasswd
chains.sh: #6286: AnyPolicyWithLevel: Creating DB RootCADB  - PASSED
chains.sh: Creating Root CA RootCA
certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA  -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -m 1128111055 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #6287: AnyPolicyWithLevel: Creating Root CA RootCA  - PASSED
chains.sh: Exporting Root CA RootCA.der
certutil -L -d RootCADB -r -n RootCA -o RootCA.der
chains.sh: #6288: AnyPolicyWithLevel: Exporting Root CA RootCA.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #6289: AnyPolicyWithLevel: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6290: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1RootCA.der signed by RootCA
certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1128111056   --extCP --extIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
any
1

n
n
n
1
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter the number of certs in the path permitted to use anyPolicy.
(press Enter for 0) > Is this a critical extension [y/N]?
chains.sh: #6291: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA  - PASSED
chains.sh: Importing certificate CA1RootCA.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der
chains.sh: #6292: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database  - PASSED
chains.sh: Creating DB CA12DB
certutil -N -d CA12DB -f CA12DB/dbpasswd
chains.sh: #6293: AnyPolicyWithLevel: Creating DB CA12DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA12Req.der
certutil -s "CN=CA12 Intermediate, O=CA12, C=US"  -R -2 -d CA12DB -f CA12DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA12Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6294: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der  - PASSED
chains.sh: Creating certficate CA12CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 1128111057   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6295: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA12CA1.der to CA12DB database
certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der
chains.sh: #6296: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database  - PASSED
chains.sh: Creating DB CA13DB
certutil -N -d CA13DB -f CA13DB/dbpasswd
chains.sh: #6297: AnyPolicyWithLevel: Creating DB CA13DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA13Req.der
certutil -s "CN=CA13 Intermediate, O=CA13, C=US"  -R -2 -d CA13DB -f CA13DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA13Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6298: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der  - PASSED
chains.sh: Creating certficate CA13CA12.der signed by CA12
certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 1128111058   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6299: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12  - PASSED
chains.sh: Importing certificate CA13CA12.der to CA13DB database
certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der
chains.sh: #6300: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #6301: AnyPolicyWithLevel: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o EE1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6302: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA13.der signed by CA13
certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 1128111059   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6303: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13  - PASSED
chains.sh: Importing certificate EE1CA13.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der
chains.sh: #6304: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database  - PASSED
chains.sh: Creating DB CA22DB
certutil -N -d CA22DB -f CA22DB/dbpasswd
chains.sh: #6305: AnyPolicyWithLevel: Creating DB CA22DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA22Req.der
certutil -s "CN=CA22 Intermediate, O=CA22, C=US"  -R -2 -d CA22DB -f CA22DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA22Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6306: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der  - PASSED
chains.sh: Creating certficate CA22CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 1128111060   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6307: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA22CA1.der to CA22DB database
certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der
chains.sh: #6308: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database  - PASSED
chains.sh: Creating DB CA23DB
certutil -N -d CA23DB -f CA23DB/dbpasswd
chains.sh: #6309: AnyPolicyWithLevel: Creating DB CA23DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA23Req.der
certutil -s "CN=CA23 Intermediate, O=CA23, C=US"  -R -2 -d CA23DB -f CA23DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA23Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6310: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der  - PASSED
chains.sh: Creating certficate CA23CA22.der signed by CA22
certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 1128111061   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6311: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22  - PASSED
chains.sh: Importing certificate CA23CA22.der to CA23DB database
certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der
chains.sh: #6312: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database  - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #6313: AnyPolicyWithLevel: Creating DB EE2DB  - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US"  -R  -d EE2DB -f EE2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o EE2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6314: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der  - PASSED
chains.sh: Creating certficate EE2CA23.der signed by CA23
certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 1128111062   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6315: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23  - PASSED
chains.sh: Importing certificate EE2CA23.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der
chains.sh: #6316: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database  - PASSED
chains.sh: Creating DB CA32DB
certutil -N -d CA32DB -f CA32DB/dbpasswd
chains.sh: #6317: AnyPolicyWithLevel: Creating DB CA32DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA32Req.der
certutil -s "CN=CA32 Intermediate, O=CA32, C=US"  -R -2 -d CA32DB -f CA32DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA32Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6318: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der  - PASSED
chains.sh: Creating certficate CA32CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 1128111063   --extCP --extIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
any
1

n
n
n
1
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter the number of certs in the path permitted to use anyPolicy.
(press Enter for 0) > Is this a critical extension [y/N]?
chains.sh: #6319: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA32CA1.der to CA32DB database
certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der
chains.sh: #6320: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database  - PASSED
chains.sh: Creating DB CA33DB
certutil -N -d CA33DB -f CA33DB/dbpasswd
chains.sh: #6321: AnyPolicyWithLevel: Creating DB CA33DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA33Req.der
certutil -s "CN=CA33 Intermediate, O=CA33, C=US"  -R -2 -d CA33DB -f CA33DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA33Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6322: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der  - PASSED
chains.sh: Creating certficate CA33CA32.der signed by CA32
certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 1128111064   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6323: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32  - PASSED
chains.sh: Importing certificate CA33CA32.der to CA33DB database
certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der
chains.sh: #6324: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database  - PASSED
chains.sh: Creating DB EE3DB
certutil -N -d EE3DB -f EE3DB/dbpasswd
chains.sh: #6325: AnyPolicyWithLevel: Creating DB EE3DB  - PASSED
chains.sh: Creating EE certifiate request EE3Req.der
certutil -s "CN=EE3 EE, O=EE3, C=US"  -R  -d EE3DB -f EE3DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o EE3Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6326: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der  - PASSED
chains.sh: Creating certficate EE3CA33.der signed by CA33
certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 1128111065   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6327: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33  - PASSED
chains.sh: Importing certificate EE3CA33.der to EE3DB database
certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der
chains.sh: #6328: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database  - PASSED
chains.sh: Creating DB CA42DB
certutil -N -d CA42DB -f CA42DB/dbpasswd
chains.sh: #6329: AnyPolicyWithLevel: Creating DB CA42DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA42Req.der
certutil -s "CN=CA42 Intermediate, O=CA42, C=US"  -R -2 -d CA42DB -f CA42DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA42Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6330: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der  - PASSED
chains.sh: Creating certficate CA42CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 1128111066   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
any
1

n
y
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6331: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA42CA1.der to CA42DB database
certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der
chains.sh: #6332: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database  - PASSED
chains.sh: Creating DB CA43DB
certutil -N -d CA43DB -f CA43DB/dbpasswd
chains.sh: #6333: AnyPolicyWithLevel: Creating DB CA43DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA43Req.der
certutil -s "CN=CA43 Intermediate, O=CA43, C=US"  -R -2 -d CA43DB -f CA43DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA43Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6334: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der  - PASSED
chains.sh: Creating certficate CA43CA42.der signed by CA42
certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 1128111067   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
any
1

n
y
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6335: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42  - PASSED
chains.sh: Importing certificate CA43CA42.der to CA43DB database
certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der
chains.sh: #6336: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database  - PASSED
chains.sh: Creating DB EE4DB
certutil -N -d EE4DB -f EE4DB/dbpasswd
chains.sh: #6337: AnyPolicyWithLevel: Creating DB EE4DB  - PASSED
chains.sh: Creating EE certifiate request EE4Req.der
certutil -s "CN=EE4 EE, O=EE4, C=US"  -R  -d EE4DB -f EE4DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o EE4Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6338: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der  - PASSED
chains.sh: Creating certficate EE4CA43.der signed by CA43
certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 1128111068   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6339: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43  - PASSED
chains.sh: Importing certificate EE4CA43.der to EE4DB database
certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der
chains.sh: #6340: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database  - PASSED
chains.sh: Creating DB CA52DB
certutil -N -d CA52DB -f CA52DB/dbpasswd
chains.sh: #6341: AnyPolicyWithLevel: Creating DB CA52DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA52Req.der
certutil -s "CN=CA52 Intermediate, O=CA52, C=US"  -R -2 -d CA52DB -f CA52DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA52Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6342: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der  - PASSED
chains.sh: Creating certficate CA52CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 1128111069   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
any
1

n
y
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6343: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA52CA1.der to CA52DB database
certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der
chains.sh: #6344: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database  - PASSED
chains.sh: Creating DB CA53DB
certutil -N -d CA53DB -f CA53DB/dbpasswd
chains.sh: #6345: AnyPolicyWithLevel: Creating DB CA53DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA53Req.der
certutil -s "CN=CA53 Intermediate, O=CA53, C=US"  -R -2 -d CA53DB -f CA53DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA53Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6346: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der  - PASSED
chains.sh: Creating certficate CA53CA52.der signed by CA52
certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 1128111070   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6347: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52  - PASSED
chains.sh: Importing certificate CA53CA52.der to CA53DB database
certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der
chains.sh: #6348: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database  - PASSED
chains.sh: Creating DB EE5DB
certutil -N -d EE5DB -f EE5DB/dbpasswd
chains.sh: #6349: AnyPolicyWithLevel: Creating DB EE5DB  - PASSED
chains.sh: Creating EE certifiate request EE5Req.der
certutil -s "CN=EE5 EE, O=EE5, C=US"  -R  -d EE5DB -f EE5DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o EE5Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6350: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der  - PASSED
chains.sh: Creating certficate EE5CA53.der signed by CA53
certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 1128111071   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6351: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53  - PASSED
chains.sh: Importing certificate EE5CA53.der to EE5DB database
certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der
chains.sh: #6352: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database  - PASSED
chains.sh: Creating DB CA61DB
certutil -N -d CA61DB -f CA61DB/dbpasswd
chains.sh: #6353: AnyPolicyWithLevel: Creating DB CA61DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA61Req.der
certutil -s "CN=CA61 Intermediate, O=CA61, C=US"  -R -2 -d CA61DB -f CA61DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA61Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6354: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der  - PASSED
chains.sh: Creating certficate CA61RootCA.der signed by RootCA
certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 1128111072   --extCP --extIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
any
1

n
n
n
5
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter the number of certs in the path permitted to use anyPolicy.
(press Enter for 0) > Is this a critical extension [y/N]?
chains.sh: #6355: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA  - PASSED
chains.sh: Importing certificate CA61RootCA.der to CA61DB database
certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der
chains.sh: #6356: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database  - PASSED
chains.sh: Creating DB CA62DB
certutil -N -d CA62DB -f CA62DB/dbpasswd
chains.sh: #6357: AnyPolicyWithLevel: Creating DB CA62DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA62Req.der
certutil -s "CN=CA62 Intermediate, O=CA62, C=US"  -R -2 -d CA62DB -f CA62DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA62Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6358: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der  - PASSED
chains.sh: Creating certficate CA62CA61.der signed by CA61
certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 1128111073   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6359: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61  - PASSED
chains.sh: Importing certificate CA62CA61.der to CA62DB database
certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der
chains.sh: #6360: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database  - PASSED
chains.sh: Creating DB EE62DB
certutil -N -d EE62DB -f EE62DB/dbpasswd
chains.sh: #6361: AnyPolicyWithLevel: Creating DB EE62DB  - PASSED
chains.sh: Creating EE certifiate request EE62Req.der
certutil -s "CN=EE62 EE, O=EE62, C=US"  -R  -d EE62DB -f EE62DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o EE62Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6362: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der  - PASSED
chains.sh: Creating certficate EE62CA62.der signed by CA62
certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 1128111074   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6363: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62  - PASSED
chains.sh: Importing certificate EE62CA62.der to EE62DB database
certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der
chains.sh: #6364: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database  - PASSED
chains.sh: Creating DB CA63DB
certutil -N -d CA63DB -f CA63DB/dbpasswd
chains.sh: #6365: AnyPolicyWithLevel: Creating DB CA63DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA63Req.der
certutil -s "CN=CA63 Intermediate, O=CA63, C=US"  -R -2 -d CA63DB -f CA63DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA63Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6366: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der  - PASSED
chains.sh: Creating certficate CA63CA62.der signed by CA62
certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 1128111075   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6367: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62  - PASSED
chains.sh: Importing certificate CA63CA62.der to CA63DB database
certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der
chains.sh: #6368: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database  - PASSED
chains.sh: Creating DB EE63DB
certutil -N -d EE63DB -f EE63DB/dbpasswd
chains.sh: #6369: AnyPolicyWithLevel: Creating DB EE63DB  - PASSED
chains.sh: Creating EE certifiate request EE63Req.der
certutil -s "CN=EE63 EE, O=EE63, C=US"  -R  -d EE63DB -f EE63DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o EE63Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6370: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der  - PASSED
chains.sh: Creating certficate EE63CA63.der signed by CA63
certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 1128111076   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6371: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63  - PASSED
chains.sh: Importing certificate EE63CA63.der to EE63DB database
certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der
chains.sh: #6372: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database  - PASSED
chains.sh: Creating DB CA64DB
certutil -N -d CA64DB -f CA64DB/dbpasswd
chains.sh: #6373: AnyPolicyWithLevel: Creating DB CA64DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA64Req.der
certutil -s "CN=CA64 Intermediate, O=CA64, C=US"  -R -2 -d CA64DB -f CA64DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA64Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6374: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der  - PASSED
chains.sh: Creating certficate CA64CA63.der signed by CA63
certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 1128111077   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6375: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63  - PASSED
chains.sh: Importing certificate CA64CA63.der to CA64DB database
certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der
chains.sh: #6376: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database  - PASSED
chains.sh: Creating DB EE64DB
certutil -N -d EE64DB -f EE64DB/dbpasswd
chains.sh: #6377: AnyPolicyWithLevel: Creating DB EE64DB  - PASSED
chains.sh: Creating EE certifiate request EE64Req.der
certutil -s "CN=EE64 EE, O=EE64, C=US"  -R  -d EE64DB -f EE64DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o EE64Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6378: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der  - PASSED
chains.sh: Creating certficate EE64CA64.der signed by CA64
certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 1128111078   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6379: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64  - PASSED
chains.sh: Importing certificate EE64CA64.der to EE64DB database
certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der
chains.sh: #6380: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database  - PASSED
chains.sh: Creating DB CA65DB
certutil -N -d CA65DB -f CA65DB/dbpasswd
chains.sh: #6381: AnyPolicyWithLevel: Creating DB CA65DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA65Req.der
certutil -s "CN=CA65 Intermediate, O=CA65, C=US"  -R -2 -d CA65DB -f CA65DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA65Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6382: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der  - PASSED
chains.sh: Creating certficate CA65CA64.der signed by CA64
certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 1128111079   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6383: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64  - PASSED
chains.sh: Importing certificate CA65CA64.der to CA65DB database
certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der
chains.sh: #6384: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database  - PASSED
chains.sh: Creating DB EE65DB
certutil -N -d EE65DB -f EE65DB/dbpasswd
chains.sh: #6385: AnyPolicyWithLevel: Creating DB EE65DB  - PASSED
chains.sh: Creating EE certifiate request EE65Req.der
certutil -s "CN=EE65 EE, O=EE65, C=US"  -R  -d EE65DB -f EE65DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o EE65Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6386: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der  - PASSED
chains.sh: Creating certficate EE65CA65.der signed by CA65
certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 1128111080   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6387: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65  - PASSED
chains.sh: Importing certificate EE65CA65.der to EE65DB database
certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der
chains.sh: #6388: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database  - PASSED
chains.sh: Creating DB CA66DB
certutil -N -d CA66DB -f CA66DB/dbpasswd
chains.sh: #6389: AnyPolicyWithLevel: Creating DB CA66DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA66Req.der
certutil -s "CN=CA66 Intermediate, O=CA66, C=US"  -R -2 -d CA66DB -f CA66DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA66Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6390: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der  - PASSED
chains.sh: Creating certficate CA66CA65.der signed by CA65
certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 1128111081   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6391: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65  - PASSED
chains.sh: Importing certificate CA66CA65.der to CA66DB database
certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der
chains.sh: #6392: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database  - PASSED
chains.sh: Creating DB EE66DB
certutil -N -d EE66DB -f EE66DB/dbpasswd
chains.sh: #6393: AnyPolicyWithLevel: Creating DB EE66DB  - PASSED
chains.sh: Creating EE certifiate request EE66Req.der
certutil -s "CN=EE66 EE, O=EE66, C=US"  -R  -d EE66DB -f EE66DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o EE66Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6394: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der  - PASSED
chains.sh: Creating certficate EE66CA66.der signed by CA66
certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 1128111082   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6395: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66  - PASSED
chains.sh: Importing certificate EE66CA66.der to EE66DB database
certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der
chains.sh: #6396: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database  - PASSED
chains.sh: Creating DB CA67DB
certutil -N -d CA67DB -f CA67DB/dbpasswd
chains.sh: #6397: AnyPolicyWithLevel: Creating DB CA67DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA67Req.der
certutil -s "CN=CA67 Intermediate, O=CA67, C=US"  -R -2 -d CA67DB -f CA67DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA67Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6398: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der  - PASSED
chains.sh: Creating certficate CA67CA66.der signed by CA66
certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 1128111083   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6399: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66  - PASSED
chains.sh: Importing certificate CA67CA66.der to CA67DB database
certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der
chains.sh: #6400: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database  - PASSED
chains.sh: Creating DB EE67DB
certutil -N -d EE67DB -f EE67DB/dbpasswd
chains.sh: #6401: AnyPolicyWithLevel: Creating DB EE67DB  - PASSED
chains.sh: Creating EE certifiate request EE67Req.der
certutil -s "CN=EE67 EE, O=EE67, C=US"  -R  -d EE67DB -f EE67DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o EE67Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6402: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der  - PASSED
chains.sh: Creating certficate EE67CA67.der signed by CA67
certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 1128111084   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6403: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67  - PASSED
chains.sh: Importing certificate EE67CA67.der to EE67DB database
certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der
chains.sh: #6404: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #6405: AnyPolicyWithLevel: Creating DB AllDB  - PASSED
chains.sh: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128111055 (0x433d9bcf)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 16:10:26 2012
            Not After : Tue Nov 28 16:10:26 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:7d:8b:40:fa:53:d3:1e:48:c6:7f:52:08:e6:73:1e:
                    6c:c1:90:d0:d3:97:ce:fe:ba:81:33:0e:e7:8d:71:51:
                    d9:58:7c:19:17:c3:8a:b4:5b:77:10:1a:ce:01:c3:ca:
                    08:55:7a:86:58:a5:a3:73:5f:af:9f:a6:1a:11:c6:10:
                    db:cf:3a:c0:79:39:67:fa:08:aa:35:74:f7:35:d2:f9:
                    6c:b7:ad:8c:49:62:68:ae:08:47:f9:dc:0c:b4:ce:0a:
                    52:25:05:27:b7:22:2f:21:70:4a:23:15:ca:06:1d:8e:
                    a8:0d:81:51:95:12:87:5f:34:d5:72:2a:8e:43:f0:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        99:c9:0f:0c:4c:40:57:8d:8d:a3:05:c4:f5:d6:35:a2:
        52:66:3a:ee:46:8f:58:59:ba:4a:62:0a:3a:ea:2d:0a:
        48:b3:ac:37:59:cd:84:c5:27:68:4a:43:71:c1:49:ac:
        46:b9:26:45:bf:9b:50:9f:2f:f0:90:18:fc:5a:b4:dc:
        e0:9a:d9:c6:58:7b:7b:eb:c0:78:49:80:4c:86:fc:a2:
        06:bc:2f:0c:cd:9f:c4:24:c1:d4:69:f5:ff:f3:de:6a:
        0a:1d:4e:d6:85:6e:d4:d2:ce:cd:8a:9d:58:10:44:61:
        da:4d:70:0f:9a:a2:34:78:af:d6:68:f7:7f:ef:94:9b
    Fingerprint (MD5):
        DE:EB:C8:45:9D:41:02:24:A0:8A:10:E1:F8:E9:80:1D
    Fingerprint (SHA1):
        D5:18:1A:99:84:4A:25:20:95:92:C3:9A:6D:33:C4:86:18:94:49:7F


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US"
Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #6406: AnyPolicyWithLevel: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.0  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6407: AnyPolicyWithLevel: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.5.29.32.0  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128111055 (0x433d9bcf)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 16:10:26 2012
            Not After : Tue Nov 28 16:10:26 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:7d:8b:40:fa:53:d3:1e:48:c6:7f:52:08:e6:73:1e:
                    6c:c1:90:d0:d3:97:ce:fe:ba:81:33:0e:e7:8d:71:51:
                    d9:58:7c:19:17:c3:8a:b4:5b:77:10:1a:ce:01:c3:ca:
                    08:55:7a:86:58:a5:a3:73:5f:af:9f:a6:1a:11:c6:10:
                    db:cf:3a:c0:79:39:67:fa:08:aa:35:74:f7:35:d2:f9:
                    6c:b7:ad:8c:49:62:68:ae:08:47:f9:dc:0c:b4:ce:0a:
                    52:25:05:27:b7:22:2f:21:70:4a:23:15:ca:06:1d:8e:
                    a8:0d:81:51:95:12:87:5f:34:d5:72:2a:8e:43:f0:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        99:c9:0f:0c:4c:40:57:8d:8d:a3:05:c4:f5:d6:35:a2:
        52:66:3a:ee:46:8f:58:59:ba:4a:62:0a:3a:ea:2d:0a:
        48:b3:ac:37:59:cd:84:c5:27:68:4a:43:71:c1:49:ac:
        46:b9:26:45:bf:9b:50:9f:2f:f0:90:18:fc:5a:b4:dc:
        e0:9a:d9:c6:58:7b:7b:eb:c0:78:49:80:4c:86:fc:a2:
        06:bc:2f:0c:cd:9f:c4:24:c1:d4:69:f5:ff:f3:de:6a:
        0a:1d:4e:d6:85:6e:d4:d2:ce:cd:8a:9d:58:10:44:61:
        da:4d:70:0f:9a:a2:34:78:af:d6:68:f7:7f:ef:94:9b
    Fingerprint (MD5):
        DE:EB:C8:45:9D:41:02:24:A0:8A:10:E1:F8:E9:80:1D
    Fingerprint (SHA1):
        D5:18:1A:99:84:4A:25:20:95:92:C3:9A:6D:33:C4:86:18:94:49:7F


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US"
Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #6408: AnyPolicyWithLevel: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6409: AnyPolicyWithLevel: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.0  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6410: AnyPolicyWithLevel: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.5.29.32.0  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6411: AnyPolicyWithLevel: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags  -d AllDB     -t RootCA.der
vfychain -d AllDB -pp -vv      EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128111055 (0x433d9bcf)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 16:10:26 2012
            Not After : Tue Nov 28 16:10:26 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:7d:8b:40:fa:53:d3:1e:48:c6:7f:52:08:e6:73:1e:
                    6c:c1:90:d0:d3:97:ce:fe:ba:81:33:0e:e7:8d:71:51:
                    d9:58:7c:19:17:c3:8a:b4:5b:77:10:1a:ce:01:c3:ca:
                    08:55:7a:86:58:a5:a3:73:5f:af:9f:a6:1a:11:c6:10:
                    db:cf:3a:c0:79:39:67:fa:08:aa:35:74:f7:35:d2:f9:
                    6c:b7:ad:8c:49:62:68:ae:08:47:f9:dc:0c:b4:ce:0a:
                    52:25:05:27:b7:22:2f:21:70:4a:23:15:ca:06:1d:8e:
                    a8:0d:81:51:95:12:87:5f:34:d5:72:2a:8e:43:f0:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        99:c9:0f:0c:4c:40:57:8d:8d:a3:05:c4:f5:d6:35:a2:
        52:66:3a:ee:46:8f:58:59:ba:4a:62:0a:3a:ea:2d:0a:
        48:b3:ac:37:59:cd:84:c5:27:68:4a:43:71:c1:49:ac:
        46:b9:26:45:bf:9b:50:9f:2f:f0:90:18:fc:5a:b4:dc:
        e0:9a:d9:c6:58:7b:7b:eb:c0:78:49:80:4c:86:fc:a2:
        06:bc:2f:0c:cd:9f:c4:24:c1:d4:69:f5:ff:f3:de:6a:
        0a:1d:4e:d6:85:6e:d4:d2:ce:cd:8a:9d:58:10:44:61:
        da:4d:70:0f:9a:a2:34:78:af:d6:68:f7:7f:ef:94:9b
    Fingerprint (MD5):
        DE:EB:C8:45:9D:41:02:24:A0:8A:10:E1:F8:E9:80:1D
    Fingerprint (SHA1):
        D5:18:1A:99:84:4A:25:20:95:92:C3:9A:6D:33:C4:86:18:94:49:7F


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US"
Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #6412: AnyPolicyWithLevel: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags  -d AllDB     -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6413: AnyPolicyWithLevel: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.0  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6414: AnyPolicyWithLevel: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.5.29.32.0  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6415: AnyPolicyWithLevel: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags  -d AllDB     -t RootCA.der
vfychain -d AllDB -pp -vv      EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128111055 (0x433d9bcf)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 16:10:26 2012
            Not After : Tue Nov 28 16:10:26 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:7d:8b:40:fa:53:d3:1e:48:c6:7f:52:08:e6:73:1e:
                    6c:c1:90:d0:d3:97:ce:fe:ba:81:33:0e:e7:8d:71:51:
                    d9:58:7c:19:17:c3:8a:b4:5b:77:10:1a:ce:01:c3:ca:
                    08:55:7a:86:58:a5:a3:73:5f:af:9f:a6:1a:11:c6:10:
                    db:cf:3a:c0:79:39:67:fa:08:aa:35:74:f7:35:d2:f9:
                    6c:b7:ad:8c:49:62:68:ae:08:47:f9:dc:0c:b4:ce:0a:
                    52:25:05:27:b7:22:2f:21:70:4a:23:15:ca:06:1d:8e:
                    a8:0d:81:51:95:12:87:5f:34:d5:72:2a:8e:43:f0:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        99:c9:0f:0c:4c:40:57:8d:8d:a3:05:c4:f5:d6:35:a2:
        52:66:3a:ee:46:8f:58:59:ba:4a:62:0a:3a:ea:2d:0a:
        48:b3:ac:37:59:cd:84:c5:27:68:4a:43:71:c1:49:ac:
        46:b9:26:45:bf:9b:50:9f:2f:f0:90:18:fc:5a:b4:dc:
        e0:9a:d9:c6:58:7b:7b:eb:c0:78:49:80:4c:86:fc:a2:
        06:bc:2f:0c:cd:9f:c4:24:c1:d4:69:f5:ff:f3:de:6a:
        0a:1d:4e:d6:85:6e:d4:d2:ce:cd:8a:9d:58:10:44:61:
        da:4d:70:0f:9a:a2:34:78:af:d6:68:f7:7f:ef:94:9b
    Fingerprint (MD5):
        DE:EB:C8:45:9D:41:02:24:A0:8A:10:E1:F8:E9:80:1D
    Fingerprint (SHA1):
        D5:18:1A:99:84:4A:25:20:95:92:C3:9A:6D:33:C4:86:18:94:49:7F


Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US"
Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US"
Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #6416: AnyPolicyWithLevel: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags  -d AllDB     -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128111055 (0x433d9bcf)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 16:10:26 2012
            Not After : Tue Nov 28 16:10:26 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:7d:8b:40:fa:53:d3:1e:48:c6:7f:52:08:e6:73:1e:
                    6c:c1:90:d0:d3:97:ce:fe:ba:81:33:0e:e7:8d:71:51:
                    d9:58:7c:19:17:c3:8a:b4:5b:77:10:1a:ce:01:c3:ca:
                    08:55:7a:86:58:a5:a3:73:5f:af:9f:a6:1a:11:c6:10:
                    db:cf:3a:c0:79:39:67:fa:08:aa:35:74:f7:35:d2:f9:
                    6c:b7:ad:8c:49:62:68:ae:08:47:f9:dc:0c:b4:ce:0a:
                    52:25:05:27:b7:22:2f:21:70:4a:23:15:ca:06:1d:8e:
                    a8:0d:81:51:95:12:87:5f:34:d5:72:2a:8e:43:f0:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        99:c9:0f:0c:4c:40:57:8d:8d:a3:05:c4:f5:d6:35:a2:
        52:66:3a:ee:46:8f:58:59:ba:4a:62:0a:3a:ea:2d:0a:
        48:b3:ac:37:59:cd:84:c5:27:68:4a:43:71:c1:49:ac:
        46:b9:26:45:bf:9b:50:9f:2f:f0:90:18:fc:5a:b4:dc:
        e0:9a:d9:c6:58:7b:7b:eb:c0:78:49:80:4c:86:fc:a2:
        06:bc:2f:0c:cd:9f:c4:24:c1:d4:69:f5:ff:f3:de:6a:
        0a:1d:4e:d6:85:6e:d4:d2:ce:cd:8a:9d:58:10:44:61:
        da:4d:70:0f:9a:a2:34:78:af:d6:68:f7:7f:ef:94:9b
    Fingerprint (MD5):
        DE:EB:C8:45:9D:41:02:24:A0:8A:10:E1:F8:E9:80:1D
    Fingerprint (SHA1):
        D5:18:1A:99:84:4A:25:20:95:92:C3:9A:6D:33:C4:86:18:94:49:7F


Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US"
Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US"
Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #6417: AnyPolicyWithLevel: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.0  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6418: AnyPolicyWithLevel: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.5.29.32.0  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128111055 (0x433d9bcf)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 16:10:26 2012
            Not After : Tue Nov 28 16:10:26 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:7d:8b:40:fa:53:d3:1e:48:c6:7f:52:08:e6:73:1e:
                    6c:c1:90:d0:d3:97:ce:fe:ba:81:33:0e:e7:8d:71:51:
                    d9:58:7c:19:17:c3:8a:b4:5b:77:10:1a:ce:01:c3:ca:
                    08:55:7a:86:58:a5:a3:73:5f:af:9f:a6:1a:11:c6:10:
                    db:cf:3a:c0:79:39:67:fa:08:aa:35:74:f7:35:d2:f9:
                    6c:b7:ad:8c:49:62:68:ae:08:47:f9:dc:0c:b4:ce:0a:
                    52:25:05:27:b7:22:2f:21:70:4a:23:15:ca:06:1d:8e:
                    a8:0d:81:51:95:12:87:5f:34:d5:72:2a:8e:43:f0:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        99:c9:0f:0c:4c:40:57:8d:8d:a3:05:c4:f5:d6:35:a2:
        52:66:3a:ee:46:8f:58:59:ba:4a:62:0a:3a:ea:2d:0a:
        48:b3:ac:37:59:cd:84:c5:27:68:4a:43:71:c1:49:ac:
        46:b9:26:45:bf:9b:50:9f:2f:f0:90:18:fc:5a:b4:dc:
        e0:9a:d9:c6:58:7b:7b:eb:c0:78:49:80:4c:86:fc:a2:
        06:bc:2f:0c:cd:9f:c4:24:c1:d4:69:f5:ff:f3:de:6a:
        0a:1d:4e:d6:85:6e:d4:d2:ce:cd:8a:9d:58:10:44:61:
        da:4d:70:0f:9a:a2:34:78:af:d6:68:f7:7f:ef:94:9b
    Fingerprint (MD5):
        DE:EB:C8:45:9D:41:02:24:A0:8A:10:E1:F8:E9:80:1D
    Fingerprint (SHA1):
        D5:18:1A:99:84:4A:25:20:95:92:C3:9A:6D:33:C4:86:18:94:49:7F


Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US"
Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US"
Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #6419: AnyPolicyWithLevel: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6420: AnyPolicyWithLevel: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.0  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6421: AnyPolicyWithLevel: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.5.29.32.0  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6422: AnyPolicyWithLevel: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags  -d AllDB     -t RootCA.der
vfychain -d AllDB -pp -vv      EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128111055 (0x433d9bcf)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 16:10:26 2012
            Not After : Tue Nov 28 16:10:26 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:7d:8b:40:fa:53:d3:1e:48:c6:7f:52:08:e6:73:1e:
                    6c:c1:90:d0:d3:97:ce:fe:ba:81:33:0e:e7:8d:71:51:
                    d9:58:7c:19:17:c3:8a:b4:5b:77:10:1a:ce:01:c3:ca:
                    08:55:7a:86:58:a5:a3:73:5f:af:9f:a6:1a:11:c6:10:
                    db:cf:3a:c0:79:39:67:fa:08:aa:35:74:f7:35:d2:f9:
                    6c:b7:ad:8c:49:62:68:ae:08:47:f9:dc:0c:b4:ce:0a:
                    52:25:05:27:b7:22:2f:21:70:4a:23:15:ca:06:1d:8e:
                    a8:0d:81:51:95:12:87:5f:34:d5:72:2a:8e:43:f0:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        99:c9:0f:0c:4c:40:57:8d:8d:a3:05:c4:f5:d6:35:a2:
        52:66:3a:ee:46:8f:58:59:ba:4a:62:0a:3a:ea:2d:0a:
        48:b3:ac:37:59:cd:84:c5:27:68:4a:43:71:c1:49:ac:
        46:b9:26:45:bf:9b:50:9f:2f:f0:90:18:fc:5a:b4:dc:
        e0:9a:d9:c6:58:7b:7b:eb:c0:78:49:80:4c:86:fc:a2:
        06:bc:2f:0c:cd:9f:c4:24:c1:d4:69:f5:ff:f3:de:6a:
        0a:1d:4e:d6:85:6e:d4:d2:ce:cd:8a:9d:58:10:44:61:
        da:4d:70:0f:9a:a2:34:78:af:d6:68:f7:7f:ef:94:9b
    Fingerprint (MD5):
        DE:EB:C8:45:9D:41:02:24:A0:8A:10:E1:F8:E9:80:1D
    Fingerprint (SHA1):
        D5:18:1A:99:84:4A:25:20:95:92:C3:9A:6D:33:C4:86:18:94:49:7F


Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US"
Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US"
Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #6423: AnyPolicyWithLevel: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags  -d AllDB     -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128111055 (0x433d9bcf)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 16:10:26 2012
            Not After : Tue Nov 28 16:10:26 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:7d:8b:40:fa:53:d3:1e:48:c6:7f:52:08:e6:73:1e:
                    6c:c1:90:d0:d3:97:ce:fe:ba:81:33:0e:e7:8d:71:51:
                    d9:58:7c:19:17:c3:8a:b4:5b:77:10:1a:ce:01:c3:ca:
                    08:55:7a:86:58:a5:a3:73:5f:af:9f:a6:1a:11:c6:10:
                    db:cf:3a:c0:79:39:67:fa:08:aa:35:74:f7:35:d2:f9:
                    6c:b7:ad:8c:49:62:68:ae:08:47:f9:dc:0c:b4:ce:0a:
                    52:25:05:27:b7:22:2f:21:70:4a:23:15:ca:06:1d:8e:
                    a8:0d:81:51:95:12:87:5f:34:d5:72:2a:8e:43:f0:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        99:c9:0f:0c:4c:40:57:8d:8d:a3:05:c4:f5:d6:35:a2:
        52:66:3a:ee:46:8f:58:59:ba:4a:62:0a:3a:ea:2d:0a:
        48:b3:ac:37:59:cd:84:c5:27:68:4a:43:71:c1:49:ac:
        46:b9:26:45:bf:9b:50:9f:2f:f0:90:18:fc:5a:b4:dc:
        e0:9a:d9:c6:58:7b:7b:eb:c0:78:49:80:4c:86:fc:a2:
        06:bc:2f:0c:cd:9f:c4:24:c1:d4:69:f5:ff:f3:de:6a:
        0a:1d:4e:d6:85:6e:d4:d2:ce:cd:8a:9d:58:10:44:61:
        da:4d:70:0f:9a:a2:34:78:af:d6:68:f7:7f:ef:94:9b
    Fingerprint (MD5):
        DE:EB:C8:45:9D:41:02:24:A0:8A:10:E1:F8:E9:80:1D
    Fingerprint (SHA1):
        D5:18:1A:99:84:4A:25:20:95:92:C3:9A:6D:33:C4:86:18:94:49:7F


Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US"
Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US"
Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US"
Returned value is 0, expected result is pass
chains.sh: #6424: AnyPolicyWithLevel: Verifying certificate(s)  EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128111055 (0x433d9bcf)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 16:10:26 2012
            Not After : Tue Nov 28 16:10:26 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:7d:8b:40:fa:53:d3:1e:48:c6:7f:52:08:e6:73:1e:
                    6c:c1:90:d0:d3:97:ce:fe:ba:81:33:0e:e7:8d:71:51:
                    d9:58:7c:19:17:c3:8a:b4:5b:77:10:1a:ce:01:c3:ca:
                    08:55:7a:86:58:a5:a3:73:5f:af:9f:a6:1a:11:c6:10:
                    db:cf:3a:c0:79:39:67:fa:08:aa:35:74:f7:35:d2:f9:
                    6c:b7:ad:8c:49:62:68:ae:08:47:f9:dc:0c:b4:ce:0a:
                    52:25:05:27:b7:22:2f:21:70:4a:23:15:ca:06:1d:8e:
                    a8:0d:81:51:95:12:87:5f:34:d5:72:2a:8e:43:f0:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        99:c9:0f:0c:4c:40:57:8d:8d:a3:05:c4:f5:d6:35:a2:
        52:66:3a:ee:46:8f:58:59:ba:4a:62:0a:3a:ea:2d:0a:
        48:b3:ac:37:59:cd:84:c5:27:68:4a:43:71:c1:49:ac:
        46:b9:26:45:bf:9b:50:9f:2f:f0:90:18:fc:5a:b4:dc:
        e0:9a:d9:c6:58:7b:7b:eb:c0:78:49:80:4c:86:fc:a2:
        06:bc:2f:0c:cd:9f:c4:24:c1:d4:69:f5:ff:f3:de:6a:
        0a:1d:4e:d6:85:6e:d4:d2:ce:cd:8a:9d:58:10:44:61:
        da:4d:70:0f:9a:a2:34:78:af:d6:68:f7:7f:ef:94:9b
    Fingerprint (MD5):
        DE:EB:C8:45:9D:41:02:24:A0:8A:10:E1:F8:E9:80:1D
    Fingerprint (SHA1):
        D5:18:1A:99:84:4A:25:20:95:92:C3:9A:6D:33:C4:86:18:94:49:7F


Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US"
Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US"
Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US"
Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US"
Returned value is 0, expected result is pass
chains.sh: #6425: AnyPolicyWithLevel: Verifying certificate(s)  EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128111055 (0x433d9bcf)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 16:10:26 2012
            Not After : Tue Nov 28 16:10:26 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:7d:8b:40:fa:53:d3:1e:48:c6:7f:52:08:e6:73:1e:
                    6c:c1:90:d0:d3:97:ce:fe:ba:81:33:0e:e7:8d:71:51:
                    d9:58:7c:19:17:c3:8a:b4:5b:77:10:1a:ce:01:c3:ca:
                    08:55:7a:86:58:a5:a3:73:5f:af:9f:a6:1a:11:c6:10:
                    db:cf:3a:c0:79:39:67:fa:08:aa:35:74:f7:35:d2:f9:
                    6c:b7:ad:8c:49:62:68:ae:08:47:f9:dc:0c:b4:ce:0a:
                    52:25:05:27:b7:22:2f:21:70:4a:23:15:ca:06:1d:8e:
                    a8:0d:81:51:95:12:87:5f:34:d5:72:2a:8e:43:f0:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        99:c9:0f:0c:4c:40:57:8d:8d:a3:05:c4:f5:d6:35:a2:
        52:66:3a:ee:46:8f:58:59:ba:4a:62:0a:3a:ea:2d:0a:
        48:b3:ac:37:59:cd:84:c5:27:68:4a:43:71:c1:49:ac:
        46:b9:26:45:bf:9b:50:9f:2f:f0:90:18:fc:5a:b4:dc:
        e0:9a:d9:c6:58:7b:7b:eb:c0:78:49:80:4c:86:fc:a2:
        06:bc:2f:0c:cd:9f:c4:24:c1:d4:69:f5:ff:f3:de:6a:
        0a:1d:4e:d6:85:6e:d4:d2:ce:cd:8a:9d:58:10:44:61:
        da:4d:70:0f:9a:a2:34:78:af:d6:68:f7:7f:ef:94:9b
    Fingerprint (MD5):
        DE:EB:C8:45:9D:41:02:24:A0:8A:10:E1:F8:E9:80:1D
    Fingerprint (SHA1):
        D5:18:1A:99:84:4A:25:20:95:92:C3:9A:6D:33:C4:86:18:94:49:7F


Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US"
Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US"
Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US"
Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US"
Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US"
Returned value is 0, expected result is pass
chains.sh: #6426: AnyPolicyWithLevel: Verifying certificate(s)  EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128111055 (0x433d9bcf)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 16:10:26 2012
            Not After : Tue Nov 28 16:10:26 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:7d:8b:40:fa:53:d3:1e:48:c6:7f:52:08:e6:73:1e:
                    6c:c1:90:d0:d3:97:ce:fe:ba:81:33:0e:e7:8d:71:51:
                    d9:58:7c:19:17:c3:8a:b4:5b:77:10:1a:ce:01:c3:ca:
                    08:55:7a:86:58:a5:a3:73:5f:af:9f:a6:1a:11:c6:10:
                    db:cf:3a:c0:79:39:67:fa:08:aa:35:74:f7:35:d2:f9:
                    6c:b7:ad:8c:49:62:68:ae:08:47:f9:dc:0c:b4:ce:0a:
                    52:25:05:27:b7:22:2f:21:70:4a:23:15:ca:06:1d:8e:
                    a8:0d:81:51:95:12:87:5f:34:d5:72:2a:8e:43:f0:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        99:c9:0f:0c:4c:40:57:8d:8d:a3:05:c4:f5:d6:35:a2:
        52:66:3a:ee:46:8f:58:59:ba:4a:62:0a:3a:ea:2d:0a:
        48:b3:ac:37:59:cd:84:c5:27:68:4a:43:71:c1:49:ac:
        46:b9:26:45:bf:9b:50:9f:2f:f0:90:18:fc:5a:b4:dc:
        e0:9a:d9:c6:58:7b:7b:eb:c0:78:49:80:4c:86:fc:a2:
        06:bc:2f:0c:cd:9f:c4:24:c1:d4:69:f5:ff:f3:de:6a:
        0a:1d:4e:d6:85:6e:d4:d2:ce:cd:8a:9d:58:10:44:61:
        da:4d:70:0f:9a:a2:34:78:af:d6:68:f7:7f:ef:94:9b
    Fingerprint (MD5):
        DE:EB:C8:45:9D:41:02:24:A0:8A:10:E1:F8:E9:80:1D
    Fingerprint (SHA1):
        D5:18:1A:99:84:4A:25:20:95:92:C3:9A:6D:33:C4:86:18:94:49:7F


Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US"
Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US"
Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US"
Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US"
Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US"
Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US"
Returned value is 0, expected result is pass
chains.sh: #6427: AnyPolicyWithLevel: Verifying certificate(s)  EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128111055 (0x433d9bcf)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 16:10:26 2012
            Not After : Tue Nov 28 16:10:26 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:7d:8b:40:fa:53:d3:1e:48:c6:7f:52:08:e6:73:1e:
                    6c:c1:90:d0:d3:97:ce:fe:ba:81:33:0e:e7:8d:71:51:
                    d9:58:7c:19:17:c3:8a:b4:5b:77:10:1a:ce:01:c3:ca:
                    08:55:7a:86:58:a5:a3:73:5f:af:9f:a6:1a:11:c6:10:
                    db:cf:3a:c0:79:39:67:fa:08:aa:35:74:f7:35:d2:f9:
                    6c:b7:ad:8c:49:62:68:ae:08:47:f9:dc:0c:b4:ce:0a:
                    52:25:05:27:b7:22:2f:21:70:4a:23:15:ca:06:1d:8e:
                    a8:0d:81:51:95:12:87:5f:34:d5:72:2a:8e:43:f0:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        99:c9:0f:0c:4c:40:57:8d:8d:a3:05:c4:f5:d6:35:a2:
        52:66:3a:ee:46:8f:58:59:ba:4a:62:0a:3a:ea:2d:0a:
        48:b3:ac:37:59:cd:84:c5:27:68:4a:43:71:c1:49:ac:
        46:b9:26:45:bf:9b:50:9f:2f:f0:90:18:fc:5a:b4:dc:
        e0:9a:d9:c6:58:7b:7b:eb:c0:78:49:80:4c:86:fc:a2:
        06:bc:2f:0c:cd:9f:c4:24:c1:d4:69:f5:ff:f3:de:6a:
        0a:1d:4e:d6:85:6e:d4:d2:ce:cd:8a:9d:58:10:44:61:
        da:4d:70:0f:9a:a2:34:78:af:d6:68:f7:7f:ef:94:9b
    Fingerprint (MD5):
        DE:EB:C8:45:9D:41:02:24:A0:8A:10:E1:F8:E9:80:1D
    Fingerprint (SHA1):
        D5:18:1A:99:84:4A:25:20:95:92:C3:9A:6D:33:C4:86:18:94:49:7F


Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US"
Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US"
Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US"
Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US"
Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US"
Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US"
Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US"
Returned value is 0, expected result is pass
chains.sh: #6428: AnyPolicyWithLevel: Verifying certificate(s)  EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6429: AnyPolicyWithLevel: Verifying certificate(s)  EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #6430: explicitPolicy: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -m 1128111085 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #6431: explicitPolicy: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #6432: explicitPolicy: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB nonEVCADB
certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd
chains.sh: #6433: explicitPolicy: Creating DB nonEVCADB  - PASSED
chains.sh: Creating Intermediate certifiate request nonEVCAReq.der
certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US"  -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o nonEVCAReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6434: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der  - PASSED
chains.sh: Creating certficate nonEVCARoot.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 1128111086   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6435: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root  - PASSED
chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database
certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der
chains.sh: #6436: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database  - PASSED
chains.sh: Creating DB EVCADB
certutil -N -d EVCADB -f EVCADB/dbpasswd
chains.sh: #6437: explicitPolicy: Creating DB EVCADB  - PASSED
chains.sh: Creating Intermediate certifiate request EVCAReq.der
certutil -s "CN=EVCA Intermediate, O=EVCA, C=US"  -R -2 -d EVCADB -f EVCADB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o EVCAReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6438: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der  - PASSED
chains.sh: Creating certficate EVCARoot.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 1128111087   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6439: explicitPolicy: Creating certficate EVCARoot.der signed by Root  - PASSED
chains.sh: Importing certificate EVCARoot.der to EVCADB database
certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der
chains.sh: #6440: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database  - PASSED
chains.sh: Creating DB otherEVCADB
certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd
chains.sh: #6441: explicitPolicy: Creating DB otherEVCADB  - PASSED
chains.sh: Creating Intermediate certifiate request otherEVCAReq.der
certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US"  -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o otherEVCAReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6442: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der  - PASSED
chains.sh: Creating certficate otherEVCARoot.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 1128111088   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6443: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root  - PASSED
chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database
certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der
chains.sh: #6444: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database  - PASSED
chains.sh: Creating DB validEVDB
certutil -N -d validEVDB -f validEVDB/dbpasswd
chains.sh: #6445: explicitPolicy: Creating DB validEVDB  - PASSED
chains.sh: Creating EE certifiate request validEVReq.der
certutil -s "CN=validEV EE, O=validEV, C=US"  -R  -d validEVDB -f validEVDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o validEVReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6446: explicitPolicy: Creating EE certifiate request validEVReq.der  - PASSED
chains.sh: Creating certficate validEVEVCA.der signed by EVCA
certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 1128111089   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6447: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA  - PASSED
chains.sh: Importing certificate validEVEVCA.der to validEVDB database
certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der
chains.sh: #6448: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database  - PASSED
chains.sh: Creating DB invalidEVDB
certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd
chains.sh: #6449: explicitPolicy: Creating DB invalidEVDB  - PASSED
chains.sh: Creating EE certifiate request invalidEVReq.der
certutil -s "CN=invalidEV EE, O=invalidEV, C=US"  -R  -d invalidEVDB -f invalidEVDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o invalidEVReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6450: explicitPolicy: Creating EE certifiate request invalidEVReq.der  - PASSED
chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA
certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 1128111090   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6451: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA  - PASSED
chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database
certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der
chains.sh: #6452: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database  - PASSED
chains.sh: Creating DB wrongEVOIDDB
certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd
chains.sh: #6453: explicitPolicy: Creating DB wrongEVOIDDB  - PASSED
chains.sh: Creating EE certifiate request wrongEVOIDReq.der
certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US"  -R  -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o wrongEVOIDReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6454: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der  - PASSED
chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA
certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 1128111091   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6455: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA  - PASSED
chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database
certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der
chains.sh: #6456: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #6457: explicitPolicy: Creating DB AllDB  - PASSED
chains.sh: Verifying certificate(s)  validEVEVCA.der EVCARoot.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der
vfychain -d AllDB -pp -vv     -o OID.1.0  validEVEVCA.der EVCARoot.der Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128111085 (0x433d9bed)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:10:37 2012
            Not After : Tue Nov 28 16:10:37 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a9:2b:df:5c:2d:5d:21:29:d7:06:1b:09:f6:36:8e:fe:
                    53:31:5b:18:51:16:bc:4f:b4:2e:cf:70:63:22:eb:bc:
                    22:b9:10:56:ce:41:52:e2:a6:63:5f:8d:0b:28:13:7d:
                    04:b6:43:34:08:e8:ae:9c:51:12:1f:f5:48:95:b2:b4:
                    39:b3:2a:05:0b:65:58:76:15:4a:c2:0e:b6:c4:e5:d4:
                    d8:28:d1:c8:57:5c:e3:fb:57:9c:b8:89:c4:7e:22:29:
                    f3:e4:01:57:3f:29:49:88:e6:ac:08:3a:20:61:ed:29:
                    e9:0c:5d:6d:32:2c:ab:80:19:9d:1e:63:83:ea:79:81
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3b:32:58:57:47:f4:fa:f4:86:23:9f:f2:8f:bc:c4:96:
        b2:5b:34:65:a0:a9:c8:a7:a2:b0:96:01:c6:ad:58:5d:
        cb:ba:ba:a7:e2:c7:62:f1:54:fc:ec:c3:9d:66:a9:58:
        82:91:75:ef:55:ed:99:2d:d9:33:2e:e2:7c:ee:52:5a:
        0b:9e:69:57:53:04:96:89:e2:2b:57:bb:2a:ac:3f:7a:
        da:f8:41:51:a4:48:f4:b0:84:03:0c:d4:9d:af:d7:68:
        36:11:b0:d5:e6:2c:a8:c1:e9:f9:69:f6:56:13:c5:f9:
        c5:c7:1f:9d:a1:72:a7:dc:a4:92:6a:7b:e0:c8:2a:77
    Fingerprint (MD5):
        13:78:61:3A:A3:1D:55:52:A0:72:81:FD:D3:8C:0B:98
    Fingerprint (SHA1):
        D8:CC:80:CA:6B:54:16:0C:6F:E7:3A:80:EB:DE:F4:EA:87:D3:E2:A1


Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US"
Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US"
Returned value is 0, expected result is pass
chains.sh: #6458: explicitPolicy: Verifying certificate(s)  validEVEVCA.der EVCARoot.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der
vfychain -d AllDB -pp -vv     -o OID.1.0  invalidEVnonEVCA.der nonEVCARoot.der Root.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6459: explicitPolicy: Verifying certificate(s)  invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der
vfychain -d AllDB -pp -vv     -o OID.1.0  wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6460: explicitPolicy: Verifying certificate(s)  wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #6461: explicitPolicy: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  validEVEVCA.der EVCARoot.der with flags  -d AllDB    -o OID.1.0 
vfychain -d AllDB -pp -vv     -o OID.1.0  validEVEVCA.der EVCARoot.der 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128111085 (0x433d9bed)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:10:37 2012
            Not After : Tue Nov 28 16:10:37 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a9:2b:df:5c:2d:5d:21:29:d7:06:1b:09:f6:36:8e:fe:
                    53:31:5b:18:51:16:bc:4f:b4:2e:cf:70:63:22:eb:bc:
                    22:b9:10:56:ce:41:52:e2:a6:63:5f:8d:0b:28:13:7d:
                    04:b6:43:34:08:e8:ae:9c:51:12:1f:f5:48:95:b2:b4:
                    39:b3:2a:05:0b:65:58:76:15:4a:c2:0e:b6:c4:e5:d4:
                    d8:28:d1:c8:57:5c:e3:fb:57:9c:b8:89:c4:7e:22:29:
                    f3:e4:01:57:3f:29:49:88:e6:ac:08:3a:20:61:ed:29:
                    e9:0c:5d:6d:32:2c:ab:80:19:9d:1e:63:83:ea:79:81
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3b:32:58:57:47:f4:fa:f4:86:23:9f:f2:8f:bc:c4:96:
        b2:5b:34:65:a0:a9:c8:a7:a2:b0:96:01:c6:ad:58:5d:
        cb:ba:ba:a7:e2:c7:62:f1:54:fc:ec:c3:9d:66:a9:58:
        82:91:75:ef:55:ed:99:2d:d9:33:2e:e2:7c:ee:52:5a:
        0b:9e:69:57:53:04:96:89:e2:2b:57:bb:2a:ac:3f:7a:
        da:f8:41:51:a4:48:f4:b0:84:03:0c:d4:9d:af:d7:68:
        36:11:b0:d5:e6:2c:a8:c1:e9:f9:69:f6:56:13:c5:f9:
        c5:c7:1f:9d:a1:72:a7:dc:a4:92:6a:7b:e0:c8:2a:77
    Fingerprint (MD5):
        13:78:61:3A:A3:1D:55:52:A0:72:81:FD:D3:8C:0B:98
    Fingerprint (SHA1):
        D8:CC:80:CA:6B:54:16:0C:6F:E7:3A:80:EB:DE:F4:EA:87:D3:E2:A1

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US"
Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US"
Returned value is 0, expected result is pass
chains.sh: #6462: explicitPolicy: Verifying certificate(s)  validEVEVCA.der EVCARoot.der with flags  -d AllDB    -o OID.1.0  - PASSED
chains.sh: Verifying certificate(s)  invalidEVnonEVCA.der nonEVCARoot.der with flags  -d AllDB    -o OID.1.0 
vfychain -d AllDB -pp -vv     -o OID.1.0  invalidEVnonEVCA.der nonEVCARoot.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6463: explicitPolicy: Verifying certificate(s)  invalidEVnonEVCA.der nonEVCARoot.der with flags  -d AllDB    -o OID.1.0  - PASSED
chains.sh: Verifying certificate(s)  wrongEVOIDotherEVCA.der otherEVCARoot.der with flags  -d AllDB    -o OID.1.0 
vfychain -d AllDB -pp -vv     -o OID.1.0  wrongEVOIDotherEVCA.der otherEVCARoot.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6464: explicitPolicy: Verifying certificate(s)  wrongEVOIDotherEVCA.der otherEVCARoot.der with flags  -d AllDB    -o OID.1.0  - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #6465: Mapping: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -m 1128111092 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #6466: Mapping: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #6467: Mapping: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #6468: Mapping: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6469: Mapping: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1128111093   --extCP --extPM < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n
OID.1.0
OID.1.1
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N]
Is this a critical extension [y/N]?
chains.sh: #6470: Mapping: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
chains.sh: #6471: Mapping: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #6472: Mapping: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6473: Mapping: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1128111094   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.1.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6474: Mapping: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
chains.sh: #6475: Mapping: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB UserDB
certutil -N -d UserDB -f UserDB/dbpasswd
chains.sh: #6476: Mapping: Creating DB UserDB  - PASSED
chains.sh: Creating EE certifiate request UserReq.der
certutil -s "CN=User EE, O=User, C=US"  -R  -d UserDB -f UserDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o UserReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6477: Mapping: Creating EE certifiate request UserReq.der  - PASSED
chains.sh: Creating certficate UserCA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1128111095   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.1.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6478: Mapping: Creating certficate UserCA2.der signed by CA2  - PASSED
chains.sh: Importing certificate UserCA2.der to UserDB database
certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der
chains.sh: #6479: Mapping: Importing certificate UserCA2.der to UserDB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #6480: Mapping: Creating DB AllDB  - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #6481: Mapping: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA1Root.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der
chains.sh: #6482: Mapping: Importing certificate CA1Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA1.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der
chains.sh: #6483: Mapping: Importing certificate CA2CA1.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t Root
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128111092 (0x433d9bf4)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:10:39 2012
            Not After : Tue Nov 28 16:10:39 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    9e:88:e3:ea:95:5f:ff:89:b9:0f:9c:28:fa:58:d4:f8:
                    b0:71:67:42:12:3b:7a:21:4c:bc:f1:a0:6f:e8:50:87:
                    80:e3:f1:15:18:58:ca:77:cd:fa:92:2c:4e:7a:57:d7:
                    98:20:10:73:18:94:94:57:03:66:1c:7e:a9:58:a9:9e:
                    be:7d:eb:f2:83:67:ca:52:9f:ee:50:2f:cb:5e:90:8c:
                    9e:47:bc:59:f5:b3:7c:09:70:43:11:a3:40:51:0f:64:
                    33:47:f6:09:af:2b:f0:36:65:4e:63:b5:23:f6:a5:8e:
                    40:33:98:d5:03:81:d1:fe:f7:13:d4:dc:83:bc:b8:77
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        21:a5:46:b9:79:86:50:16:f7:7c:6b:61:a9:c6:04:ec:
        9b:d7:fe:e0:00:00:b7:e6:e7:48:c1:d8:38:12:e1:89:
        fd:06:1f:14:fb:c2:72:6d:ad:47:75:e7:56:55:8f:6e:
        10:85:c7:65:30:6a:36:d7:05:40:41:1c:09:24:3f:f1:
        9e:db:ca:43:00:34:46:2e:3d:4c:c9:df:c9:3c:d1:6b:
        e3:21:24:1e:70:55:e2:b7:b0:83:3e:e2:b7:15:5a:d1:
        6d:3e:cc:7b:07:c0:39:15:77:b9:df:1a:08:9c:94:4b:
        ed:56:95:da:ae:56:08:a5:1c:a6:ff:9e:07:46:ff:75
    Fingerprint (MD5):
        D8:B4:96:8F:18:6D:A0:E7:36:C2:6D:A5:4E:BB:AB:75
    Fingerprint (SHA1):
        1F:76:51:43:BB:E3:4F:93:94:DF:C8:98:3F:93:E4:26:46:F6:E6:77

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #6484: Mapping: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.1  -t Root
vfychain -d AllDB -pp -vv     -o OID.1.1  UserCA2.der  -t Root
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6485: Mapping: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.1  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t CA1
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der  -t CA1
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CA1 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6486: Mapping: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.1  -t CA1
vfychain -d AllDB -pp -vv     -o OID.1.1  UserCA2.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128111093 (0x433d9bf5)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:10:40 2012
            Not After : Tue Nov 28 16:10:40 2017
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d0:57:ad:fe:5f:f5:85:41:19:f1:e5:e9:03:85:79:a6:
                    66:89:a2:df:81:06:fb:65:e7:f6:cb:fb:25:05:6d:f0:
                    7e:d2:42:f0:08:93:40:c1:06:9e:74:47:ca:52:6c:f9:
                    9a:40:e3:3b:43:35:f6:e0:5b:b8:ef:ad:84:8d:b1:b6:
                    87:2f:03:3e:20:bb:ed:7e:5c:ae:42:0f:0e:8a:84:76:
                    a9:86:7e:8a:9c:4e:21:d9:4c:02:12:b9:43:bf:fe:13:
                    52:48:91:a1:01:f0:1e:fc:a3:9e:d1:13:b9:ee:e6:fe:
                    c1:49:30:06:79:14:70:db:25:85:00:0e:ba:ae:46:0f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policy Mappings
            Data: Sequence {
                Sequence {
                    OID.1.0
                    User Defined Policy OID
                }
            }

            Name: Certificate Policies
            Data: 
                Policy Name: OID.1.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:ff:68:b4:84:40:74:8d:80:7a:32:88:9a:09:a3:02:
        82:83:fd:48:1c:ea:ce:f7:f9:fb:d0:ac:7a:d9:00:98:
        49:03:8d:a0:96:57:f9:13:a5:2a:7c:9c:18:5b:e5:31:
        d2:ad:b6:3a:f0:d8:0a:ab:8e:01:23:8a:f4:24:20:a9:
        98:4d:5e:3f:5d:12:5f:b0:c5:e2:35:95:84:48:b1:25:
        19:95:da:2c:ef:0a:7c:16:bc:9f:25:5d:e6:a3:91:8e:
        da:57:e9:48:62:60:fd:dd:ba:20:18:6d:f0:1b:fc:10:
        13:e2:15:79:5f:80:14:bd:c9:f4:4b:8a:38:0e:cd:6f
    Fingerprint (MD5):
        30:C2:4E:F9:BE:C4:D7:E1:1F:62:53:B3:AD:AE:E8:80
    Fingerprint (SHA1):
        88:20:01:34:CE:01:FB:20:17:1F:57:BD:5E:C6:B0:20:20:C2:54:76

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #6487: Mapping: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.1  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t CA2
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der  -t CA2
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CA2 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6488: Mapping: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.1  -t CA2
vfychain -d AllDB -pp -vv     -o OID.1.1  UserCA2.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128111094 (0x433d9bf6)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Wed Nov 28 16:10:40 2012
            Not After : Tue Nov 28 16:10:40 2017
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e0:af:54:bb:58:21:e8:85:98:15:c0:fe:39:a0:ca:05:
                    17:70:21:55:a1:6c:0a:9e:3d:c5:dd:7e:a6:99:cd:a6:
                    a4:d9:33:f6:bb:eb:f8:f5:9a:27:59:d7:19:72:9e:90:
                    57:31:7b:51:55:72:82:95:7c:89:32:e6:ed:25:45:2f:
                    c9:4b:90:cf:78:bd:14:d7:84:b3:ac:cf:ee:9d:2e:ff:
                    cb:b3:44:3f:97:fc:36:cb:76:a6:3c:cc:f6:82:31:60:
                    4b:67:02:c1:3d:75:84:61:45:b6:a3:55:4e:a4:60:32:
                    df:7e:3e:bc:dd:ca:86:4c:c2:35:21:8e:91:cb:87:7f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3c:44:07:c5:fb:22:f0:39:ec:2c:c1:b0:96:e9:27:6b:
        a7:be:64:e9:4b:88:9c:fe:ac:3f:1c:03:53:05:5d:94:
        52:0a:af:fc:b2:32:45:92:bb:26:a7:80:0c:f1:43:08:
        a6:32:82:82:7d:44:6f:92:95:a2:c4:9f:b0:ea:55:f0:
        54:9d:b9:8b:73:9e:5c:22:54:c6:2e:c5:1e:13:0e:b0:
        71:c3:dd:89:f2:d4:df:a7:16:be:43:2a:ef:16:9a:89:
        7e:9b:67:d0:0e:5f:4f:b5:c8:b5:d2:39:9e:07:a9:d1:
        7b:3c:c8:6c:97:bd:05:a6:17:f3:74:8f:df:9a:46:45
    Fingerprint (MD5):
        6C:AC:6B:9F:C6:EC:23:3C:06:AF:DA:1B:EC:62:F6:3D
    Fingerprint (SHA1):
        65:33:D8:FA:4F:89:6D:C2:EE:3B:E2:4B:3B:37:A4:90:02:1F:61:35

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Returned value is 0, expected result is pass
chains.sh: #6489: Mapping: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.1  -t CA2 - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #6490: Mapping2: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -m 1128111096 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #6491: Mapping2: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #6492: Mapping2: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #6493: Mapping2: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6494: Mapping2: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1128111097   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6495: Mapping2: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
chains.sh: #6496: Mapping2: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #6497: Mapping2: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6498: Mapping2: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1128111098   --extCP --extPM < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n
OID.1.0
OID.1.1
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N]
Is this a critical extension [y/N]?
chains.sh: #6499: Mapping2: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
chains.sh: #6500: Mapping2: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB CA3DB
certutil -N -d CA3DB -f CA3DB/dbpasswd
chains.sh: #6501: Mapping2: Creating DB CA3DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA3Req.der
certutil -s "CN=CA3 Intermediate, O=CA3, C=US"  -R -2 -d CA3DB -f CA3DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA3Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6502: Mapping2: Creating Intermediate certifiate request CA3Req.der  - PASSED
chains.sh: Creating certficate CA3CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 1128111099   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.1.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6503: Mapping2: Creating certficate CA3CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate CA3CA2.der to CA3DB database
certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der
chains.sh: #6504: Mapping2: Importing certificate CA3CA2.der to CA3DB database  - PASSED
chains.sh: Creating DB UserDB
certutil -N -d UserDB -f UserDB/dbpasswd
chains.sh: #6505: Mapping2: Creating DB UserDB  - PASSED
chains.sh: Creating EE certifiate request UserReq.der
certutil -s "CN=User EE, O=User, C=US"  -R  -d UserDB -f UserDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o UserReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6506: Mapping2: Creating EE certifiate request UserReq.der  - PASSED
chains.sh: Creating certficate UserCA3.der signed by CA3
certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 1128111100   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.1.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6507: Mapping2: Creating certficate UserCA3.der signed by CA3  - PASSED
chains.sh: Importing certificate UserCA3.der to UserDB database
certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der
chains.sh: #6508: Mapping2: Importing certificate UserCA3.der to UserDB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #6509: Mapping2: Creating DB AllDB  - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #6510: Mapping2: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA1Root.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der
chains.sh: #6511: Mapping2: Importing certificate CA1Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA1.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der
chains.sh: #6512: Mapping2: Importing certificate CA2CA1.der to AllDB database  - PASSED
chains.sh: Importing certificate CA3CA2.der to AllDB database
certutil -A -n CA3  -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der
chains.sh: #6513: Mapping2: Importing certificate CA3CA2.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.0  -t Root
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA3.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128111096 (0x433d9bf8)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:10:41 2012
            Not After : Tue Nov 28 16:10:41 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    af:7f:6c:eb:95:3a:1c:2d:a1:a4:02:d8:d3:cc:55:22:
                    20:4e:2f:cf:ad:6a:64:de:d9:03:b8:cd:58:e8:ac:7d:
                    b0:61:57:f1:29:06:d0:ae:ce:69:31:56:18:9f:09:7d:
                    31:94:c0:98:71:65:27:25:21:70:ae:c8:fb:f6:5c:29:
                    cd:1b:35:7f:44:c9:15:cc:c1:24:d3:ff:29:d0:51:0f:
                    47:5f:31:06:4b:ee:d7:33:d0:20:8e:56:e5:97:39:f0:
                    7b:29:10:42:f4:d3:33:b6:a2:b5:37:bb:7a:fa:31:7c:
                    73:87:ec:85:5f:9f:26:d1:63:b8:94:2f:e2:df:61:f7
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        80:8c:c6:71:c7:a6:0a:58:9a:94:c5:97:6a:8f:14:cd:
        34:a4:07:97:eb:14:93:cf:75:64:2a:50:31:ab:65:d3:
        7b:25:0d:ea:c6:76:a2:ce:99:62:80:9b:d0:9b:7f:22:
        bb:b7:df:b2:32:02:4e:76:74:e1:d2:de:7d:0b:c7:04:
        a8:9e:eb:ce:50:22:18:19:3b:1d:ba:b5:15:af:dd:e1:
        c6:7d:c2:e9:55:40:b0:7d:63:65:2f:70:c1:70:e2:53:
        02:f2:b0:ea:b2:a9:6c:8e:f0:ef:d9:ac:f4:9d:05:67:
        6d:a8:92:28:15:5e:8f:86:43:02:04:e9:db:05:10:c7
    Fingerprint (MD5):
        20:13:24:07:43:76:AA:98:9D:0D:9D:F3:7B:C2:C0:DC
    Fingerprint (SHA1):
        FD:71:15:84:F0:00:90:68:01:9B:EC:FE:53:2C:38:03:9D:6C:F7:E7

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US"
Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #6514: Mapping2: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.1  -t Root
vfychain -d AllDB -pp -vv     -o OID.1.1  UserCA3.der  -t Root
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6515: Mapping2: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.1  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.0  -t CA1
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA3.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128111097 (0x433d9bf9)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:10:41 2012
            Not After : Tue Nov 28 16:10:41 2017
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a3:e0:12:92:06:61:b9:c0:d7:61:df:a5:80:25:21:d0:
                    cf:8d:6c:ea:fe:dd:6d:e2:99:50:e4:22:6c:51:ab:72:
                    4a:7d:66:39:ff:09:3e:ee:6c:42:6f:71:a8:1e:c6:1a:
                    03:e7:cc:10:52:ba:b1:c4:ef:f2:9d:c5:a5:59:dd:27:
                    c0:33:78:9e:48:e4:b0:dd:94:3e:9b:88:7c:a9:c7:07:
                    75:d7:da:65:df:c4:70:ad:b2:f1:12:37:2e:60:7a:c6:
                    6a:cc:31:21:48:3c:6b:cc:87:1e:fa:67:ca:d3:cd:20:
                    8f:6a:af:ac:9f:f5:da:42:3f:22:85:6b:ec:2b:80:21
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        03:b7:3b:d8:04:47:0d:75:4f:ae:8a:db:bd:f4:91:e4:
        66:e2:ae:24:65:ce:79:8b:ba:13:9c:46:84:15:71:cb:
        a7:79:f1:ad:6f:4e:d0:4b:e2:53:4f:23:20:e1:72:85:
        a3:d5:d8:e1:97:98:19:d1:dc:86:1f:58:e7:f6:03:94:
        f3:e5:39:d1:b6:dd:86:9b:22:ee:07:39:6f:11:71:09:
        79:20:d2:81:20:28:f9:d0:4f:d9:9f:15:dc:fa:43:b4:
        b0:7c:1e:e2:fc:3d:5b:61:57:b3:e5:70:0c:d3:3b:17:
        94:8e:94:2e:81:cc:76:a6:fb:74:9e:ca:c3:30:d3:0c
    Fingerprint (MD5):
        FE:53:D6:AF:19:4C:D3:6D:89:C4:6E:0E:A9:C0:EE:EA
    Fingerprint (SHA1):
        A9:90:72:E8:42:69:B5:32:D8:1E:E2:72:30:3B:21:84:DD:90:13:62

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US"
Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #6516: Mapping2: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.1  -t CA1
vfychain -d AllDB -pp -vv     -o OID.1.1  UserCA3.der  -t CA1
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. CA1 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6517: Mapping2: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.1  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.0  -t CA2
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA3.der  -t CA2
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CA2 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6518: Mapping2: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.1  -t CA2
vfychain -d AllDB -pp -vv     -o OID.1.1  UserCA3.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128111098 (0x433d9bfa)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Wed Nov 28 16:10:42 2012
            Not After : Tue Nov 28 16:10:42 2017
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    de:af:01:25:4c:5e:6f:a7:f0:dd:eb:4c:ae:ee:8f:22:
                    e0:f6:23:da:5f:fa:9f:ea:df:93:58:e7:db:a2:0b:32:
                    3e:d0:66:92:2a:cc:2f:40:ab:fc:9f:21:18:56:2c:83:
                    b8:c5:63:1b:41:9f:31:13:68:b2:14:5b:b8:0c:0e:7c:
                    65:31:e9:8a:23:05:12:ef:00:fe:1c:11:c1:9c:ce:42:
                    58:7e:16:3f:76:e7:47:bd:26:fc:4b:87:e9:5c:c7:d7:
                    07:fc:46:12:7d:d9:5a:4a:05:da:2e:0d:77:77:bf:19:
                    47:5b:34:22:2a:a6:6f:80:a2:7d:57:28:6c:63:13:f1
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policy Mappings
            Data: Sequence {
                Sequence {
                    OID.1.0
                    User Defined Policy OID
                }
            }

            Name: Certificate Policies
            Data: 
                Policy Name: OID.1.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:e1:99:d5:11:08:51:31:9a:58:3a:54:bc:8f:f6:0c:
        fd:b8:6d:ab:45:07:1c:2a:b5:4d:43:aa:f3:25:3b:22:
        5e:4b:bf:51:f2:0e:7c:47:95:bf:aa:08:e6:69:39:6b:
        7f:75:8c:02:a1:3f:7f:8c:7f:e8:5d:ef:01:21:69:52:
        33:aa:c4:7e:db:9b:b4:f0:9d:7d:78:75:5f:eb:17:2b:
        e3:fd:57:40:1e:8c:30:1e:0e:fd:02:f8:5f:e9:ec:a9:
        28:f9:66:b2:9c:50:b1:92:2d:3c:0c:f9:89:cd:43:5a:
        c2:e5:56:21:c1:ce:15:8e:a1:7d:67:3d:44:b3:8b:42
    Fingerprint (MD5):
        42:AA:DF:3D:28:B1:6F:E5:A5:28:A1:15:62:E6:FF:F4
    Fingerprint (SHA1):
        7B:56:E9:1D:0D:A0:D8:B7:F8:08:4B:B4:41:CF:69:2F:96:F5:37:FB

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US"
Returned value is 0, expected result is pass
chains.sh: #6519: Mapping2: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.1  -t CA2 - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #6520: AIA: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -m 1128111101 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #6521: AIA: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #6522: AIA: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #6523: AIA: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6524: AIA: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1128111102   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6525: AIA: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
chains.sh: #6526: AIA: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #6527: AIA: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6528: AIA: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1128111103   --extAIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8556/buildnss02-10869-CA1Root-1128111011.der
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #6529: AIA: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
chains.sh: #6530: AIA: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB UserDB
certutil -N -d UserDB -f UserDB/dbpasswd
chains.sh: #6531: AIA: Creating DB UserDB  - PASSED
chains.sh: Creating EE certifiate request UserReq.der
certutil -s "CN=User EE, O=User, C=US"  -R  -d UserDB -f UserDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o UserReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6532: AIA: Creating EE certifiate request UserReq.der  - PASSED
chains.sh: Creating certficate UserCA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1128111104   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6533: AIA: Creating certficate UserCA2.der signed by CA2  - PASSED
chains.sh: Importing certificate UserCA2.der to UserDB database
certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der
chains.sh: #6534: AIA: Importing certificate UserCA2.der to UserDB database  - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags  -d UserDB     -t Root.der
vfychain -d UserDB -pp -vv      UserCA2.der CA2CA1.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]:
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=CA1 Intermediate,O=CA1,C=US
Returned value is 1, expected result is fail
chains.sh: #6535: AIA: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags  -d UserDB     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags  -d UserDB -f    -t Root.der
vfychain -d UserDB -pp -vv  -f    UserCA2.der CA2CA1.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128111101 (0x433d9bfd)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:10:43 2012
            Not After : Tue Nov 28 16:10:43 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    da:b3:7c:93:a3:73:fc:13:28:44:1a:2c:fe:0f:18:4c:
                    ed:8f:1b:3d:00:b6:96:c5:a3:47:cb:df:fd:aa:6a:cf:
                    3d:12:5d:ac:f2:3a:88:5b:50:6c:66:05:70:92:f5:c8:
                    88:73:99:55:5e:75:e1:0d:1f:ec:08:50:26:eb:43:1b:
                    8b:67:ce:6a:b0:79:fa:7a:8d:3f:30:f4:5d:26:ea:a3:
                    72:65:8e:d8:a4:b1:74:3c:e4:66:e2:78:08:ba:24:1c:
                    cc:62:6a:77:83:bd:3f:c6:1c:5a:da:0f:d3:d1:bc:20:
                    86:ac:ab:4c:cb:d7:2e:e1:b1:b4:45:39:63:9f:26:dd
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        84:9e:71:2e:6e:ec:fe:16:40:e6:da:22:7d:08:b2:cd:
        3b:d7:dc:4d:58:5d:33:78:05:7e:9e:64:51:fe:54:db:
        f6:58:55:7b:5b:dd:0c:92:43:e4:a1:e1:b2:cb:43:b0:
        83:0b:06:d9:04:68:6e:71:03:90:29:bf:cb:0b:75:06:
        47:df:75:25:97:7e:54:ce:94:42:43:50:8a:11:09:72:
        e9:ba:2d:17:30:5b:b7:5b:f1:00:cd:21:17:7b:fe:e5:
        39:3e:dd:9b:ce:bd:26:b3:62:b8:9b:6e:39:84:ff:c6:
        85:82:af:6c:06:cb:2a:9c:11:f3:f4:5d:c3:57:bf:67
    Fingerprint (MD5):
        41:C2:C6:B5:4C:2E:BF:6F:D9:EA:A6:1C:76:2F:9C:48
    Fingerprint (SHA1):
        AC:42:B4:BB:8A:83:2E:08:1A:41:C9:80:82:E2:07:6F:5B:64:5B:FF


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #6536: AIA: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags  -d UserDB -f    -t Root.der - PASSED
chains.sh: Creating DB ArmyDB
certutil -N -d ArmyDB -f ArmyDB/dbpasswd
chains.sh: #6537: BridgeWithAIA: Creating DB ArmyDB  - PASSED
chains.sh: Creating Root CA Army
certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army  -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -m 1128111105 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #6538: BridgeWithAIA: Creating Root CA Army  - PASSED
chains.sh: Exporting Root CA Army.der
certutil -L -d ArmyDB -r -n Army -o Army.der
chains.sh: #6539: BridgeWithAIA: Exporting Root CA Army.der  - PASSED
chains.sh: Creating DB NavyDB
certutil -N -d NavyDB -f NavyDB/dbpasswd
chains.sh: #6540: BridgeWithAIA: Creating DB NavyDB  - PASSED
chains.sh: Creating Root CA Navy
certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy  -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -m 1128111106 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #6541: BridgeWithAIA: Creating Root CA Navy  - PASSED
chains.sh: Exporting Root CA Navy.der
certutil -L -d NavyDB -r -n Navy -o Navy.der
chains.sh: #6542: BridgeWithAIA: Exporting Root CA Navy.der  - PASSED
chains.sh: Creating DB BridgeDB
certutil -N -d BridgeDB -f BridgeDB/dbpasswd
chains.sh: #6543: BridgeWithAIA: Creating DB BridgeDB  - PASSED
chains.sh: Creating Bridge certifiate request BridgeReq.der
certutil -s "CN=Bridge Bridge, O=Bridge, C=US"  -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o BridgeReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6544: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der  - PASSED
chains.sh: Creating certficate BridgeArmy.der signed by Army
certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1128111107 -7 Bridge@Army  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6545: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army  - PASSED
chains.sh: Importing certificate BridgeArmy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der
chains.sh: #6546: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database  - PASSED
chains.sh: Creating certficate BridgeNavy.der signed by Navy
certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1128111108 -7 Bridge@Navy  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6547: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy  - PASSED
chains.sh: Importing certificate BridgeNavy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der
chains.sh: #6548: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database  - PASSED
chains.sh: Generating PKCS7 package from BridgeDB database
cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7
chains.sh: #6549: BridgeWithAIA: Generating PKCS7 package from BridgeDB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #6550: BridgeWithAIA: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6551: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Bridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1128111109   --extAIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8556/buildnss02-10869-Bridge-1128111012.p7
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #6552: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate CA1Bridge.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der
chains.sh: #6553: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #6554: BridgeWithAIA: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o EE1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6555: BridgeWithAIA: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1128111110   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6556: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE1CA1.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der
chains.sh: #6557: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database  - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB     -t Army.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]:
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Bridge Bridge,O=Bridge,C=US
Returned value is 1, expected result is fail
chains.sh: #6558: BridgeWithAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB     -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB -f    -t Army.der
vfychain -d EE1DB -pp -vv  -f    EE1CA1.der CA1Bridge.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. bridge@navy [Certificate Authority]:
Email Address(es): bridge@navy
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Navy ROOT CA,O=Navy,C=US
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Navy ROOT CA,O=Navy,C=US
Returned value is 1, expected result is fail
chains.sh: #6559: BridgeWithAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB -f    -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB -f    -t Navy.der
vfychain -d EE1DB -pp -vv  -f    EE1CA1.der CA1Bridge.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128111106 (0x433d9c02)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 16:10:46 2012
            Not After : Tue Nov 28 16:10:46 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a5:d6:45:03:70:28:f3:48:73:72:a7:3c:0b:d7:60:e9:
                    a6:ec:82:5c:35:ce:6c:cf:4e:71:f1:d3:a8:31:28:3e:
                    d2:2e:21:04:a8:5b:d7:10:7f:7b:af:30:74:51:1c:d8:
                    dc:5f:88:2b:8d:63:0a:52:51:d5:eb:b7:ef:53:03:4a:
                    fe:58:ec:36:83:98:ca:f8:b4:e9:72:c3:33:14:be:05:
                    1a:da:b6:fb:26:71:b1:b2:ab:2a:a8:d6:a1:be:13:48:
                    0d:47:b0:52:80:2e:95:f8:b6:4b:df:e8:6f:8c:cd:5a:
                    60:6c:74:90:de:0c:42:2b:0e:92:89:62:16:66:62:cb
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        42:ae:41:19:cd:89:78:58:60:b3:02:3a:03:a9:a8:22:
        10:8c:3b:10:c8:45:24:13:17:1b:2d:78:99:f1:46:25:
        f2:e3:ca:de:14:3e:9c:d9:43:a4:66:7f:a2:7a:bd:2c:
        f0:32:1b:a4:1a:81:56:36:b1:81:72:d7:b3:c5:23:5c:
        e5:db:d5:de:b8:0f:af:4a:84:86:39:4f:ce:48:61:b0:
        a3:78:7c:d7:5a:68:30:90:1b:1c:55:78:0a:b8:40:3e:
        36:71:b2:fc:d8:0c:55:75:34:5f:60:1c:fe:6a:a9:6b:
        45:ee:ce:55:96:7b:f2:66:0a:dd:c2:93:52:70:b3:46
    Fingerprint (MD5):
        7E:57:04:D5:E3:4B:1F:64:A9:26:C9:17:DF:77:86:7E
    Fingerprint (SHA1):
        D6:83:0F:CA:12:70:94:6E:54:0A:C3:0A:CF:74:1D:6B:1E:68:01:E1


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #6560: BridgeWithAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB -f    -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeArmy.der with flags  -d EE1DB -f    -t Navy.der
vfychain -d EE1DB -pp -vv  -f    EE1CA1.der CA1Bridge.der BridgeArmy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128111106 (0x433d9c02)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 16:10:46 2012
            Not After : Tue Nov 28 16:10:46 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a5:d6:45:03:70:28:f3:48:73:72:a7:3c:0b:d7:60:e9:
                    a6:ec:82:5c:35:ce:6c:cf:4e:71:f1:d3:a8:31:28:3e:
                    d2:2e:21:04:a8:5b:d7:10:7f:7b:af:30:74:51:1c:d8:
                    dc:5f:88:2b:8d:63:0a:52:51:d5:eb:b7:ef:53:03:4a:
                    fe:58:ec:36:83:98:ca:f8:b4:e9:72:c3:33:14:be:05:
                    1a:da:b6:fb:26:71:b1:b2:ab:2a:a8:d6:a1:be:13:48:
                    0d:47:b0:52:80:2e:95:f8:b6:4b:df:e8:6f:8c:cd:5a:
                    60:6c:74:90:de:0c:42:2b:0e:92:89:62:16:66:62:cb
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        42:ae:41:19:cd:89:78:58:60:b3:02:3a:03:a9:a8:22:
        10:8c:3b:10:c8:45:24:13:17:1b:2d:78:99:f1:46:25:
        f2:e3:ca:de:14:3e:9c:d9:43:a4:66:7f:a2:7a:bd:2c:
        f0:32:1b:a4:1a:81:56:36:b1:81:72:d7:b3:c5:23:5c:
        e5:db:d5:de:b8:0f:af:4a:84:86:39:4f:ce:48:61:b0:
        a3:78:7c:d7:5a:68:30:90:1b:1c:55:78:0a:b8:40:3e:
        36:71:b2:fc:d8:0c:55:75:34:5f:60:1c:fe:6a:a9:6b:
        45:ee:ce:55:96:7b:f2:66:0a:dd:c2:93:52:70:b3:46
    Fingerprint (MD5):
        7E:57:04:D5:E3:4B:1F:64:A9:26:C9:17:DF:77:86:7E
    Fingerprint (SHA1):
        D6:83:0F:CA:12:70:94:6E:54:0A:C3:0A:CF:74:1D:6B:1E:68:01:E1


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #6561: BridgeWithAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeArmy.der with flags  -d EE1DB -f    -t Navy.der - PASSED
chains.sh: Creating DB ArmyDB
certutil -N -d ArmyDB -f ArmyDB/dbpasswd
chains.sh: #6562: BridgeWithHalfAIA: Creating DB ArmyDB  - PASSED
chains.sh: Creating Root CA Army
certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army  -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -m 1128111111 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #6563: BridgeWithHalfAIA: Creating Root CA Army  - PASSED
chains.sh: Exporting Root CA Army.der
certutil -L -d ArmyDB -r -n Army -o Army.der
chains.sh: #6564: BridgeWithHalfAIA: Exporting Root CA Army.der  - PASSED
chains.sh: Creating DB NavyDB
certutil -N -d NavyDB -f NavyDB/dbpasswd
chains.sh: #6565: BridgeWithHalfAIA: Creating DB NavyDB  - PASSED
chains.sh: Creating Root CA Navy
certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy  -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -m 1128111112 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #6566: BridgeWithHalfAIA: Creating Root CA Navy  - PASSED
chains.sh: Exporting Root CA Navy.der
certutil -L -d NavyDB -r -n Navy -o Navy.der
chains.sh: #6567: BridgeWithHalfAIA: Exporting Root CA Navy.der  - PASSED
chains.sh: Creating DB BridgeDB
certutil -N -d BridgeDB -f BridgeDB/dbpasswd
chains.sh: #6568: BridgeWithHalfAIA: Creating DB BridgeDB  - PASSED
chains.sh: Creating Bridge certifiate request BridgeReq.der
certutil -s "CN=Bridge Bridge, O=Bridge, C=US"  -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o BridgeReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6569: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der  - PASSED
chains.sh: Creating certficate BridgeArmy.der signed by Army
certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1128111113 -7 Bridge@Army  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6570: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army  - PASSED
chains.sh: Importing certificate BridgeArmy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der
chains.sh: #6571: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database  - PASSED
chains.sh: Creating certficate BridgeNavy.der signed by Navy
certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1128111114 -7 Bridge@Navy  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6572: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy  - PASSED
chains.sh: Importing certificate BridgeNavy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der
chains.sh: #6573: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database  - PASSED
chains.sh: Generating PKCS7 package from BridgeDB database
cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7
chains.sh: #6574: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #6575: BridgeWithHalfAIA: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6576: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Bridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1128111115   --extAIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8556/buildnss02-10869-Bridge-1128111013.p7
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #6577: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate CA1Bridge.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der
chains.sh: #6578: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #6579: BridgeWithHalfAIA: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o EE1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6580: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1128111116   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6581: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE1CA1.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der
chains.sh: #6582: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #6583: BridgeWithHalfAIA: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6584: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2Bridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1128111117   --extAIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8556/buildnss02-10869-BridgeNavy-1128111014.der
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #6585: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate CA2Bridge.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der
chains.sh: #6586: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database  - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #6587: BridgeWithHalfAIA: Creating DB EE2DB  - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US"  -R  -d EE2DB -f EE2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o EE2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6588: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der  - PASSED
chains.sh: Creating certficate EE2CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1128111118   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6589: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate EE2CA2.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der
chains.sh: #6590: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database  - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB     -t Army.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]:
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Bridge Bridge,O=Bridge,C=US
Returned value is 1, expected result is fail
chains.sh: #6591: BridgeWithHalfAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB     -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB -f    -t Army.der
vfychain -d EE1DB -pp -vv  -f    EE1CA1.der CA1Bridge.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. bridge@navy [Certificate Authority]:
Email Address(es): bridge@navy
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Navy ROOT CA,O=Navy,C=US
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Navy ROOT CA,O=Navy,C=US
Returned value is 1, expected result is fail
chains.sh: #6592: BridgeWithHalfAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB -f    -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB -f    -t Navy.der
vfychain -d EE1DB -pp -vv  -f    EE1CA1.der CA1Bridge.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128111112 (0x433d9c08)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 16:10:47 2012
            Not After : Tue Nov 28 16:10:47 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a1:80:db:ec:fa:7f:cd:a3:f9:1a:cb:02:64:8a:ba:16:
                    9c:d3:8d:9f:9e:4d:fa:ea:15:df:f3:4d:d7:71:41:81:
                    b2:12:8b:b6:fb:75:80:eb:c8:ac:19:e1:1e:6e:b1:8e:
                    60:3e:a7:4e:6b:8b:7c:cf:77:9a:e1:92:81:37:2a:07:
                    ee:ec:ce:bc:54:e9:72:1b:10:3f:aa:14:82:d0:fa:9c:
                    bf:ba:a6:ec:ee:12:e2:c1:d0:18:a8:58:60:d6:38:77:
                    38:4a:ca:92:47:f4:e0:ec:52:a8:bd:52:fb:b4:02:04:
                    57:95:16:3a:5a:02:7a:79:c1:64:07:b6:d0:b3:42:05
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        74:9b:5c:70:2c:cd:67:a9:41:ba:27:36:74:95:a7:62:
        b0:22:3d:1f:0c:e0:28:fd:1e:76:ab:7d:c2:4c:28:37:
        6b:7c:d4:74:b6:06:b7:42:4b:43:6f:1a:5b:01:de:18:
        e2:75:19:eb:17:a0:2d:47:bf:aa:00:30:d2:b8:98:c0:
        57:65:b2:bb:24:7b:07:d4:91:f3:e8:e5:6a:f4:42:cd:
        a0:17:8e:c2:1e:c4:ad:aa:3f:4c:68:5a:2f:ae:3f:a2:
        ba:66:e0:9f:15:55:27:eb:65:c1:6b:1d:ca:a7:61:7d:
        69:6e:00:29:ac:09:8e:2d:24:59:75:c0:46:46:0e:06
    Fingerprint (MD5):
        CE:FC:00:F4:7B:C0:FD:F3:C7:1B:6C:1E:C7:8C:F9:A0
    Fingerprint (SHA1):
        8A:1E:F4:BA:46:F8:78:A9:F2:95:83:22:9C:A9:FE:9D:A2:12:2E:60


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #6593: BridgeWithHalfAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB -f    -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeArmy.der with flags  -d EE1DB -f    -t Navy.der
vfychain -d EE1DB -pp -vv  -f    EE1CA1.der CA1Bridge.der BridgeArmy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128111112 (0x433d9c08)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 16:10:47 2012
            Not After : Tue Nov 28 16:10:47 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a1:80:db:ec:fa:7f:cd:a3:f9:1a:cb:02:64:8a:ba:16:
                    9c:d3:8d:9f:9e:4d:fa:ea:15:df:f3:4d:d7:71:41:81:
                    b2:12:8b:b6:fb:75:80:eb:c8:ac:19:e1:1e:6e:b1:8e:
                    60:3e:a7:4e:6b:8b:7c:cf:77:9a:e1:92:81:37:2a:07:
                    ee:ec:ce:bc:54:e9:72:1b:10:3f:aa:14:82:d0:fa:9c:
                    bf:ba:a6:ec:ee:12:e2:c1:d0:18:a8:58:60:d6:38:77:
                    38:4a:ca:92:47:f4:e0:ec:52:a8:bd:52:fb:b4:02:04:
                    57:95:16:3a:5a:02:7a:79:c1:64:07:b6:d0:b3:42:05
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        74:9b:5c:70:2c:cd:67:a9:41:ba:27:36:74:95:a7:62:
        b0:22:3d:1f:0c:e0:28:fd:1e:76:ab:7d:c2:4c:28:37:
        6b:7c:d4:74:b6:06:b7:42:4b:43:6f:1a:5b:01:de:18:
        e2:75:19:eb:17:a0:2d:47:bf:aa:00:30:d2:b8:98:c0:
        57:65:b2:bb:24:7b:07:d4:91:f3:e8:e5:6a:f4:42:cd:
        a0:17:8e:c2:1e:c4:ad:aa:3f:4c:68:5a:2f:ae:3f:a2:
        ba:66:e0:9f:15:55:27:eb:65:c1:6b:1d:ca:a7:61:7d:
        69:6e:00:29:ac:09:8e:2d:24:59:75:c0:46:46:0e:06
    Fingerprint (MD5):
        CE:FC:00:F4:7B:C0:FD:F3:C7:1B:6C:1E:C7:8C:F9:A0
    Fingerprint (SHA1):
        8A:1E:F4:BA:46:F8:78:A9:F2:95:83:22:9C:A9:FE:9D:A2:12:2E:60


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #6594: BridgeWithHalfAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeArmy.der with flags  -d EE1DB -f    -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der BridgeArmy.der with flags  -d EE1DB -f    -t Army.der
vfychain -d EE1DB -pp -vv  -f    EE2CA2.der BridgeArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=EE2 EE,O=EE2,C=US :
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=CA2 Intermediate,O=CA2,C=US
Returned value is 1, expected result is fail
chains.sh: #6595: BridgeWithHalfAIA: Verifying certificate(s)  EE2CA2.der BridgeArmy.der with flags  -d EE1DB -f    -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeArmy.der with flags  -d EE1DB -f    -t Army.der
vfychain -d EE1DB -pp -vv  -f    EE2CA2.der CA2Bridge.der BridgeArmy.der  -t Army.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128111111 (0x433d9c07)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Wed Nov 28 16:10:47 2012
            Not After : Tue Nov 28 16:10:47 2062
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a9:0f:eb:74:33:90:04:ea:f1:0b:ea:19:8d:36:9b:b2:
                    29:5b:f8:8e:ac:24:9e:82:cf:5e:78:cb:4b:a3:2a:08:
                    69:68:e9:63:8a:e7:bc:4c:cf:42:3c:c7:79:f0:8e:2a:
                    1f:3b:6e:cd:1b:a1:26:0e:3a:8e:80:e6:73:ad:10:1e:
                    16:bf:c4:f9:9f:98:3c:5a:98:42:85:bf:f4:4a:fb:38:
                    f7:57:d7:9d:1e:9e:4f:67:93:88:04:e0:2d:59:f8:e8:
                    27:e2:15:53:dc:61:27:2d:82:83:b4:82:5b:b7:89:cb:
                    19:4c:80:c7:2a:d4:ad:1f:63:38:c8:9d:05:dc:a7:97
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        53:b4:a7:f8:c9:64:3b:49:27:8d:d4:eb:37:24:f5:66:
        78:d6:fc:5e:65:0e:f6:b3:74:34:2d:7c:92:96:3a:1a:
        e7:bc:f7:7c:f4:44:0b:78:e2:29:cf:50:0e:68:05:37:
        02:91:1c:97:6a:a6:2f:02:a4:8e:c2:d8:3f:8d:b7:45:
        3c:9b:63:27:3f:13:ba:81:9d:dc:e1:96:6f:03:b5:c0:
        fc:c6:4d:e2:59:df:7d:32:b8:f2:24:5a:10:34:e4:d2:
        fb:a5:fc:96:56:4b:8a:89:ae:23:fe:b6:60:7b:06:45:
        aa:de:74:45:93:18:15:43:d5:26:ad:18:59:83:9c:48
    Fingerprint (MD5):
        9E:FC:25:F9:7D:FC:07:47:56:D2:D5:28:9B:15:5E:8C
    Fingerprint (SHA1):
        9E:5C:38:CA:01:C3:4F:57:C3:FC:82:3D:D0:49:FE:0D:D3:00:3B:8E


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #6596: BridgeWithHalfAIA: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeArmy.der with flags  -d EE1DB -f    -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der with flags  -d EE1DB -f    -t Navy.der
vfychain -d EE1DB -pp -vv  -f    EE2CA2.der CA2Bridge.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128111112 (0x433d9c08)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 16:10:47 2012
            Not After : Tue Nov 28 16:10:47 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a1:80:db:ec:fa:7f:cd:a3:f9:1a:cb:02:64:8a:ba:16:
                    9c:d3:8d:9f:9e:4d:fa:ea:15:df:f3:4d:d7:71:41:81:
                    b2:12:8b:b6:fb:75:80:eb:c8:ac:19:e1:1e:6e:b1:8e:
                    60:3e:a7:4e:6b:8b:7c:cf:77:9a:e1:92:81:37:2a:07:
                    ee:ec:ce:bc:54:e9:72:1b:10:3f:aa:14:82:d0:fa:9c:
                    bf:ba:a6:ec:ee:12:e2:c1:d0:18:a8:58:60:d6:38:77:
                    38:4a:ca:92:47:f4:e0:ec:52:a8:bd:52:fb:b4:02:04:
                    57:95:16:3a:5a:02:7a:79:c1:64:07:b6:d0:b3:42:05
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        74:9b:5c:70:2c:cd:67:a9:41:ba:27:36:74:95:a7:62:
        b0:22:3d:1f:0c:e0:28:fd:1e:76:ab:7d:c2:4c:28:37:
        6b:7c:d4:74:b6:06:b7:42:4b:43:6f:1a:5b:01:de:18:
        e2:75:19:eb:17:a0:2d:47:bf:aa:00:30:d2:b8:98:c0:
        57:65:b2:bb:24:7b:07:d4:91:f3:e8:e5:6a:f4:42:cd:
        a0:17:8e:c2:1e:c4:ad:aa:3f:4c:68:5a:2f:ae:3f:a2:
        ba:66:e0:9f:15:55:27:eb:65:c1:6b:1d:ca:a7:61:7d:
        69:6e:00:29:ac:09:8e:2d:24:59:75:c0:46:46:0e:06
    Fingerprint (MD5):
        CE:FC:00:F4:7B:C0:FD:F3:C7:1B:6C:1E:C7:8C:F9:A0
    Fingerprint (SHA1):
        8A:1E:F4:BA:46:F8:78:A9:F2:95:83:22:9C:A9:FE:9D:A2:12:2E:60


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #6597: BridgeWithHalfAIA: Verifying certificate(s)  EE2CA2.der CA2Bridge.der with flags  -d EE1DB -f    -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeArmy.der with flags  -d EE1DB -f    -t Navy.der
vfychain -d EE1DB -pp -vv  -f    EE2CA2.der CA2Bridge.der BridgeArmy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128111112 (0x433d9c08)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 16:10:47 2012
            Not After : Tue Nov 28 16:10:47 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a1:80:db:ec:fa:7f:cd:a3:f9:1a:cb:02:64:8a:ba:16:
                    9c:d3:8d:9f:9e:4d:fa:ea:15:df:f3:4d:d7:71:41:81:
                    b2:12:8b:b6:fb:75:80:eb:c8:ac:19:e1:1e:6e:b1:8e:
                    60:3e:a7:4e:6b:8b:7c:cf:77:9a:e1:92:81:37:2a:07:
                    ee:ec:ce:bc:54:e9:72:1b:10:3f:aa:14:82:d0:fa:9c:
                    bf:ba:a6:ec:ee:12:e2:c1:d0:18:a8:58:60:d6:38:77:
                    38:4a:ca:92:47:f4:e0:ec:52:a8:bd:52:fb:b4:02:04:
                    57:95:16:3a:5a:02:7a:79:c1:64:07:b6:d0:b3:42:05
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        74:9b:5c:70:2c:cd:67:a9:41:ba:27:36:74:95:a7:62:
        b0:22:3d:1f:0c:e0:28:fd:1e:76:ab:7d:c2:4c:28:37:
        6b:7c:d4:74:b6:06:b7:42:4b:43:6f:1a:5b:01:de:18:
        e2:75:19:eb:17:a0:2d:47:bf:aa:00:30:d2:b8:98:c0:
        57:65:b2:bb:24:7b:07:d4:91:f3:e8:e5:6a:f4:42:cd:
        a0:17:8e:c2:1e:c4:ad:aa:3f:4c:68:5a:2f:ae:3f:a2:
        ba:66:e0:9f:15:55:27:eb:65:c1:6b:1d:ca:a7:61:7d:
        69:6e:00:29:ac:09:8e:2d:24:59:75:c0:46:46:0e:06
    Fingerprint (MD5):
        CE:FC:00:F4:7B:C0:FD:F3:C7:1B:6C:1E:C7:8C:F9:A0
    Fingerprint (SHA1):
        8A:1E:F4:BA:46:F8:78:A9:F2:95:83:22:9C:A9:FE:9D:A2:12:2E:60


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #6598: BridgeWithHalfAIA: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeArmy.der with flags  -d EE1DB -f    -t Navy.der - PASSED
chains.sh: Creating DB ArmyDB
certutil -N -d ArmyDB -f ArmyDB/dbpasswd
chains.sh: #6599: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB  - PASSED
chains.sh: Creating Root CA Army
certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army  -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -m 1128111119 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #6600: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army  - PASSED
chains.sh: Exporting Root CA Army.der
certutil -L -d ArmyDB -r -n Army -o Army.der
chains.sh: #6601: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der  - PASSED
chains.sh: Creating DB NavyDB
certutil -N -d NavyDB -f NavyDB/dbpasswd
chains.sh: #6602: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB  - PASSED
chains.sh: Creating Root CA Navy
certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy  -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -m 1128111120 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #6603: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy  - PASSED
chains.sh: Exporting Root CA Navy.der
certutil -L -d NavyDB -r -n Navy -o Navy.der
chains.sh: #6604: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der  - PASSED
chains.sh: Creating DB CAArmyDB
certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd
chains.sh: #6605: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB  - PASSED
chains.sh: Creating Intermediate certifiate request CAArmyReq.der
certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US"  -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CAArmyReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6606: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der  - PASSED
chains.sh: Creating certficate CAArmyArmy.der signed by Army
certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 1128111121   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.1.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6607: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army  - PASSED
chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database
certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der
chains.sh: #6608: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database  - PASSED
chains.sh: Creating DB CANavyDB
certutil -N -d CANavyDB -f CANavyDB/dbpasswd
chains.sh: #6609: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB  - PASSED
chains.sh: Creating Intermediate certifiate request CANavyReq.der
certutil -s "CN=CANavy Intermediate, O=CANavy, C=US"  -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CANavyReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6610: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der  - PASSED
chains.sh: Creating certficate CANavyNavy.der signed by Navy
certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 1128111122   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.2.0
1

n
y
OID.2.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6611: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy  - PASSED
chains.sh: Importing certificate CANavyNavy.der to CANavyDB database
certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der
chains.sh: #6612: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database  - PASSED
chains.sh: Creating DB BridgeDB
certutil -N -d BridgeDB -f BridgeDB/dbpasswd
chains.sh: #6613: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB  - PASSED
chains.sh: Creating Bridge certifiate request BridgeReq.der
certutil -s "CN=Bridge Bridge, O=Bridge, C=US"  -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o BridgeReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6614: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der  - PASSED
chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy
certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 1128111123 -7 Bridge@CAArmy  --extCP --extPM < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.1.1
1

n
n
n
OID.1.1
OID.2.1
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N]
Is this a critical extension [y/N]?
chains.sh: #6615: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy  - PASSED
chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der
chains.sh: #6616: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database  - PASSED
chains.sh: Creating certficate BridgeCANavy.der signed by CANavy
certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 1128111124 -7 Bridge@CANavy  --extCP --extPM < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.2.0
1

n
y
OID.2.1
1

n
n
n
OID.2.1
OID.1.1
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N]
Is this a critical extension [y/N]?
chains.sh: #6617: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy  - PASSED
chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der
chains.sh: #6618: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database  - PASSED
chains.sh: Generating PKCS7 package from BridgeDB database
cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7
chains.sh: #6619: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #6620: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6621: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Bridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1128111125   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.1.1
1

n
y
OID.2.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6622: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate CA1Bridge.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der
chains.sh: #6623: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #6624: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6625: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2Bridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1128111126   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6626: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate CA2Bridge.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der
chains.sh: #6627: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #6628: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o EE1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6629: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1128111127   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.2.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6630: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE1CA1.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der
chains.sh: #6631: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database  - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #6632: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB  - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US"  -R  -d EE2DB -f EE2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o EE2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6633: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der  - PASSED
chains.sh: Creating certficate EE2CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1128111128   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6634: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate EE2CA2.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der
chains.sh: #6635: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database  - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.1.0  -t Army.der
vfychain  -pp -vv     -o OID.1.0  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6636: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.1.0  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.1.1  -t Army.der
vfychain  -pp -vv     -o OID.1.1  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128111119 (0x433d9c0f)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Wed Nov 28 16:10:50 2012
            Not After : Tue Nov 28 16:10:50 2062
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cb:a5:77:99:fe:d1:27:c9:29:c6:ac:ab:2a:ef:81:9b:
                    37:d2:3f:d0:c6:ce:b7:d4:37:4f:99:ab:9c:ad:63:d9:
                    46:40:88:14:be:3a:04:aa:cf:a2:54:e0:1a:af:45:2a:
                    f5:0a:fb:1e:a7:6b:54:3e:d1:d5:1c:a8:dc:9f:c2:2e:
                    71:8c:ee:f2:74:07:56:ac:e0:72:5f:19:06:86:d2:bc:
                    df:0c:3e:d6:10:75:5a:3b:d4:f8:4f:21:13:ae:6a:37:
                    88:3f:f0:9c:52:c5:e1:85:c9:ec:40:7d:46:48:b5:94:
                    dc:1a:9f:c6:3a:9b:af:c6:59:48:9b:e8:8c:9c:11:f9
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        67:42:5e:80:55:f5:c7:48:19:4e:7d:df:db:94:2b:0d:
        05:8f:74:99:ce:06:b5:99:6a:28:10:ee:46:37:8f:66:
        69:30:a0:ee:20:9b:33:61:3b:9e:ff:ea:11:c5:9c:bd:
        b6:16:c6:72:73:56:87:09:19:cd:8e:1a:4a:90:44:58:
        d6:3d:75:01:75:b7:7a:4f:4d:06:ec:8b:3c:48:e4:79:
        26:dd:33:b8:29:da:89:55:d5:8c:c5:36:45:a8:37:0c:
        37:ce:47:51:00:5c:72:cf:7f:f2:b5:d0:4c:f3:08:ff:
        b6:a4:c8:3b:7d:66:8c:82:de:92:69:28:26:45:84:17
    Fingerprint (MD5):
        9A:4D:9A:A6:B5:BA:2A:AD:8B:7C:1D:27:CF:29:47:74
    Fingerprint (SHA1):
        B6:BE:85:CB:63:0C:D7:9A:30:3E:55:26:85:3D:99:EB:41:0B:B6:8B


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US"
Returned value is 0, expected result is pass
chains.sh: #6637: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.1.1  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.2.0  -t Army.der
vfychain  -pp -vv     -o OID.2.0  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6638: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.2.0  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.2.1  -t Army.der
vfychain  -pp -vv     -o OID.2.1  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6639: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.2.1  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.1.0  -t Navy.der
vfychain  -pp -vv     -o OID.1.0  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6640: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.1.0  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.1.1  -t Navy.der
vfychain  -pp -vv     -o OID.1.1  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6641: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.1.1  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.2.0  -t Navy.der
vfychain  -pp -vv     -o OID.2.0  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6642: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.2.0  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.2.1  -t Navy.der
vfychain  -pp -vv     -o OID.2.1  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6643: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.2.1  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.1.0  -t Navy.der
vfychain  -pp -vv     -o OID.1.0  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6644: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.1.0  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.1.1  -t Navy.der
vfychain  -pp -vv     -o OID.1.1  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6645: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.1.1  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.2.0  -t Navy.der
vfychain  -pp -vv     -o OID.2.0  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128111120 (0x433d9c10)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 16:10:51 2012
            Not After : Tue Nov 28 16:10:51 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e4:9a:4a:01:ef:84:21:b9:94:da:27:15:25:37:92:cb:
                    f8:7e:3f:17:53:f6:0d:6e:ef:c8:2a:ad:b7:39:a8:10:
                    91:94:55:88:ac:e6:6a:b5:87:80:b8:4e:c5:89:b5:a3:
                    9c:ad:79:2c:4b:2e:de:6e:61:b2:91:35:cd:18:db:95:
                    17:1a:29:1e:9f:6f:e7:4a:8e:a4:80:07:c0:95:87:32:
                    3d:63:e6:d4:c1:48:4a:20:5d:66:40:82:a0:fd:46:0a:
                    ce:da:d6:34:53:bc:8d:1c:98:c1:ee:3d:2f:64:2d:da:
                    ba:66:93:05:01:38:8e:80:18:07:6a:11:c4:d6:96:97
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        20:b8:2c:9a:6a:3d:e5:93:f6:a5:22:f8:c9:c9:8e:71:
        21:ee:44:2b:f7:11:fc:4d:78:b6:47:7b:a7:43:83:82:
        fd:06:b0:bf:6e:e1:6c:71:92:8c:87:6d:da:99:2c:06:
        7a:34:59:fb:72:45:c7:6e:56:30:5c:77:66:93:d2:b3:
        89:c3:59:48:c0:28:37:6c:15:bd:c1:53:a1:47:34:42:
        3d:f3:86:eb:32:29:cb:be:63:ec:62:c3:76:27:25:2c:
        d4:3c:c0:c0:22:3e:aa:04:5d:a8:fa:5b:af:e5:e0:de:
        9d:13:30:82:29:9f:57:1c:8f:9c:f7:b3:7c:86:3d:af
    Fingerprint (MD5):
        C6:9A:CF:AC:72:B7:1D:01:76:5A:77:CF:43:D0:47:F0
    Fingerprint (SHA1):
        D3:D8:F1:F5:02:56:AA:76:8F:06:CC:15:08:EE:EA:8A:AC:C9:C4:4C


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US"
Returned value is 0, expected result is pass
chains.sh: #6646: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.2.0  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.2.1  -t Navy.der
vfychain  -pp -vv     -o OID.2.1  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6647: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.2.1  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.1.0  -t Army.der
vfychain  -pp -vv     -o OID.1.0  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6648: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.1.0  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.1.1  -t Army.der
vfychain  -pp -vv     -o OID.1.1  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6649: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.1.1  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.2.0  -t Army.der
vfychain  -pp -vv     -o OID.2.0  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6650: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.2.0  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.2.1  -t Army.der
vfychain  -pp -vv     -o OID.2.1  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6651: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.2.1  -t Army.der - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #6652: RealCerts: Creating DB AllDB  - PASSED
chains.sh: Importing certificate TestCA.ca.cert to AllDB database
certutil -A -n TestCA.ca  -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/TestCA.ca.cert
chains.sh: #6653: RealCerts: Importing certificate TestCA.ca.cert to AllDB database  - PASSED
chains.sh: Importing certificate TestUser50.cert to AllDB database
certutil -A -n TestUser50  -t "" -d AllDB -f AllDB/dbpasswd -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/TestUser50.cert
chains.sh: #6654: RealCerts: Importing certificate TestUser50.cert to AllDB database  - PASSED
chains.sh: Importing certificate TestUser51.cert to AllDB database
certutil -A -n TestUser51  -t "" -d AllDB -f AllDB/dbpasswd -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/TestUser51.cert
chains.sh: #6655: RealCerts: Importing certificate TestUser51.cert to AllDB database  - PASSED
chains.sh: Importing certificate PayPalRootCA.cert to AllDB database
certutil -A -n PayPalRootCA  -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/PayPalRootCA.cert
chains.sh: #6656: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database  - PASSED
chains.sh: Importing certificate PayPalICA.cert to AllDB database
certutil -A -n PayPalICA  -t "" -d AllDB -f AllDB/dbpasswd -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/PayPalICA.cert
chains.sh: #6657: RealCerts: Importing certificate PayPalICA.cert to AllDB database  - PASSED
chains.sh: Importing certificate PayPalEE.cert to AllDB database
certutil -A -n PayPalEE  -t "" -d AllDB -f AllDB/dbpasswd -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/PayPalEE.cert
chains.sh: #6658: RealCerts: Importing certificate PayPalEE.cert to AllDB database  - PASSED
chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database
certutil -A -n BrAirWaysBadSig  -t "" -d AllDB -f AllDB/dbpasswd -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/BrAirWaysBadSig.cert
chains.sh: #6659: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  TestUser50.cert with flags  -d AllDB    
vfychain -d AllDB -pp -vv      /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/TestUser50.cert 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Mar 19 21:04:25 2008
            Not After : Tue Mar 19 21:04:25 2058
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e6:a7:fb:18:60:23:4e:1f:bf:76:e3:9f:4d:ee:69:61:
                    fa:17:51:d8:fa:ed:9b:5a:8d:77:eb:bd:cf:3a:33:82:
                    9b:ef:08:fb:8f:7e:b9:53:65:b6:9f:e4:a1:e6:d9:ae:
                    c5:66:16:6f:eb:ae:59:e6:e2:ab:af:53:37:67:e2:03:
                    a6:ec:29:e4:2d:65:3f:51:c8:29:44:c0:f5:d8:a5:c0:
                    a3:e8:7c:f5:78:88:1e:39:1b:f9:af:85:c6:45:dc:3b:
                    2c:df:27:4d:c3:36:72:cf:d8:b2:61:58:8f:43:bc:d9:
                    aa:9a:55:96:99:d1:c2:56:42:4a:f8:b1:a3:25:b4:fd
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        b1:93:e9:b7:f6:40:fc:3d:20:5d:b6:e7:bd:a6:5d:0e:
        0c:cf:09:ac:09:70:cc:e1:12:e7:c8:f4:3d:53:8f:18:
        57:b9:c7:5c:60:66:fa:83:e1:82:78:e1:d9:21:66:dc:
        58:e1:03:b4:c3:75:6f:a4:3f:25:73:02:b5:e8:e2:38:
        5c:b1:61:eb:dc:86:15:3e:3c:c7:f6:db:94:b8:08:62:
        57:44:92:fe:5c:15:fb:67:7a:d4:83:22:44:ef:4f:55:
        0b:5b:b9:ec:0b:f3:da:c5:03:f2:39:e9:5b:dc:b9:6a:
        f5:01:9b:02:5f:d5:6f:0d:4d:2b:7a:0d:38:eb:84:d7
    Fingerprint (MD5):
        35:D0:B2:A4:9D:E6:0A:4C:D6:04:28:C9:B5:5F:18:27
    Fingerprint (SHA1):
        52:7C:99:B3:6C:71:6D:F8:22:66:4E:60:D0:08:90:A7:90:94:FB:AC

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=TestUser50,E=TestUser50@bogus.com,O=BOGUS NSS,L=Mo
    untain View,ST=California,C=US"
Returned value is 0, expected result is pass
chains.sh: #6660: RealCerts: Verifying certificate(s)  TestUser50.cert with flags  -d AllDB     - PASSED
chains.sh: Verifying certificate(s)  TestUser51.cert with flags  -d AllDB    
vfychain -d AllDB -pp -vv      /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/TestUser51.cert 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Mar 19 21:04:25 2008
            Not After : Tue Mar 19 21:04:25 2058
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e6:a7:fb:18:60:23:4e:1f:bf:76:e3:9f:4d:ee:69:61:
                    fa:17:51:d8:fa:ed:9b:5a:8d:77:eb:bd:cf:3a:33:82:
                    9b:ef:08:fb:8f:7e:b9:53:65:b6:9f:e4:a1:e6:d9:ae:
                    c5:66:16:6f:eb:ae:59:e6:e2:ab:af:53:37:67:e2:03:
                    a6:ec:29:e4:2d:65:3f:51:c8:29:44:c0:f5:d8:a5:c0:
                    a3:e8:7c:f5:78:88:1e:39:1b:f9:af:85:c6:45:dc:3b:
                    2c:df:27:4d:c3:36:72:cf:d8:b2:61:58:8f:43:bc:d9:
                    aa:9a:55:96:99:d1:c2:56:42:4a:f8:b1:a3:25:b4:fd
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        b1:93:e9:b7:f6:40:fc:3d:20:5d:b6:e7:bd:a6:5d:0e:
        0c:cf:09:ac:09:70:cc:e1:12:e7:c8:f4:3d:53:8f:18:
        57:b9:c7:5c:60:66:fa:83:e1:82:78:e1:d9:21:66:dc:
        58:e1:03:b4:c3:75:6f:a4:3f:25:73:02:b5:e8:e2:38:
        5c:b1:61:eb:dc:86:15:3e:3c:c7:f6:db:94:b8:08:62:
        57:44:92:fe:5c:15:fb:67:7a:d4:83:22:44:ef:4f:55:
        0b:5b:b9:ec:0b:f3:da:c5:03:f2:39:e9:5b:dc:b9:6a:
        f5:01:9b:02:5f:d5:6f:0d:4d:2b:7a:0d:38:eb:84:d7
    Fingerprint (MD5):
        35:D0:B2:A4:9D:E6:0A:4C:D6:04:28:C9:B5:5F:18:27
    Fingerprint (SHA1):
        52:7C:99:B3:6C:71:6D:F8:22:66:4E:60:D0:08:90:A7:90:94:FB:AC

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=TestUser51,E=TestUser51@bogus.com,O=BOGUS NSS,L=Mo
    untain View,ST=California,C=US"
Returned value is 0, expected result is pass
chains.sh: #6661: RealCerts: Verifying certificate(s)  TestUser51.cert with flags  -d AllDB     - PASSED
chains.sh: Verifying certificate(s)  PayPalEE.cert with flags  -d AllDB    -o OID.2.16.840.1.113733.1.7.23.6 
vfychain -d AllDB -pp -vv     -o OID.2.16.840.1.113733.1.7.23.6  /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/PayPalEE.cert 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            58:f3:9e:5c:01:2b:19:47:21:a9:8e:e4:ee:e0:f8:bf
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "OU=Class 3 Public Primary Certification Authority,O="VeriSig
            n, Inc.",C=US"
        Validity:
            Not Before: Wed Nov 08 00:00:00 2006
            Not After : Sun Nov 07 23:59:59 2021
        Subject: "CN=VeriSign Class 3 Public Primary Certification Authority 
            - G5,OU="(c) 2006 VeriSign, Inc. - For authorized use only",OU=Ve
            riSign Trust Network,O="VeriSign, Inc.",C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    af:24:08:08:29:7a:35:9e:60:0c:aa:e7:4b:3b:4e:dc:
                    7c:bc:3c:45:1c:bb:2b:e0:fe:29:02:f9:57:08:a3:64:
                    85:15:27:f5:f1:ad:c8:31:89:5d:22:e8:2a:aa:a6:42:
                    b3:8f:f8:b9:55:b7:b1:b7:4b:b3:fe:8f:7e:07:57:ec:
                    ef:43:db:66:62:15:61:cf:60:0d:a4:d8:de:f8:e0:c3:
                    62:08:3d:54:13:eb:49:ca:59:54:85:26:e5:2b:8f:1b:
                    9f:eb:f5:a1:91:c2:33:49:d8:43:63:6a:52:4b:d2:8f:
                    e8:70:51:4d:d1:89:69:7b:c7:70:f6:b3:dc:12:74:db:
                    7b:5d:4b:56:d3:96:bf:15:77:a1:b0:f4:a2:25:f2:af:
                    1c:92:67:18:e5:f4:06:04:ef:90:b9:e4:00:e4:dd:3a:
                    b5:19:ff:02:ba:f4:3c:ee:e0:8b:eb:37:8b:ec:f4:d7:
                    ac:f2:f6:f0:3d:af:dd:75:91:33:19:1d:1c:40:cb:74:
                    24:19:21:93:d9:14:fe:ac:2a:52:c7:8f:d5:04:49:e4:
                    8d:63:47:88:3c:69:83:cb:fe:47:bd:2b:7e:4f:c5:95:
                    ae:0e:9d:d4:d1:43:c0:67:73:e3:14:08:7e:e5:3f:9f:
                    73:b8:33:0a:cf:5d:3f:34:87:96:8a:ee:53:e8:25:15
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: CRL Distribution Points
            Distribution point:
                URI: "http://crl.verisign.com/pca3.crl"

            Name: Certificate Key Usage
            Critical: True
            Usages: Certificate Signing
                    CRL Signing

            Name: OID.1.3.6.1.5.5.7.1.12
            Data: Sequence {
                [1]: {
                    [0]: {
                        Sequence {
                            Sequence {
                                Sequence {
                                    "image/gif"
                                    Sequence {
                                        Sequence {
                                            Sequence {
                                                SHA-1
                                            }
                                            8f:e5:d3:1a:86:ac:8d:8e:6b:c3:cf:
                                            80:6a:d4:48:18:2c:7b:19:2e
                                        }
                                    }
                                    Sequence {
                                        "http://logo.verisign.com/vslogo.gif"
                                    }
                                }
                            }
                        }
                    }
                }
            }

            Name: Certificate Policies
            Data: 
                Policy Name: Certificate Policies AnyPolicy
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                    Policy Qualifier Data: "https://www.verisign.com/cps"

            Name: Certificate Subject Key ID
            Data:
                7f:d3:65:a7:c2:dd:ec:bb:f0:30:09:f3:43:39:fa:02:
                af:33:31:33

            Name: Certificate Authority Key Identifier
            Issuer: 
                Directory Name: "OU=Class 3 Public Primary Certification Auth
                    ority,O="VeriSign, Inc.",C=US"
            Serial Number:
                70:ba:e4:1d:10:d9:29:34:b6:38:ca:7b:03:cc:ba:bf

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:15:49:5e:6b:26:ce:ee:98:e7:4d:a5:92:3f:75:6a:
        f0:33:0b:fa:09:dc:28:92:ab:8d:6a:31:41:d9:47:31:
        47:46:09:a1:39:05:3e:66:65:19:8b:32:bf:61:2c:1c:
        d5:6a:03:6f:44:dc:3b:af:ef:1b:93:58:d6:bd:ce:d0:
        ed:b6:89:77:51:15:59:32:28:c5:7a:89:8c:da:3e:6d:
        5c:75:ac:86:d4:c7:9e:fd:38:3e:96:73:40:87:34:6a:
        84:4e:31:a8:d2:a2:b9:3c:4e:06:dd:cb:b2:7c:ae:e1:
        d5:9f:1e:74:e5:24:f0:cf:e4:9b:ec:25:ea:cd:ec:f6
    Fingerprint (MD5):
        C8:DE:26:6F:0A:C4:1C:6D:46:9C:CC:AD:0A:C4:D5:1C
    Fingerprint (SHA1):
        87:50:7F:E5:19:BD:E7:A1:19:AE:A3:2F:77:9D:76:30:5D:7A:69:13

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=www.paypal.com,OU=PayPal Production,O="PayPal, Inc
    .",STREET=2211 N 1st St,L=San Jose,ST=California,postalCode=95131-2021,C=
    US,serialNumber=3014267,businessCategory=Private Organization,incorporati
    onState=Delaware,incorporationCountry=US"
Certificate 2 Subject: "CN=VeriSign Class 3 Extended Validation SSL CA,OU=Ter
    ms of use at https://www.verisign.com/rpa (c)06,OU=VeriSign Trust Network
    ,O="VeriSign, Inc.",C=US"
Returned value is 0, expected result is pass
chains.sh: #6662: RealCerts: Verifying certificate(s)  PayPalEE.cert with flags  -d AllDB    -o OID.2.16.840.1.113733.1.7.23.6  - PASSED
chains.sh: Verifying certificate(s)  BrAirWaysBadSig.cert with flags  -d AllDB    
vfychain -d AllDB -pp -vv      /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/BrAirWaysBadSig.cert 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. BrAirWaysBadSig :
  ERROR -8181: Peer's Certificate has expired.
Returned value is 1, expected result is fail
chains.sh: #6663: RealCerts: Verifying certificate(s)  BrAirWaysBadSig.cert with flags  -d AllDB     - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #6664: DSA: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -m 1128111129 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #6665: DSA: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #6666: DSA: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #6667: DSA: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6668: DSA: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1128111130   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6669: DSA: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
chains.sh: #6670: DSA: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #6671: DSA: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R  -d EE1DB -f EE1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o EE1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6672: DSA: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1128111131   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6673: DSA: Creating certficate EE1CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE1CA1.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der
chains.sh: #6674: DSA: Importing certificate EE1CA1.der to EE1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #6675: DSA: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6676: DSA: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 1128111132   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6677: DSA: Creating certficate CA2Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA2Root.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der
chains.sh: #6678: DSA: Importing certificate CA2Root.der to CA2DB database  - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #6679: DSA: Creating DB EE2DB  - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R  -d EE2DB -f EE2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o EE2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6680: DSA: Creating EE certifiate request EE2Req.der  - PASSED
chains.sh: Creating certficate EE2CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1128111133   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6681: DSA: Creating certficate EE2CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate EE2CA2.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der
chains.sh: #6682: DSA: Importing certificate EE2CA2.der to EE2DB database  - PASSED
chains.sh: Creating DB CA3DB
certutil -N -d CA3DB -f CA3DB/dbpasswd
chains.sh: #6683: DSA: Creating DB CA3DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA3Req.der
certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA3Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6684: DSA: Creating Intermediate certifiate request CA3Req.der  - PASSED
chains.sh: Creating certficate CA3Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 1128111134   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6685: DSA: Creating certficate CA3Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA3Root.der to CA3DB database
certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der
chains.sh: #6686: DSA: Importing certificate CA3Root.der to CA3DB database  - PASSED
chains.sh: Creating DB EE3DB
certutil -N -d EE3DB -f EE3DB/dbpasswd
chains.sh: #6687: DSA: Creating DB EE3DB  - PASSED
chains.sh: Creating EE certifiate request EE3Req.der
certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R  -d EE3DB -f EE3DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o EE3Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6688: DSA: Creating EE certifiate request EE3Req.der  - PASSED
chains.sh: Creating certficate EE3CA3.der signed by CA3
certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 1128111135   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6689: DSA: Creating certficate EE3CA3.der signed by CA3  - PASSED
chains.sh: Importing certificate EE3CA3.der to EE3DB database
certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der
chains.sh: #6690: DSA: Importing certificate EE3CA3.der to EE3DB database  - PASSED
chains.sh: Creating DB CA4DB
certutil -N -d CA4DB -f CA4DB/dbpasswd
chains.sh: #6691: DSA: Creating DB CA4DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA4Req.der
certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA4Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6692: DSA: Creating Intermediate certifiate request CA4Req.der  - PASSED
chains.sh: Creating certficate CA4Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 1128111136   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6693: DSA: Creating certficate CA4Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA4Root.der to CA4DB database
certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der
chains.sh: #6694: DSA: Importing certificate CA4Root.der to CA4DB database  - PASSED
chains.sh: Creating DB EE4DB
certutil -N -d EE4DB -f EE4DB/dbpasswd
chains.sh: #6695: DSA: Creating DB EE4DB  - PASSED
chains.sh: Creating EE certifiate request EE4Req.der
certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R  -d EE4DB -f EE4DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o EE4Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6696: DSA: Creating EE certifiate request EE4Req.der  - PASSED
chains.sh: Creating certficate EE4CA4.der signed by CA4
certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 1128111137   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6697: DSA: Creating certficate EE4CA4.der signed by CA4  - PASSED
chains.sh: Importing certificate EE4CA4.der to EE4DB database
certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der
chains.sh: #6698: DSA: Importing certificate EE4CA4.der to EE4DB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #6699: DSA: Creating DB AllDB  - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Root.der with flags  -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv      EE1CA1.der CA1Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128111129 (0x433d9c19)
        Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:10:55 2012
            Not After : Tue Nov 28 16:10:55 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: ANSI X9.57 DSA Signature
                Args:
                    30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44:
                    db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb:
                    c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f:
                    41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69:
                    fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8:
                    89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3:
                    c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52:
                    29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db:
                    ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44:
                    29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02:
                    81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:
                    00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:
                    f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:
                    31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:
                    da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:
                    54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:
                    83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:
                    f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:
                    a5:10
            DSA Public Key:
                Prime:
                    98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c:
                    b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04:
                    82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f:
                    af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a:
                    4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad:
                    af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65:
                    c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe:
                    18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d
                Subprime:
                    b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1:
                    76:27:03:81
                Base:
                    04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04:
                    4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c:
                    f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50:
                    82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e:
                    57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b:
                    5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87:
                    60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb:
                    35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10
                PublicValue:
                    18:6c:d6:8f:d7:73:c6:f0:d3:a3:26:5d:ca:a4:76:35:
                    0e:1a:60:32:f8:72:4a:29:3e:d2:ea:45:0b:2f:ba:f8:
                    ec:c7:f1:df:6e:2d:c2:bc:59:fd:ba:b4:9a:a7:2d:57:
                    42:b4:ea:b1:80:fd:db:9a:69:ab:b0:ec:fc:56:f3:6b:
                    f4:01:58:df:c4:ac:98:76:e5:77:06:b0:45:8b:a0:19:
                    00:a1:5a:e5:6f:a3:52:7f:37:b1:e0:68:ca:ac:0a:2c:
                    5f:39:cd:2a:3e:db:2d:76:bb:ea:54:37:72:7c:be:78:
                    66:bb:0d:a6:99:6d:5b:dc:e3:77:35:b8:f9:f8:86:15
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
    Signature:
        30:2d:02:15:00:91:73:83:16:12:3e:78:4f:53:23:fa:
        52:e3:57:80:38:d0:12:51:5f:02:14:2e:75:c9:dd:04:
        22:7e:8f:44:48:22:76:d2:53:de:7c:ea:1f:ca:9b
    Fingerprint (MD5):
        7C:52:E3:97:84:A2:98:F5:6F:DD:3E:A5:08:F0:A0:A7
    Fingerprint (SHA1):
        2F:EC:1B:73:73:01:10:9C:14:31:32:0A:50:F2:53:C7:13:C5:67:77


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #6700: DSA: Verifying certificate(s)  EE1CA1.der CA1Root.der with flags  -d AllDB     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Root.der with flags  -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv      EE2CA2.der CA2Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128111129 (0x433d9c19)
        Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:10:55 2012
            Not After : Tue Nov 28 16:10:55 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: ANSI X9.57 DSA Signature
                Args:
                    30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44:
                    db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb:
                    c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f:
                    41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69:
                    fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8:
                    89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3:
                    c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52:
                    29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db:
                    ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44:
                    29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02:
                    81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:
                    00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:
                    f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:
                    31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:
                    da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:
                    54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:
                    83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:
                    f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:
                    a5:10
            DSA Public Key:
                Prime:
                    98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c:
                    b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04:
                    82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f:
                    af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a:
                    4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad:
                    af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65:
                    c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe:
                    18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d
                Subprime:
                    b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1:
                    76:27:03:81
                Base:
                    04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04:
                    4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c:
                    f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50:
                    82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e:
                    57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b:
                    5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87:
                    60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb:
                    35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10
                PublicValue:
                    18:6c:d6:8f:d7:73:c6:f0:d3:a3:26:5d:ca:a4:76:35:
                    0e:1a:60:32:f8:72:4a:29:3e:d2:ea:45:0b:2f:ba:f8:
                    ec:c7:f1:df:6e:2d:c2:bc:59:fd:ba:b4:9a:a7:2d:57:
                    42:b4:ea:b1:80:fd:db:9a:69:ab:b0:ec:fc:56:f3:6b:
                    f4:01:58:df:c4:ac:98:76:e5:77:06:b0:45:8b:a0:19:
                    00:a1:5a:e5:6f:a3:52:7f:37:b1:e0:68:ca:ac:0a:2c:
                    5f:39:cd:2a:3e:db:2d:76:bb:ea:54:37:72:7c:be:78:
                    66:bb:0d:a6:99:6d:5b:dc:e3:77:35:b8:f9:f8:86:15
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
    Signature:
        30:2d:02:15:00:91:73:83:16:12:3e:78:4f:53:23:fa:
        52:e3:57:80:38:d0:12:51:5f:02:14:2e:75:c9:dd:04:
        22:7e:8f:44:48:22:76:d2:53:de:7c:ea:1f:ca:9b
    Fingerprint (MD5):
        7C:52:E3:97:84:A2:98:F5:6F:DD:3E:A5:08:F0:A0:A7
    Fingerprint (SHA1):
        2F:EC:1B:73:73:01:10:9C:14:31:32:0A:50:F2:53:C7:13:C5:67:77


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #6701: DSA: Verifying certificate(s)  EE2CA2.der CA2Root.der with flags  -d AllDB     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE3CA3.der CA3Root.der with flags  -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv      EE3CA3.der CA3Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128111129 (0x433d9c19)
        Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:10:55 2012
            Not After : Tue Nov 28 16:10:55 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: ANSI X9.57 DSA Signature
                Args:
                    30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44:
                    db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb:
                    c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f:
                    41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69:
                    fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8:
                    89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3:
                    c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52:
                    29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db:
                    ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44:
                    29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02:
                    81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:
                    00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:
                    f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:
                    31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:
                    da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:
                    54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:
                    83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:
                    f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:
                    a5:10
            DSA Public Key:
                Prime:
                    98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c:
                    b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04:
                    82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f:
                    af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a:
                    4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad:
                    af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65:
                    c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe:
                    18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d
                Subprime:
                    b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1:
                    76:27:03:81
                Base:
                    04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04:
                    4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c:
                    f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50:
                    82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e:
                    57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b:
                    5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87:
                    60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb:
                    35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10
                PublicValue:
                    18:6c:d6:8f:d7:73:c6:f0:d3:a3:26:5d:ca:a4:76:35:
                    0e:1a:60:32:f8:72:4a:29:3e:d2:ea:45:0b:2f:ba:f8:
                    ec:c7:f1:df:6e:2d:c2:bc:59:fd:ba:b4:9a:a7:2d:57:
                    42:b4:ea:b1:80:fd:db:9a:69:ab:b0:ec:fc:56:f3:6b:
                    f4:01:58:df:c4:ac:98:76:e5:77:06:b0:45:8b:a0:19:
                    00:a1:5a:e5:6f:a3:52:7f:37:b1:e0:68:ca:ac:0a:2c:
                    5f:39:cd:2a:3e:db:2d:76:bb:ea:54:37:72:7c:be:78:
                    66:bb:0d:a6:99:6d:5b:dc:e3:77:35:b8:f9:f8:86:15
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
    Signature:
        30:2d:02:15:00:91:73:83:16:12:3e:78:4f:53:23:fa:
        52:e3:57:80:38:d0:12:51:5f:02:14:2e:75:c9:dd:04:
        22:7e:8f:44:48:22:76:d2:53:de:7c:ea:1f:ca:9b
    Fingerprint (MD5):
        7C:52:E3:97:84:A2:98:F5:6F:DD:3E:A5:08:F0:A0:A7
    Fingerprint (SHA1):
        2F:EC:1B:73:73:01:10:9C:14:31:32:0A:50:F2:53:C7:13:C5:67:77


Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US"
Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US"
Returned value is 0, expected result is pass
chains.sh: #6702: DSA: Verifying certificate(s)  EE3CA3.der CA3Root.der with flags  -d AllDB     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE4CA4.der CA4Root.der with flags  -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv      EE4CA4.der CA4Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128111129 (0x433d9c19)
        Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:10:55 2012
            Not After : Tue Nov 28 16:10:55 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: ANSI X9.57 DSA Signature
                Args:
                    30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44:
                    db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb:
                    c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f:
                    41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69:
                    fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8:
                    89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3:
                    c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52:
                    29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db:
                    ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44:
                    29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02:
                    81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:
                    00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:
                    f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:
                    31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:
                    da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:
                    54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:
                    83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:
                    f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:
                    a5:10
            DSA Public Key:
                Prime:
                    98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c:
                    b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04:
                    82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f:
                    af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a:
                    4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad:
                    af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65:
                    c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe:
                    18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d
                Subprime:
                    b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1:
                    76:27:03:81
                Base:
                    04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04:
                    4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c:
                    f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50:
                    82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e:
                    57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b:
                    5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87:
                    60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb:
                    35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10
                PublicValue:
                    18:6c:d6:8f:d7:73:c6:f0:d3:a3:26:5d:ca:a4:76:35:
                    0e:1a:60:32:f8:72:4a:29:3e:d2:ea:45:0b:2f:ba:f8:
                    ec:c7:f1:df:6e:2d:c2:bc:59:fd:ba:b4:9a:a7:2d:57:
                    42:b4:ea:b1:80:fd:db:9a:69:ab:b0:ec:fc:56:f3:6b:
                    f4:01:58:df:c4:ac:98:76:e5:77:06:b0:45:8b:a0:19:
                    00:a1:5a:e5:6f:a3:52:7f:37:b1:e0:68:ca:ac:0a:2c:
                    5f:39:cd:2a:3e:db:2d:76:bb:ea:54:37:72:7c:be:78:
                    66:bb:0d:a6:99:6d:5b:dc:e3:77:35:b8:f9:f8:86:15
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
    Signature:
        30:2d:02:15:00:91:73:83:16:12:3e:78:4f:53:23:fa:
        52:e3:57:80:38:d0:12:51:5f:02:14:2e:75:c9:dd:04:
        22:7e:8f:44:48:22:76:d2:53:de:7c:ea:1f:ca:9b
    Fingerprint (MD5):
        7C:52:E3:97:84:A2:98:F5:6F:DD:3E:A5:08:F0:A0:A7
    Fingerprint (SHA1):
        2F:EC:1B:73:73:01:10:9C:14:31:32:0A:50:F2:53:C7:13:C5:67:77


Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US"
Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US"
Returned value is 0, expected result is pass
chains.sh: #6703: DSA: Verifying certificate(s)  EE4CA4.der CA4Root.der with flags  -d AllDB     -t Root.der - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #6704: Revocation: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -m 10 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #6705: Revocation: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #6706: Revocation: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA0DB
certutil -N -d CA0DB -f CA0DB/dbpasswd
chains.sh: #6707: Revocation: Creating DB CA0DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA0Req.der
certutil -s "CN=CA0 Intermediate, O=CA0, C=US"  -R -2 -d CA0DB -f CA0DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA0Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6708: Revocation: Creating Intermediate certifiate request CA0Req.der  - PASSED
chains.sh: Creating certficate CA0Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6709: Revocation: Creating certficate CA0Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA0Root.der to CA0DB database
certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der
chains.sh: #6710: Revocation: Importing certificate CA0Root.der to CA0DB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #6711: Revocation: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6712: Revocation: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6713: Revocation: Creating certficate CA1CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate CA1CA0.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der
chains.sh: #6714: Revocation: Importing certificate CA1CA0.der to CA1DB database  - PASSED
chains.sh: Creating DB EE11DB
certutil -N -d EE11DB -f EE11DB/dbpasswd
chains.sh: #6715: Revocation: Creating DB EE11DB  - PASSED
chains.sh: Creating EE certifiate request EE11Req.der
certutil -s "CN=EE11 EE, O=EE11, C=US"  -R  -d EE11DB -f EE11DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o EE11Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6716: Revocation: Creating EE certifiate request EE11Req.der  - PASSED
chains.sh: Creating certficate EE11CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6717: Revocation: Creating certficate EE11CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE11CA1.der to EE11DB database
certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der
chains.sh: #6718: Revocation: Importing certificate EE11CA1.der to EE11DB database  - PASSED
chains.sh: Creating DB EE12DB
certutil -N -d EE12DB -f EE12DB/dbpasswd
chains.sh: #6719: Revocation: Creating DB EE12DB  - PASSED
chains.sh: Creating EE certifiate request EE12Req.der
certutil -s "CN=EE12 EE, O=EE12, C=US"  -R  -d EE12DB -f EE12DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o EE12Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6720: Revocation: Creating EE certifiate request EE12Req.der  - PASSED
chains.sh: Creating certficate EE12CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6721: Revocation: Creating certficate EE12CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE12CA1.der to EE12DB database
certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der
chains.sh: #6722: Revocation: Importing certificate EE12CA1.der to EE12DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #6723: Revocation: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6724: Revocation: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6725: Revocation: Creating certficate CA2CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate CA2CA0.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der
chains.sh: #6726: Revocation: Importing certificate CA2CA0.der to CA2DB database  - PASSED
chains.sh: Creating DB EE21DB
certutil -N -d EE21DB -f EE21DB/dbpasswd
chains.sh: #6727: Revocation: Creating DB EE21DB  - PASSED
chains.sh: Creating EE certifiate request EE21Req.der
certutil -s "CN=EE21 EE, O=EE21, C=US"  -R  -d EE21DB -f EE21DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o EE21Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6728: Revocation: Creating EE certifiate request EE21Req.der  - PASSED
chains.sh: Creating certficate EE21CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6729: Revocation: Creating certficate EE21CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate EE21CA2.der to EE21DB database
certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der
chains.sh: #6730: Revocation: Importing certificate EE21CA2.der to EE21DB database  - PASSED
chains.sh: Create CRL for RootDB
crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl
=== Crlutil input data ===
update=20121128161059Z
nextupdate=20131128161059Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=Root ROOT CA,O=Root,C=US"
    This Update: Wed Nov 28 16:10:59 2012
    Next Update: Thu Nov 28 16:10:59 2013
    CRL Extensions:
chains.sh: #6731: Revocation: Create CRL for RootDB  - PASSED
chains.sh: Create CRL for CA0DB
crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl
=== Crlutil input data ===
update=20121128161059Z
nextupdate=20131128161059Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA0 Intermediate,O=CA0,C=US"
    This Update: Wed Nov 28 16:10:59 2012
    Next Update: Thu Nov 28 16:10:59 2013
    CRL Extensions:
chains.sh: #6732: Revocation: Create CRL for CA0DB  - PASSED
chains.sh: Create CRL for CA1DB
crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl
=== Crlutil input data ===
update=20121128161059Z
nextupdate=20131128161059Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
    This Update: Wed Nov 28 16:10:59 2012
    Next Update: Thu Nov 28 16:10:59 2013
    CRL Extensions:
chains.sh: #6733: Revocation: Create CRL for CA1DB  - PASSED
chains.sh: Create CRL for CA2DB
crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl
=== Crlutil input data ===
update=20121128161059Z
nextupdate=20131128161059Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA2 Intermediate,O=CA2,C=US"
    This Update: Wed Nov 28 16:10:59 2012
    Next Update: Thu Nov 28 16:10:59 2013
    CRL Extensions:
chains.sh: #6734: Revocation: Create CRL for CA2DB  - PASSED
chains.sh: Revoking certificate with SN 14 issued by CA1
crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl
=== Crlutil input data ===
update=20121128161100Z
addcert 14 20121128161100Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
    This Update: Wed Nov 28 16:11:00 2012
    Next Update: Thu Nov 28 16:10:59 2013
    Entry 1 (0x1):
        Serial Number: 14 (0xe)
        Revocation Date: Wed Nov 28 16:11:00 2012
    CRL Extensions:
chains.sh: #6735: Revocation: Revoking certificate with SN 14 issued by CA1  - PASSED
chains.sh: Revoking certificate with SN 15 issued by CA0
crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl
=== Crlutil input data ===
update=20121128161101Z
addcert 15 20121128161101Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA0 Intermediate,O=CA0,C=US"
    This Update: Wed Nov 28 16:11:01 2012
    Next Update: Thu Nov 28 16:10:59 2013
    Entry 1 (0x1):
        Serial Number: 15 (0xf)
        Revocation Date: Wed Nov 28 16:11:01 2012
    CRL Extensions:
chains.sh: #6736: Revocation: Revoking certificate with SN 15 issued by CA0  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #6737: Revocation: Creating DB AllDB  - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #6738: Revocation: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing CRL Root.crl to AllDB database
crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl
chains.sh: #6739: Revocation: Importing CRL Root.crl to AllDB database  - PASSED
chains.sh: Importing certificate CA0Root.der to AllDB database
certutil -A -n CA0  -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der
chains.sh: #6740: Revocation: Importing certificate CA0Root.der to AllDB database  - PASSED
chains.sh: Importing CRL CA0.crl to AllDB database
crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl
chains.sh: #6741: Revocation: Importing CRL CA0.crl to AllDB database  - PASSED
chains.sh: Importing certificate CA1CA0.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der
chains.sh: #6742: Revocation: Importing certificate CA1CA0.der to AllDB database  - PASSED
chains.sh: Importing CRL CA1.crl to AllDB database
crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl
chains.sh: #6743: Revocation: Importing CRL CA1.crl to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA0.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der
chains.sh: #6744: Revocation: Importing certificate CA2CA0.der to AllDB database  - PASSED
chains.sh: Importing CRL CA2.crl to AllDB database
crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl
chains.sh: #6745: Revocation: Importing CRL CA2.crl to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  EE11CA1.der with flags  -g leaf -m crl -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv  -g leaf -m crl     EE11CA1.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 10 (0xa)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:10:57 2012
            Not After : Tue Nov 28 16:10:57 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cb:ec:d2:4f:a9:e4:21:97:7c:f1:19:7b:6a:49:43:d1:
                    60:12:c1:4f:44:f2:55:1c:f5:e4:4e:36:c3:2d:27:2d:
                    22:3b:75:04:16:19:df:05:37:86:a2:a6:91:b2:6c:99:
                    eb:22:bb:2e:5a:b8:d9:e0:7a:8d:77:29:6b:54:d8:7a:
                    10:e9:8d:38:e8:96:d5:b5:3a:19:9d:ee:15:2a:f4:6c:
                    2c:ba:a3:72:56:ca:c8:c4:ba:87:32:b6:11:f5:2d:f5:
                    cb:b2:e4:ea:17:11:d4:b9:dc:3b:cb:0c:be:27:8f:af:
                    29:59:3a:af:92:a0:d7:cf:a5:cf:97:d5:bc:ee:bc:59
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        66:33:7b:43:13:da:72:e4:8a:64:80:99:30:6e:a1:d1:
        60:83:73:61:ba:e4:f1:59:89:e5:7b:b9:df:a0:ba:8e:
        48:8b:a6:75:c9:e3:8a:3a:71:5e:45:b5:79:6f:3a:a6:
        48:91:cd:d9:e9:57:28:0b:98:63:50:04:d2:62:22:99:
        81:84:8c:d8:a9:a3:b1:f0:5b:6b:a5:14:9d:11:61:9c:
        a1:10:69:21:a0:c8:60:81:7f:bc:7e:df:51:e2:55:66:
        02:ef:41:9c:fb:9b:b8:aa:50:2d:cd:08:42:90:dc:50:
        e5:38:15:d8:3f:6a:2e:d7:5b:b4:cd:dd:a2:1e:2c:7b
    Fingerprint (MD5):
        37:F3:D5:B7:7B:25:8A:72:5D:F0:B0:38:7A:CC:B0:1E
    Fingerprint (SHA1):
        5E:B0:A2:90:62:7A:58:9B:45:B7:32:C1:A6:DC:57:E2:CA:20:74:10

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US"
Returned value is 0, expected result is pass
chains.sh: #6746: Revocation: Verifying certificate(s)  EE11CA1.der with flags  -g leaf -m crl -d AllDB     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE12CA1.der with flags  -g leaf -m crl -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv  -g leaf -m crl     EE12CA1.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #6747: Revocation: Verifying certificate(s)  EE12CA1.der with flags  -g leaf -m crl -d AllDB     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE11CA1.der with flags  -g chain -m crl -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv  -g chain -m crl     EE11CA1.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 10 (0xa)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:10:57 2012
            Not After : Tue Nov 28 16:10:57 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cb:ec:d2:4f:a9:e4:21:97:7c:f1:19:7b:6a:49:43:d1:
                    60:12:c1:4f:44:f2:55:1c:f5:e4:4e:36:c3:2d:27:2d:
                    22:3b:75:04:16:19:df:05:37:86:a2:a6:91:b2:6c:99:
                    eb:22:bb:2e:5a:b8:d9:e0:7a:8d:77:29:6b:54:d8:7a:
                    10:e9:8d:38:e8:96:d5:b5:3a:19:9d:ee:15:2a:f4:6c:
                    2c:ba:a3:72:56:ca:c8:c4:ba:87:32:b6:11:f5:2d:f5:
                    cb:b2:e4:ea:17:11:d4:b9:dc:3b:cb:0c:be:27:8f:af:
                    29:59:3a:af:92:a0:d7:cf:a5:cf:97:d5:bc:ee:bc:59
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        66:33:7b:43:13:da:72:e4:8a:64:80:99:30:6e:a1:d1:
        60:83:73:61:ba:e4:f1:59:89:e5:7b:b9:df:a0:ba:8e:
        48:8b:a6:75:c9:e3:8a:3a:71:5e:45:b5:79:6f:3a:a6:
        48:91:cd:d9:e9:57:28:0b:98:63:50:04:d2:62:22:99:
        81:84:8c:d8:a9:a3:b1:f0:5b:6b:a5:14:9d:11:61:9c:
        a1:10:69:21:a0:c8:60:81:7f:bc:7e:df:51:e2:55:66:
        02:ef:41:9c:fb:9b:b8:aa:50:2d:cd:08:42:90:dc:50:
        e5:38:15:d8:3f:6a:2e:d7:5b:b4:cd:dd:a2:1e:2c:7b
    Fingerprint (MD5):
        37:F3:D5:B7:7B:25:8A:72:5D:F0:B0:38:7A:CC:B0:1E
    Fingerprint (SHA1):
        5E:B0:A2:90:62:7A:58:9B:45:B7:32:C1:A6:DC:57:E2:CA:20:74:10

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US"
Returned value is 0, expected result is pass
chains.sh: #6748: Revocation: Verifying certificate(s)  EE11CA1.der with flags  -g chain -m crl -d AllDB     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE21CA2.der with flags  -g chain -m crl -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv  -g chain -m crl     EE21CA2.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #6749: Revocation: Verifying certificate(s)  EE21CA2.der with flags  -g chain -m crl -d AllDB     -t Root.der - PASSED
chains.sh: #6750: Test that OCSP server is reachable - PASSED
chains.sh: Creating DB OCSPRootDB
certutil -N -d OCSPRootDB -f OCSPRootDB/dbpasswd
chains.sh: #6751: OCSP: Creating DB OCSPRootDB  - PASSED
chains.sh: Importing certificate OCSPRoot.cert to OCSPRootDB database
certutil -A -n OCSPRoot  -t "CT,C,C" -d OCSPRootDB -f OCSPRootDB/dbpasswd -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPRoot.cert
chains.sh: #6752: OCSP: Importing certificate OCSPRoot.cert to OCSPRootDB database  - PASSED
chains.sh: Creating DB OCSPCA1DB
certutil -N -d OCSPCA1DB -f OCSPCA1DB/dbpasswd
chains.sh: #6753: OCSP: Creating DB OCSPCA1DB  - PASSED
chains.sh: Importing p12 key OCSPCA1.p12 to OCSPCA1DB database
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPCA1DB -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.p12 -k OCSPCA1DB/dbpasswd -W nssnss
pk12util: PKCS12 IMPORT SUCCESSFUL
chains.sh: #6754: OCSP: Importing p12 key OCSPCA1.p12 to OCSPCA1DB database  - PASSED
chains.sh: Create CRL for OCSPCA1DB
crlutil -G -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl
=== Crlutil input data ===
update=20121128161102Z
nextupdate=20131128161102Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
    This Update: Wed Nov 28 16:11:02 2012
    Next Update: Thu Nov 28 16:11:02 2013
    CRL Extensions:
chains.sh: #6755: OCSP: Create CRL for OCSPCA1DB  - PASSED
chains.sh: Revoking certificate with SN 3 issued by OCSPCA1
crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl
=== Crlutil input data ===
update=20121128161103Z
addcert 3 20121128161103Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
    This Update: Wed Nov 28 16:11:03 2012
    Next Update: Thu Nov 28 16:11:02 2013
    Entry 1 (0x1):
        Serial Number: 3 (0x3)
        Revocation Date: Wed Nov 28 16:11:03 2012
    CRL Extensions:
chains.sh: #6756: OCSP: Revoking certificate with SN 3 issued by OCSPCA1  - PASSED
chains.sh: Revoking certificate with SN 4 issued by OCSPCA1
crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl
=== Crlutil input data ===
update=20121128161104Z
addcert 4 20121128161104Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
    This Update: Wed Nov 28 16:11:04 2012
    Next Update: Thu Nov 28 16:11:02 2013
    Entry 1 (0x1):
        Serial Number: 4 (0x4)
        Revocation Date: Wed Nov 28 16:11:04 2012
    Entry 2 (0x2):
        Serial Number: 3 (0x3)
        Revocation Date: Wed Nov 28 16:11:03 2012
    CRL Extensions:
chains.sh: #6757: OCSP: Revoking certificate with SN 4 issued by OCSPCA1  - PASSED
chains.sh: Verifying certificate(s)  OCSPEE11.cert OCSPCA1.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -h requireFreshInfo -m ocsp     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE11.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.cert  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 403173846 (0x1807f1d6)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Tue Apr 03 15:38:45 2012
            Not After : Mon Apr 03 15:38:45 2062
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a3:ba:e2:4a:07:35:35:5b:82:33:f6:c4:a2:55:4d:f2:
                    45:9f:04:79:0d:a1:9a:03:14:7c:16:4f:65:27:ef:f5:
                    54:77:b2:f6:34:2b:a6:2b:81:dc:d1:59:12:99:c8:ab:
                    f1:20:ee:4b:07:da:e7:c5:e4:fe:1a:a9:f8:6c:0f:86:
                    e8:03:59:e6:7c:83:47:eb:97:e2:12:4f:88:29:44:b5:
                    fa:2b:2c:df:2c:ca:c6:06:70:af:8f:94:d3:b7:50:6b:
                    87:1a:dc:83:ac:f3:3c:b8:48:69:3c:10:37:a9:06:8c:
                    18:e4:d6:03:3b:c1:5d:5f:3b:eb:e6:4d:a9:24:89:7d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        21:b9:29:4b:3a:1c:cc:5b:86:87:ca:8f:a0:b8:72:98:
        a3:03:49:fb:dd:2f:36:8f:5f:ee:c9:e4:f8:e6:65:3d:
        aa:89:7d:f0:ac:1b:a4:1f:db:b3:9d:f9:1b:ed:7d:1b:
        3d:ec:d7:eb:76:99:4d:fd:4d:28:d1:12:9b:16:7a:35:
        fd:86:1f:36:1d:bd:5e:df:f7:7f:3c:27:28:a4:a1:00:
        30:60:78:f3:fb:5c:74:c8:1d:68:cf:5c:7f:28:eb:61:
        44:1d:2e:9c:be:8d:b9:82:95:19:55:e8:93:9c:f5:ed:
        8d:29:7d:72:74:bf:c0:b9:a8:da:9d:ed:2b:a1:ec:40
    Fingerprint (MD5):
        B6:F2:BD:B0:9A:5A:44:F8:0A:F4:1B:7E:95:31:F6:4D
    Fingerprint (SHA1):
        35:38:60:77:26:C7:1F:A5:AE:AE:16:E2:A5:C4:DD:26:BD:71:EB:99

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE11 EE,O=OCSPEE11,C=US"
Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #6758: OCSP: Verifying certificate(s)  OCSPEE11.cert OCSPCA1.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE12.cert OCSPCA1.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -h requireFreshInfo -m ocsp     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE12.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.cert  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #6759: OCSP: Verifying certificate(s)  OCSPEE12.cert OCSPCA1.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE15.cert OCSPCA1.cert with flags  -g leaf -m ocsp -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -m ocsp     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE15.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.cert  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 403173846 (0x1807f1d6)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Tue Apr 03 15:38:45 2012
            Not After : Mon Apr 03 15:38:45 2062
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a3:ba:e2:4a:07:35:35:5b:82:33:f6:c4:a2:55:4d:f2:
                    45:9f:04:79:0d:a1:9a:03:14:7c:16:4f:65:27:ef:f5:
                    54:77:b2:f6:34:2b:a6:2b:81:dc:d1:59:12:99:c8:ab:
                    f1:20:ee:4b:07:da:e7:c5:e4:fe:1a:a9:f8:6c:0f:86:
                    e8:03:59:e6:7c:83:47:eb:97:e2:12:4f:88:29:44:b5:
                    fa:2b:2c:df:2c:ca:c6:06:70:af:8f:94:d3:b7:50:6b:
                    87:1a:dc:83:ac:f3:3c:b8:48:69:3c:10:37:a9:06:8c:
                    18:e4:d6:03:3b:c1:5d:5f:3b:eb:e6:4d:a9:24:89:7d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        21:b9:29:4b:3a:1c:cc:5b:86:87:ca:8f:a0:b8:72:98:
        a3:03:49:fb:dd:2f:36:8f:5f:ee:c9:e4:f8:e6:65:3d:
        aa:89:7d:f0:ac:1b:a4:1f:db:b3:9d:f9:1b:ed:7d:1b:
        3d:ec:d7:eb:76:99:4d:fd:4d:28:d1:12:9b:16:7a:35:
        fd:86:1f:36:1d:bd:5e:df:f7:7f:3c:27:28:a4:a1:00:
        30:60:78:f3:fb:5c:74:c8:1d:68:cf:5c:7f:28:eb:61:
        44:1d:2e:9c:be:8d:b9:82:95:19:55:e8:93:9c:f5:ed:
        8d:29:7d:72:74:bf:c0:b9:a8:da:9d:ed:2b:a1:ec:40
    Fingerprint (MD5):
        B6:F2:BD:B0:9A:5A:44:F8:0A:F4:1B:7E:95:31:F6:4D
    Fingerprint (SHA1):
        35:38:60:77:26:C7:1F:A5:AE:AE:16:E2:A5:C4:DD:26:BD:71:EB:99

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE15 EE,O=OCSPEE15,C=US"
Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #6760: OCSP: Verifying certificate(s)  OCSPEE15.cert OCSPCA1.cert with flags  -g leaf -m ocsp -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE15.cert OCSPCA1.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -h requireFreshInfo -m ocsp     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE15.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.cert  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #6761: OCSP: Verifying certificate(s)  OCSPEE15.cert OCSPCA1.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE21.cert OCSPCA2.cert with flags  -g leaf -m ocsp -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -m ocsp     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE21.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA2.cert  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 403173846 (0x1807f1d6)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Tue Apr 03 15:38:45 2012
            Not After : Mon Apr 03 15:38:45 2062
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a3:ba:e2:4a:07:35:35:5b:82:33:f6:c4:a2:55:4d:f2:
                    45:9f:04:79:0d:a1:9a:03:14:7c:16:4f:65:27:ef:f5:
                    54:77:b2:f6:34:2b:a6:2b:81:dc:d1:59:12:99:c8:ab:
                    f1:20:ee:4b:07:da:e7:c5:e4:fe:1a:a9:f8:6c:0f:86:
                    e8:03:59:e6:7c:83:47:eb:97:e2:12:4f:88:29:44:b5:
                    fa:2b:2c:df:2c:ca:c6:06:70:af:8f:94:d3:b7:50:6b:
                    87:1a:dc:83:ac:f3:3c:b8:48:69:3c:10:37:a9:06:8c:
                    18:e4:d6:03:3b:c1:5d:5f:3b:eb:e6:4d:a9:24:89:7d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        21:b9:29:4b:3a:1c:cc:5b:86:87:ca:8f:a0:b8:72:98:
        a3:03:49:fb:dd:2f:36:8f:5f:ee:c9:e4:f8:e6:65:3d:
        aa:89:7d:f0:ac:1b:a4:1f:db:b3:9d:f9:1b:ed:7d:1b:
        3d:ec:d7:eb:76:99:4d:fd:4d:28:d1:12:9b:16:7a:35:
        fd:86:1f:36:1d:bd:5e:df:f7:7f:3c:27:28:a4:a1:00:
        30:60:78:f3:fb:5c:74:c8:1d:68:cf:5c:7f:28:eb:61:
        44:1d:2e:9c:be:8d:b9:82:95:19:55:e8:93:9c:f5:ed:
        8d:29:7d:72:74:bf:c0:b9:a8:da:9d:ed:2b:a1:ec:40
    Fingerprint (MD5):
        B6:F2:BD:B0:9A:5A:44:F8:0A:F4:1B:7E:95:31:F6:4D
    Fingerprint (SHA1):
        35:38:60:77:26:C7:1F:A5:AE:AE:16:E2:A5:C4:DD:26:BD:71:EB:99

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE21 EE,O=OCSPEE21,C=US"
Certificate 2 Subject: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #6762: OCSP: Verifying certificate(s)  OCSPEE21.cert OCSPCA2.cert with flags  -g leaf -m ocsp -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE21.cert OCSPCA2.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -h requireFreshInfo -m ocsp     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE21.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA2.cert  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #6763: OCSP: Verifying certificate(s)  OCSPEE21.cert OCSPCA2.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE21.cert OCSPCA2.cert with flags  -g chain -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g chain -h requireFreshInfo -m ocsp     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE21.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA2.cert  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #6764: OCSP: Verifying certificate(s)  OCSPEE21.cert OCSPCA2.cert with flags  -g chain -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE31.cert OCSPCA3.cert with flags  -g leaf -m ocsp -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -m ocsp     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE31.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA3.cert  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 403173846 (0x1807f1d6)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Tue Apr 03 15:38:45 2012
            Not After : Mon Apr 03 15:38:45 2062
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a3:ba:e2:4a:07:35:35:5b:82:33:f6:c4:a2:55:4d:f2:
                    45:9f:04:79:0d:a1:9a:03:14:7c:16:4f:65:27:ef:f5:
                    54:77:b2:f6:34:2b:a6:2b:81:dc:d1:59:12:99:c8:ab:
                    f1:20:ee:4b:07:da:e7:c5:e4:fe:1a:a9:f8:6c:0f:86:
                    e8:03:59:e6:7c:83:47:eb:97:e2:12:4f:88:29:44:b5:
                    fa:2b:2c:df:2c:ca:c6:06:70:af:8f:94:d3:b7:50:6b:
                    87:1a:dc:83:ac:f3:3c:b8:48:69:3c:10:37:a9:06:8c:
                    18:e4:d6:03:3b:c1:5d:5f:3b:eb:e6:4d:a9:24:89:7d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        21:b9:29:4b:3a:1c:cc:5b:86:87:ca:8f:a0:b8:72:98:
        a3:03:49:fb:dd:2f:36:8f:5f:ee:c9:e4:f8:e6:65:3d:
        aa:89:7d:f0:ac:1b:a4:1f:db:b3:9d:f9:1b:ed:7d:1b:
        3d:ec:d7:eb:76:99:4d:fd:4d:28:d1:12:9b:16:7a:35:
        fd:86:1f:36:1d:bd:5e:df:f7:7f:3c:27:28:a4:a1:00:
        30:60:78:f3:fb:5c:74:c8:1d:68:cf:5c:7f:28:eb:61:
        44:1d:2e:9c:be:8d:b9:82:95:19:55:e8:93:9c:f5:ed:
        8d:29:7d:72:74:bf:c0:b9:a8:da:9d:ed:2b:a1:ec:40
    Fingerprint (MD5):
        B6:F2:BD:B0:9A:5A:44:F8:0A:F4:1B:7E:95:31:F6:4D
    Fingerprint (SHA1):
        35:38:60:77:26:C7:1F:A5:AE:AE:16:E2:A5:C4:DD:26:BD:71:EB:99

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE31 EE,O=OCSPEE31,C=US"
Certificate 2 Subject: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US"
Returned value is 0, expected result is pass
chains.sh: #6765: OCSP: Verifying certificate(s)  OCSPEE31.cert OCSPCA3.cert with flags  -g leaf -m ocsp -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE31.cert OCSPCA3.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -h requireFreshInfo -m ocsp     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE31.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA3.cert  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #6766: OCSP: Verifying certificate(s)  OCSPEE31.cert OCSPCA3.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE12.cert OCSPCA1.cert with flags  -g leaf -m ocsp -s doNotUse -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -m ocsp -s doNotUse     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE12.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.cert  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 403173846 (0x1807f1d6)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Tue Apr 03 15:38:45 2012
            Not After : Mon Apr 03 15:38:45 2062
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a3:ba:e2:4a:07:35:35:5b:82:33:f6:c4:a2:55:4d:f2:
                    45:9f:04:79:0d:a1:9a:03:14:7c:16:4f:65:27:ef:f5:
                    54:77:b2:f6:34:2b:a6:2b:81:dc:d1:59:12:99:c8:ab:
                    f1:20:ee:4b:07:da:e7:c5:e4:fe:1a:a9:f8:6c:0f:86:
                    e8:03:59:e6:7c:83:47:eb:97:e2:12:4f:88:29:44:b5:
                    fa:2b:2c:df:2c:ca:c6:06:70:af:8f:94:d3:b7:50:6b:
                    87:1a:dc:83:ac:f3:3c:b8:48:69:3c:10:37:a9:06:8c:
                    18:e4:d6:03:3b:c1:5d:5f:3b:eb:e6:4d:a9:24:89:7d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        21:b9:29:4b:3a:1c:cc:5b:86:87:ca:8f:a0:b8:72:98:
        a3:03:49:fb:dd:2f:36:8f:5f:ee:c9:e4:f8:e6:65:3d:
        aa:89:7d:f0:ac:1b:a4:1f:db:b3:9d:f9:1b:ed:7d:1b:
        3d:ec:d7:eb:76:99:4d:fd:4d:28:d1:12:9b:16:7a:35:
        fd:86:1f:36:1d:bd:5e:df:f7:7f:3c:27:28:a4:a1:00:
        30:60:78:f3:fb:5c:74:c8:1d:68:cf:5c:7f:28:eb:61:
        44:1d:2e:9c:be:8d:b9:82:95:19:55:e8:93:9c:f5:ed:
        8d:29:7d:72:74:bf:c0:b9:a8:da:9d:ed:2b:a1:ec:40
    Fingerprint (MD5):
        B6:F2:BD:B0:9A:5A:44:F8:0A:F4:1B:7E:95:31:F6:4D
    Fingerprint (SHA1):
        35:38:60:77:26:C7:1F:A5:AE:AE:16:E2:A5:C4:DD:26:BD:71:EB:99

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE12 EE,O=OCSPEE12,C=US"
Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #6767: OCSP: Verifying certificate(s)  OCSPEE12.cert OCSPCA1.cert with flags  -g leaf -m ocsp -s doNotUse -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE12.cert OCSPCA1.cert with flags  -g leaf -m ocsp -s forbidFetching -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -m ocsp -s forbidFetching     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE12.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.cert  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 403173846 (0x1807f1d6)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Tue Apr 03 15:38:45 2012
            Not After : Mon Apr 03 15:38:45 2062
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a3:ba:e2:4a:07:35:35:5b:82:33:f6:c4:a2:55:4d:f2:
                    45:9f:04:79:0d:a1:9a:03:14:7c:16:4f:65:27:ef:f5:
                    54:77:b2:f6:34:2b:a6:2b:81:dc:d1:59:12:99:c8:ab:
                    f1:20:ee:4b:07:da:e7:c5:e4:fe:1a:a9:f8:6c:0f:86:
                    e8:03:59:e6:7c:83:47:eb:97:e2:12:4f:88:29:44:b5:
                    fa:2b:2c:df:2c:ca:c6:06:70:af:8f:94:d3:b7:50:6b:
                    87:1a:dc:83:ac:f3:3c:b8:48:69:3c:10:37:a9:06:8c:
                    18:e4:d6:03:3b:c1:5d:5f:3b:eb:e6:4d:a9:24:89:7d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        21:b9:29:4b:3a:1c:cc:5b:86:87:ca:8f:a0:b8:72:98:
        a3:03:49:fb:dd:2f:36:8f:5f:ee:c9:e4:f8:e6:65:3d:
        aa:89:7d:f0:ac:1b:a4:1f:db:b3:9d:f9:1b:ed:7d:1b:
        3d:ec:d7:eb:76:99:4d:fd:4d:28:d1:12:9b:16:7a:35:
        fd:86:1f:36:1d:bd:5e:df:f7:7f:3c:27:28:a4:a1:00:
        30:60:78:f3:fb:5c:74:c8:1d:68:cf:5c:7f:28:eb:61:
        44:1d:2e:9c:be:8d:b9:82:95:19:55:e8:93:9c:f5:ed:
        8d:29:7d:72:74:bf:c0:b9:a8:da:9d:ed:2b:a1:ec:40
    Fingerprint (MD5):
        B6:F2:BD:B0:9A:5A:44:F8:0A:F4:1B:7E:95:31:F6:4D
    Fingerprint (SHA1):
        35:38:60:77:26:C7:1F:A5:AE:AE:16:E2:A5:C4:DD:26:BD:71:EB:99

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE12 EE,O=OCSPEE12,C=US"
Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #6768: OCSP: Verifying certificate(s)  OCSPEE12.cert OCSPCA1.cert with flags  -g leaf -m ocsp -s forbidFetching -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE15.cert OCSPCA1.cert with flags  -g leaf -m ocsp -s failIfNoInfo -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -m ocsp -s failIfNoInfo     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE15.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.cert  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8071: The OCSP server experienced an internal error.
Returned value is 1, expected result is fail
chains.sh: #6769: OCSP: Verifying certificate(s)  OCSPEE15.cert OCSPCA1.cert with flags  -g leaf -m ocsp -s failIfNoInfo -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE21.cert OCSPCA2.cert with flags  -g leaf -m ocsp -s failIfNoInfo -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -m ocsp -s failIfNoInfo     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE21.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA2.cert  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #6770: OCSP: Verifying certificate(s)  OCSPEE21.cert OCSPCA2.cert with flags  -g leaf -m ocsp -s failIfNoInfo -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE13.cert OCSPCA1.cert with flags  -g leaf -h testLocalInfoFirst -m ocsp -d OCSPCA1DB     -t OCSPCA1
vfychain -d OCSPCA1DB -pp -vv  -g leaf -h testLocalInfoFirst -m ocsp     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE13.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.cert  -t OCSPCA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Tue Apr 03 15:38:46 2012
            Not After : Mon Apr 03 15:38:46 2017
        Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c1:b0:47:12:51:37:68:7d:39:cb:ee:e3:32:2c:ad:b5:
                    44:2c:72:7f:c8:e9:32:79:d9:7d:b9:69:94:bc:5a:9e:
                    5a:3b:0f:e2:07:e5:b2:76:04:73:32:ee:92:8d:a1:2f:
                    ed:e4:e0:5a:92:28:ca:bb:48:fc:5c:44:dc:9a:c0:3b:
                    88:84:0a:bd:6b:4a:c9:18:37:51:e3:a3:3a:e0:40:5c:
                    53:0d:04:ed:c7:18:34:25:5a:5e:00:f5:0d:29:ef:fa:
                    69:e3:6d:96:e3:1e:5b:8a:4e:3e:77:e7:45:16:81:6f:
                    21:01:2c:8d:b1:fa:57:06:f0:9b:95:1a:c3:0d:25:25
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Authority Information Access
            Method: PKIX Online Certificate Status Protocol
            Location: 
                URI: "http://ocsp.kuix.de:2600"

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        88:c4:da:b7:3d:84:1d:1c:ca:f8:c1:2e:46:59:c2:33:
        93:64:38:f9:2a:87:32:ca:ec:e0:ef:ff:cc:1f:9d:96:
        a6:42:b0:cd:8f:b3:85:3a:59:64:34:c1:0d:bb:24:c5:
        36:f6:28:93:a0:3b:58:b8:93:87:c5:6e:f2:64:23:b9:
        c4:a9:53:82:bd:0a:12:92:58:90:01:b1:11:a6:65:aa:
        a9:72:94:60:96:38:fd:e3:9e:14:5b:4e:ed:0d:99:e2:
        94:6a:50:84:88:00:1e:14:a7:ed:20:69:95:9b:cb:b7:
        61:11:b8:14:7a:1e:19:3c:bb:38:5b:97:e0:ad:9f:2e
    Fingerprint (MD5):
        6E:22:37:7A:94:F2:07:60:87:6B:9D:CF:64:C9:D9:37
    Fingerprint (SHA1):
        92:63:FD:E1:AA:A4:45:54:F7:E8:B7:5F:92:8F:74:06:3E:96:BA:47

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User

Certificate 1 Subject: "CN=OCSPEE13 EE,O=OCSPEE13,C=US"
Returned value is 0, expected result is pass
chains.sh: #6771: OCSP: Verifying certificate(s)  OCSPEE13.cert OCSPCA1.cert with flags  -g leaf -h testLocalInfoFirst -m ocsp -d OCSPCA1DB     -t OCSPCA1 - PASSED
chains.sh: Creating DB OCSPRoot1DB
certutil -N -d OCSPRoot1DB -f OCSPRoot1DB/dbpasswd
chains.sh: #6772: OCSP: Creating DB OCSPRoot1DB  - PASSED
chains.sh: Importing certificate OCSPRoot.cert to OCSPRoot1DB database
certutil -A -n OCSPRoot  -t "CT,C,C" -d OCSPRoot1DB -f OCSPRoot1DB/dbpasswd -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPRoot.cert
chains.sh: #6773: OCSP: Importing certificate OCSPRoot.cert to OCSPRoot1DB database  - PASSED
chains.sh: Verifying certificate(s)  OCSPEE23.cert OCSPCA2.cert with flags  -g chain -m ocsp -g leaf -m ocsp -d OCSPRoot1DB     -t OCSPRoot
vfychain -d OCSPRoot1DB -pp -vv  -g chain -m ocsp -g leaf -m ocsp     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE23.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA2.cert  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #6774: OCSP: Verifying certificate(s)  OCSPEE23.cert OCSPCA2.cert with flags  -g chain -m ocsp -g leaf -m ocsp -d OCSPRoot1DB     -t OCSPRoot - PASSED
chains.sh: Creating DB OCSPRoot2DB
certutil -N -d OCSPRoot2DB -f OCSPRoot2DB/dbpasswd
chains.sh: #6775: OCSP: Creating DB OCSPRoot2DB  - PASSED
chains.sh: Importing certificate OCSPRoot.cert to OCSPRoot2DB database
certutil -A -n OCSPRoot  -t "T,," -d OCSPRoot2DB -f OCSPRoot2DB/dbpasswd -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPRoot.cert
chains.sh: #6776: OCSP: Importing certificate OCSPRoot.cert to OCSPRoot2DB database  - PASSED
chains.sh: Verifying certificate(s)  OCSPEE23.cert OCSPCA2.cert with flags  -g chain -m ocsp -g leaf -m ocsp -d OCSPRoot2DB     -t OCSPRoot
vfychain -d OCSPRoot2DB -pp -vv  -g chain -m ocsp -g leaf -m ocsp     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE23.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA2.cert  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 403173846 (0x1807f1d6)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Tue Apr 03 15:38:45 2012
            Not After : Mon Apr 03 15:38:45 2062
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a3:ba:e2:4a:07:35:35:5b:82:33:f6:c4:a2:55:4d:f2:
                    45:9f:04:79:0d:a1:9a:03:14:7c:16:4f:65:27:ef:f5:
                    54:77:b2:f6:34:2b:a6:2b:81:dc:d1:59:12:99:c8:ab:
                    f1:20:ee:4b:07:da:e7:c5:e4:fe:1a:a9:f8:6c:0f:86:
                    e8:03:59:e6:7c:83:47:eb:97:e2:12:4f:88:29:44:b5:
                    fa:2b:2c:df:2c:ca:c6:06:70:af:8f:94:d3:b7:50:6b:
                    87:1a:dc:83:ac:f3:3c:b8:48:69:3c:10:37:a9:06:8c:
                    18:e4:d6:03:3b:c1:5d:5f:3b:eb:e6:4d:a9:24:89:7d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        21:b9:29:4b:3a:1c:cc:5b:86:87:ca:8f:a0:b8:72:98:
        a3:03:49:fb:dd:2f:36:8f:5f:ee:c9:e4:f8:e6:65:3d:
        aa:89:7d:f0:ac:1b:a4:1f:db:b3:9d:f9:1b:ed:7d:1b:
        3d:ec:d7:eb:76:99:4d:fd:4d:28:d1:12:9b:16:7a:35:
        fd:86:1f:36:1d:bd:5e:df:f7:7f:3c:27:28:a4:a1:00:
        30:60:78:f3:fb:5c:74:c8:1d:68:cf:5c:7f:28:eb:61:
        44:1d:2e:9c:be:8d:b9:82:95:19:55:e8:93:9c:f5:ed:
        8d:29:7d:72:74:bf:c0:b9:a8:da:9d:ed:2b:a1:ec:40
    Fingerprint (MD5):
        B6:F2:BD:B0:9A:5A:44:F8:0A:F4:1B:7E:95:31:F6:4D
    Fingerprint (SHA1):
        35:38:60:77:26:C7:1F:A5:AE:AE:16:E2:A5:C4:DD:26:BD:71:EB:99

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted Client CA
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=OCSPEE23 EE,O=OCSPEE23,C=US"
Certificate 2 Subject: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #6777: OCSP: Verifying certificate(s)  OCSPEE23.cert OCSPCA2.cert with flags  -g chain -m ocsp -g leaf -m ocsp -d OCSPRoot2DB     -t OCSPRoot - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #6778: CRLDP: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -m 1128111138 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #6779: CRLDP: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #6780: CRLDP: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA0DB
certutil -N -d CA0DB -f CA0DB/dbpasswd
chains.sh: #6781: CRLDP: Creating DB CA0DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA0Req.der
certutil -s "CN=CA0 Intermediate, O=CA0, C=US"  -R -2 -d CA0DB -f CA0DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA0Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6782: CRLDP: Creating Intermediate certifiate request CA0Req.der  - PASSED
chains.sh: Creating certficate CA0Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 1128111139   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6783: CRLDP: Creating certficate CA0Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA0Root.der to CA0DB database
certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der
chains.sh: #6784: CRLDP: Importing certificate CA0Root.der to CA0DB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #6785: CRLDP: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA1Req.der  -4 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y
1
7
http://buildnss02.usersys.redhat.com:8556/buildnss02-10869-CA0-1128111028.crl
-1
-1
-1
n
n

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
Enter the type of the distribution point name:
1 - Full Name
2 - Relative Name
Any other number to finish
Choice:  > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Select one of the following for the reason flags
0 - unused
1 - keyCompromise
2 - caCompromise
3 - affiliationChanged
4 - superseded
5 - cessationOfOperation
6 - certificateHold
Any other number to finishChoice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6786: CRLDP: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10   --extAIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8556/buildnss02-10869-CA0Root-1128111015.der
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #6787: CRLDP: Creating certficate CA1CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate CA1CA0.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der
chains.sh: #6788: CRLDP: Importing certificate CA1CA0.der to CA1DB database  - PASSED
chains.sh: Creating DB EE11DB
certutil -N -d EE11DB -f EE11DB/dbpasswd
chains.sh: #6789: CRLDP: Creating DB EE11DB  - PASSED
chains.sh: Creating EE certifiate request EE11Req.der
certutil -s "CN=EE11 EE, O=EE11, C=US"  -R  -d EE11DB -f EE11DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o EE11Req.der  -4 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8556/buildnss02-10869-CA0-1128111028.crl
-1
-1
-1
n
n

===


Generating key.  This may take a few moments...

Enter the type of the distribution point name:
1 - Full Name
2 - Relative Name
Any other number to finish
Choice:  > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Select one of the following for the reason flags
0 - unused
1 - keyCompromise
2 - caCompromise
3 - affiliationChanged
4 - superseded
5 - cessationOfOperation
6 - certificateHold
Any other number to finishChoice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6790: CRLDP: Creating EE certifiate request EE11Req.der  - PASSED
chains.sh: Creating certficate EE11CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 1128111140   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6791: CRLDP: Creating certficate EE11CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE11CA1.der to EE11DB database
certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der
chains.sh: #6792: CRLDP: Importing certificate EE11CA1.der to EE11DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #6793: CRLDP: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA2Req.der  -4 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y
1
7
http://buildnss02.usersys.redhat.com:8556/buildnss02-10869-CA0-1128111028.crl
-1
-1
-1
n
n

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
Enter the type of the distribution point name:
1 - Full Name
2 - Relative Name
Any other number to finish
Choice:  > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Select one of the following for the reason flags
0 - unused
1 - keyCompromise
2 - caCompromise
3 - affiliationChanged
4 - superseded
5 - cessationOfOperation
6 - certificateHold
Any other number to finishChoice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6794: CRLDP: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20   --extAIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8556/buildnss02-10869-CA0Root-1128111016.der
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #6795: CRLDP: Creating certficate CA2CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate CA2CA0.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der
chains.sh: #6796: CRLDP: Importing certificate CA2CA0.der to CA2DB database  - PASSED
chains.sh: Creating DB EE21DB
certutil -N -d EE21DB -f EE21DB/dbpasswd
chains.sh: #6797: CRLDP: Creating DB EE21DB  - PASSED
chains.sh: Creating EE certifiate request EE21Req.der
certutil -s "CN=EE21 EE, O=EE21, C=US"  -R  -d EE21DB -f EE21DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o EE21Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6798: CRLDP: Creating EE certifiate request EE21Req.der  - PASSED
chains.sh: Creating certficate EE21CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 1128111141   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6799: CRLDP: Creating certficate EE21CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate EE21CA2.der to EE21DB database
certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der
chains.sh: #6800: CRLDP: Importing certificate EE21CA2.der to EE21DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #6801: CRLDP: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o EE1Req.der  -4 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8556/buildnss02-10869-CA0-1128111028.crl
-1
-1
-1
n
n

===


Generating key.  This may take a few moments...

Enter the type of the distribution point name:
1 - Full Name
2 - Relative Name
Any other number to finish
Choice:  > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Select one of the following for the reason flags
0 - unused
1 - keyCompromise
2 - caCompromise
3 - affiliationChanged
4 - superseded
5 - cessationOfOperation
6 - certificateHold
Any other number to finishChoice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6802: CRLDP: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30   --extAIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8556/buildnss02-10869-CA0Root-1128111017.der
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #6803: CRLDP: Creating certficate EE1CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate EE1CA0.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der
chains.sh: #6804: CRLDP: Importing certificate EE1CA0.der to EE1DB database  - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #6805: CRLDP: Creating DB EE2DB  - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US"  -R  -d EE2DB -f EE2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o EE2Req.der  -4 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8556/buildnss02-10869-CA0-1128111028.crl
-1
-1
-1
n
n

===


Generating key.  This may take a few moments...

Enter the type of the distribution point name:
1 - Full Name
2 - Relative Name
Any other number to finish
Choice:  > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Select one of the following for the reason flags
0 - unused
1 - keyCompromise
2 - caCompromise
3 - affiliationChanged
4 - superseded
5 - cessationOfOperation
6 - certificateHold
Any other number to finishChoice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6806: CRLDP: Creating EE certifiate request EE2Req.der  - PASSED
chains.sh: Creating certficate EE2CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40   --extAIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8556/buildnss02-10869-CA0Root-1128111018.der
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #6807: CRLDP: Creating certficate EE2CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate EE2CA0.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der
chains.sh: #6808: CRLDP: Importing certificate EE2CA0.der to EE2DB database  - PASSED
chains.sh: Create CRL for RootDB
crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl
=== Crlutil input data ===
update=20121128161115Z
nextupdate=20131128161115Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=Root ROOT CA,O=Root,C=US"
    This Update: Wed Nov 28 16:11:15 2012
    Next Update: Thu Nov 28 16:11:15 2013
    CRL Extensions:
chains.sh: #6809: CRLDP: Create CRL for RootDB  - PASSED
chains.sh: Create CRL for CA0DB
crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl
=== Crlutil input data ===
update=20121128161115Z
nextupdate=20131128161115Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA0 Intermediate,O=CA0,C=US"
    This Update: Wed Nov 28 16:11:15 2012
    Next Update: Thu Nov 28 16:11:15 2013
    CRL Extensions:
chains.sh: #6810: CRLDP: Create CRL for CA0DB  - PASSED
chains.sh: Create CRL for CA1DB
crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl
=== Crlutil input data ===
update=20121128161115Z
nextupdate=20131128161115Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
    This Update: Wed Nov 28 16:11:15 2012
    Next Update: Thu Nov 28 16:11:15 2013
    CRL Extensions:
chains.sh: #6811: CRLDP: Create CRL for CA1DB  - PASSED
chains.sh: Create CRL for CA2DB
crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl
=== Crlutil input data ===
update=20121128161115Z
nextupdate=20131128161115Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA2 Intermediate,O=CA2,C=US"
    This Update: Wed Nov 28 16:11:15 2012
    Next Update: Thu Nov 28 16:11:15 2013
    CRL Extensions:
chains.sh: #6812: CRLDP: Create CRL for CA2DB  - PASSED
chains.sh: Revoking certificate with SN 20 issued by CA0
crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl
=== Crlutil input data ===
update=20121128161116Z
addcert 20 20121128161116Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA0 Intermediate,O=CA0,C=US"
    This Update: Wed Nov 28 16:11:16 2012
    Next Update: Thu Nov 28 16:11:15 2013
    Entry 1 (0x1):
        Serial Number: 20 (0x14)
        Revocation Date: Wed Nov 28 16:11:16 2012
    CRL Extensions:
chains.sh: #6813: CRLDP: Revoking certificate with SN 20 issued by CA0  - PASSED
chains.sh: Revoking certificate with SN 40 issued by CA0
crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl
=== Crlutil input data ===
update=20121128161117Z
addcert 40 20121128161117Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA0 Intermediate,O=CA0,C=US"
    This Update: Wed Nov 28 16:11:17 2012
    Next Update: Thu Nov 28 16:11:15 2013
    Entry 1 (0x1):
        Serial Number: 20 (0x14)
        Revocation Date: Wed Nov 28 16:11:16 2012
    Entry 2 (0x2):
        Serial Number: 40 (0x28)
        Revocation Date: Wed Nov 28 16:11:17 2012
    CRL Extensions:
chains.sh: #6814: CRLDP: Revoking certificate with SN 40 issued by CA0  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #6815: CRLDP: Creating DB AllDB  - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #6816: CRLDP: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing CRL Root.crl to AllDB database
crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl
chains.sh: #6817: CRLDP: Importing CRL Root.crl to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  EE11CA1.der CA1CA0.der with flags  -g chain -h requireFreshInfo -m crl -d AllDB -f    -t Root.der
vfychain -d AllDB -pp -vv  -g chain -h requireFreshInfo -m crl -f    EE11CA1.der CA1CA0.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128111138 (0x433d9c22)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:11:12 2012
            Not After : Tue Nov 28 16:11:12 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ee:78:1a:83:4b:c8:e8:3f:a5:24:70:de:f5:60:60:9c:
                    39:06:cc:5e:7a:63:4e:8a:c3:25:ad:a9:c1:14:d3:5f:
                    4b:69:de:d1:31:46:89:bf:99:da:4b:10:7c:8a:45:84:
                    02:24:20:23:2a:01:73:c2:58:6c:d0:d1:55:69:a2:a8:
                    cd:d9:4c:16:bd:52:f8:8b:1b:f1:6d:9d:91:ec:2c:ab:
                    ba:6a:e1:d4:b7:2f:cc:df:34:2e:2b:53:e4:76:90:59:
                    f8:fb:81:d6:99:24:ab:da:e5:cf:6b:84:fa:eb:53:fd:
                    be:12:dd:72:d2:86:49:cf:be:ad:02:e7:fc:1e:66:7d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1d:ec:0f:35:bd:28:45:d9:d6:a4:e9:d3:11:41:ce:24:
        2a:d0:30:8a:33:95:26:7d:64:4a:8f:32:51:78:4b:77:
        b5:ad:4d:82:4c:72:d7:d6:7e:4c:d5:c6:fb:28:67:7f:
        b4:08:b4:de:f5:f3:b9:8f:89:93:48:61:b8:01:be:83:
        d8:b9:be:2a:24:8a:cf:8e:8e:74:13:d7:86:0e:f4:8b:
        36:b4:b6:52:a0:4c:34:a1:0e:fd:ed:8a:85:7b:5d:6c:
        0d:61:ab:63:30:21:23:d9:6c:7f:6b:67:ac:d3:6a:29:
        00:31:96:17:16:ab:48:b8:43:a8:13:98:9f:d9:58:95
    Fingerprint (MD5):
        0B:92:26:AD:BE:0B:70:7D:4B:7B:75:69:1C:DF:51:1F
    Fingerprint (SHA1):
        18:9A:B7:71:A1:8A:F1:3E:BF:56:B3:08:5C:8E:52:E0:F9:64:78:E2

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US"
Returned value is 0, expected result is pass
chains.sh: #6818: CRLDP: Verifying certificate(s)  EE11CA1.der CA1CA0.der with flags  -g chain -h requireFreshInfo -m crl -d AllDB -f    -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE21CA2.der CA2CA0.der with flags  -g chain -h requireFreshInfo -m crl -d AllDB -f    -t Root.der
vfychain -d AllDB -pp -vv  -g chain -h requireFreshInfo -m crl -f    EE21CA2.der CA2CA0.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #6819: CRLDP: Verifying certificate(s)  EE21CA2.der CA2CA0.der with flags  -g chain -h requireFreshInfo -m crl -d AllDB -f    -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA0.der with flags  -g leaf -h requireFreshInfo -m crl -d AllDB -f    -t Root.der
vfychain -d AllDB -pp -vv  -g leaf -h requireFreshInfo -m crl -f    EE1CA0.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128111138 (0x433d9c22)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:11:12 2012
            Not After : Tue Nov 28 16:11:12 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ee:78:1a:83:4b:c8:e8:3f:a5:24:70:de:f5:60:60:9c:
                    39:06:cc:5e:7a:63:4e:8a:c3:25:ad:a9:c1:14:d3:5f:
                    4b:69:de:d1:31:46:89:bf:99:da:4b:10:7c:8a:45:84:
                    02:24:20:23:2a:01:73:c2:58:6c:d0:d1:55:69:a2:a8:
                    cd:d9:4c:16:bd:52:f8:8b:1b:f1:6d:9d:91:ec:2c:ab:
                    ba:6a:e1:d4:b7:2f:cc:df:34:2e:2b:53:e4:76:90:59:
                    f8:fb:81:d6:99:24:ab:da:e5:cf:6b:84:fa:eb:53:fd:
                    be:12:dd:72:d2:86:49:cf:be:ad:02:e7:fc:1e:66:7d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1d:ec:0f:35:bd:28:45:d9:d6:a4:e9:d3:11:41:ce:24:
        2a:d0:30:8a:33:95:26:7d:64:4a:8f:32:51:78:4b:77:
        b5:ad:4d:82:4c:72:d7:d6:7e:4c:d5:c6:fb:28:67:7f:
        b4:08:b4:de:f5:f3:b9:8f:89:93:48:61:b8:01:be:83:
        d8:b9:be:2a:24:8a:cf:8e:8e:74:13:d7:86:0e:f4:8b:
        36:b4:b6:52:a0:4c:34:a1:0e:fd:ed:8a:85:7b:5d:6c:
        0d:61:ab:63:30:21:23:d9:6c:7f:6b:67:ac:d3:6a:29:
        00:31:96:17:16:ab:48:b8:43:a8:13:98:9f:d9:58:95
    Fingerprint (MD5):
        0B:92:26:AD:BE:0B:70:7D:4B:7B:75:69:1C:DF:51:1F
    Fingerprint (SHA1):
        18:9A:B7:71:A1:8A:F1:3E:BF:56:B3:08:5C:8E:52:E0:F9:64:78:E2

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US"
Returned value is 0, expected result is pass
chains.sh: #6820: CRLDP: Verifying certificate(s)  EE1CA0.der with flags  -g leaf -h requireFreshInfo -m crl -d AllDB -f    -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA0.der with flags  -g leaf -h requireFreshInfo -m crl -d AllDB -f    -t Root.der
vfychain -d AllDB -pp -vv  -g leaf -h requireFreshInfo -m crl -f    EE2CA0.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. Root [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #6821: CRLDP: Verifying certificate(s)  EE2CA0.der with flags  -g leaf -h requireFreshInfo -m crl -d AllDB -f    -t Root.der - PASSED
trying to kill httpserv with PID 4732 at Wed Nov 28 11:11:18 EST 2012
kill -USR1 4732
selfserv: normal termination
httpserv -b -p 8556 2>/dev/null;
httpserv with PID 4732 killed at Wed Nov 28 11:11:18 EST 2012
TIMESTAMP chains END: Wed Nov 28 11:11:18 EST 2012
chains.sh: Testing with upgraded library ===============================
cp: cannot stat `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/cert.done': No such file or directory
Running tests for dbupgrade
TIMESTAMP dbupgrade BEGIN: Wed Nov 28 11:11:18 EST 2012
dbupgrade.sh: DB upgrade tests ===============================
Reset databases to their initial values:
certutil: could not find certificate named "objsigner": security library: bad database.

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

FIPS_PUB_140_Test_Certificate                                Cu,Cu,Cu
dbupgrade.sh: Legacy to shared Library update ===============================
alicedir
upgrading db alicedir


Generating key.  This may take a few moments...

dbupgrade.sh: #6822: Upgrading alicedir  - PASSED
bobdir
upgrading db bobdir


Generating key.  This may take a few moments...

dbupgrade.sh: #6823: Upgrading bobdir  - PASSED
CA
upgrading db CA


Generating key.  This may take a few moments...

dbupgrade.sh: #6824: Upgrading CA  - PASSED
cert_extensions
upgrading db cert_extensions


Generating key.  This may take a few moments...

dbupgrade.sh: #6825: Upgrading cert_extensions  - PASSED
client
upgrading db client


Generating key.  This may take a few moments...

dbupgrade.sh: #6826: Upgrading client  - PASSED
clientCA
upgrading db clientCA


Generating key.  This may take a few moments...

dbupgrade.sh: #6827: Upgrading clientCA  - PASSED
dave
upgrading db dave


Generating key.  This may take a few moments...

dbupgrade.sh: #6828: Upgrading dave  - PASSED
eccurves
upgrading db eccurves


Generating key.  This may take a few moments...

dbupgrade.sh: #6829: Upgrading eccurves  - PASSED
eve
upgrading db eve


Generating key.  This may take a few moments...

dbupgrade.sh: #6830: Upgrading eve  - PASSED
ext_client
upgrading db ext_client


Generating key.  This may take a few moments...

dbupgrade.sh: #6831: Upgrading ext_client  - PASSED
ext_server
upgrading db ext_server


Generating key.  This may take a few moments...

dbupgrade.sh: #6832: Upgrading ext_server  - PASSED
SDR
upgrading db SDR


Generating key.  This may take a few moments...

dbupgrade.sh: #6833: Upgrading SDR  - PASSED
server
upgrading db server


Generating key.  This may take a few moments...

dbupgrade.sh: #6834: Upgrading server  - PASSED
serverCA
upgrading db serverCA


Generating key.  This may take a few moments...

dbupgrade.sh: #6835: Upgrading serverCA  - PASSED
tools/copydir
skipping db tools/copydir
dbupgrade.sh: #6836: No directory tools/copydir  - PASSED
upgrading db fips


Generating key.  This may take a few moments...

dbupgrade.sh: #6837: Upgrading fips  - PASSED

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

FIPS_PUB_140_Test_Certificate                                Cu,Cu,Cu
TIMESTAMP dbupgrade END: Wed Nov 28 11:12:35 EST 2012
Running tests for lowhash
TIMESTAMP lowhash BEGIN: Wed Nov 28 11:12:35 EST 2012
lowhash.sh: Lowhash Tests ===============================
lowhashtest with fips mode=
lowhashtest MD5
lowhash.sh: #6838: lowhashtest with fips mode= for MD5  - PASSED
lowhashtest SHA1
lowhash.sh: #6839: lowhashtest with fips mode= for SHA1  - PASSED
lowhashtest SHA224
lowhash.sh: #6840: lowhashtest with fips mode= for SHA224  - PASSED
lowhashtest SHA256
lowhash.sh: #6841: lowhashtest with fips mode= for SHA256  - PASSED
lowhashtest SHA384
lowhash.sh: #6842: lowhashtest with fips mode= for SHA384  - PASSED
lowhashtest SHA512
lowhash.sh: #6843: lowhashtest with fips mode= for SHA512  - PASSED
lowhashtest with fips mode=
lowhashtest MD5
lowhash.sh: #6844: lowhashtest with fips mode= for MD5  - PASSED
lowhashtest SHA1
lowhash.sh: #6845: lowhashtest with fips mode= for SHA1  - PASSED
lowhashtest SHA224
lowhash.sh: #6846: lowhashtest with fips mode= for SHA224  - PASSED
lowhashtest SHA256
lowhash.sh: #6847: lowhashtest with fips mode= for SHA256  - PASSED
lowhashtest SHA384
lowhash.sh: #6848: lowhashtest with fips mode= for SHA384  - PASSED
lowhashtest SHA512
lowhash.sh: #6849: lowhashtest with fips mode= for SHA512  - PASSED
lowhash.sh done
TIMESTAMP lowhash END: Wed Nov 28 11:12:36 EST 2012
Running tests for tools
TIMESTAMP tools BEGIN: Wed Nov 28 11:12:36 EST 2012
tools.sh: Tools Tests with ECC ===============================
tools.sh: Exporting Alice's email cert & key - default ciphers
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6850: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                61:d8:65:44:b8:22:74:5d:fd:95:c1:43:c1:0f:3e:83
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #6851: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6852: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's email EC cert & key---------------
pk12util -o Alice-ec.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \
         -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6853: Exporting Alice's email EC cert & key (pk12util -o)  - PASSED
tools.sh: Importing Alice's email EC cert & key --------------
pk12util -i Alice-ec.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6854: Importing Alice's email EC cert & key (pk12util -i)  - PASSED
tools.sh: Listing Alice's pk12 EC file -----------------
pk12util -l Alice-ec.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice-ec

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                62:69:9f:09:03:01:4a:1e:95:33:1f:ae:72:83:e3:7d
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: X9.62 ECDSA signature with SHA-1
        Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ
            ia,C=US"
        Validity:
            Not Before: Wed Nov 28 15:56:51 2012
            Not After : Tue Nov 28 15:56:51 2062
        Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor
            nia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: X9.62 elliptic curve public key
                Args:
                    06:05:2b:81:04:00:23
            EC Public Key:
                PublicValue:
                    04:00:07:4e:a1:16:c3:4a:cd:8b:16:57:9e:e4:a2:f2:
                    31:f1:fa:59:c1:7f:bc:6c:22:68:c4:ee:6f:27:aa:81:
                    df:95:fd:4f:5d:fa:2f:cd:f0:55:eb:2f:8c:d2:04:0c:
                    64:1c:90:e8:24:90:df:bd:ac:28:f2:ba:82:ec:ae:63:
                    d2:0c:b9:00:51:8c:25:3a:54:d5:e2:36:35:7d:3e:19:
                    66:f0:0e:60:9e:d5:89:b4:ef:ef:f0:5a:a8:de:0d:e3:
                    1d:dc:da:a4:46:5d:08:68:ce:f3:da:df:2c:8d:87:bb:
                    c4:b0:f8:8a:01:9e:29:b2:45:ba:a0:10:46:d8:3e:f1:
                    76:fc:9c:8e:3b
                Curve: SECG elliptic curve secp521r1 (aka NIST P-521)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: X9.62 ECDSA signature with SHA-1
    Signature:
        30:81:88:02:42:00:c1:73:6f:d0:bc:1e:0d:1c:00:e8:
        f2:f4:6f:ad:d0:f6:82:c1:49:08:f4:a3:28:8a:da:a4:
        48:b0:39:f4:a5:37:02:d3:76:90:ce:9f:e6:c2:bb:42:
        ab:cc:8e:24:b2:ed:97:5d:49:93:1d:ca:7c:03:7e:b3:
        1d:a1:fd:c3:23:dd:f9:02:42:01:8e:4d:8c:3c:39:4d:
        80:4e:be:dd:13:e4:64:51:d2:ac:39:8b:38:db:7e:f9:
        67:56:96:1c:46:0f:6a:5f:8d:3d:d4:80:41:d9:84:39:
        04:d3:ac:c7:e0:6e:5b:0b:66:cf:0f:87:2c:8e:9a:48:
        73:09:9f:e2:83:4e:33:00:c0:73:79
    Fingerprint (MD5):
        DB:38:33:3A:9E:15:07:96:B0:8A:3C:04:DD:91:82:39
    Fingerprint (SHA1):
        A2:D9:85:5B:91:CE:23:41:1B:6F:54:65:41:A0:C6:DE:68:80:5A:0D

    Friendly Name: TestCA-ec

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: X9.62 ECDSA signature with SHA-1
        Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ
            ia,C=US"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice-ec@bogus.com,O=BOGUS NSS,L=Mountain View,S
            T=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: X9.62 elliptic curve public key
                Args:
                    06:05:2b:81:04:00:22
            EC Public Key:
                PublicValue:
                    04:d1:06:9d:29:29:f0:ca:c6:be:05:80:03:3c:12:c3:
                    cf:90:d3:2e:4f:4a:06:b6:9b:15:33:1c:2a:f6:92:28:
                    02:49:86:fd:cf:e3:46:9b:fb:ef:58:93:15:0c:35:5a:
                    3b:08:70:fd:72:a7:1a:1c:8c:08:77:d8:33:46:42:0c:
                    05:c4:c3:e7:a6:bb:e8:1e:d3:ef:26:77:41:73:79:57:
                    ba:94:c6:0b:f2:42:03:69:3d:1b:23:97:a2:86:21:82:
                    c4
                Curve: SECG elliptic curve secp384r1 (aka NIST P-384)
    Signature Algorithm: X9.62 ECDSA signature with SHA-1
    Signature:
        30:81:87:02:42:01:b0:e4:6d:ca:34:d2:44:47:85:fd:
        5e:fe:ef:0f:a5:a3:e9:13:35:46:79:8f:12:5b:50:97:
        78:c0:3c:75:0f:d5:e8:0e:94:c8:cb:31:ee:7e:c1:92:
        13:7a:27:72:ff:d3:70:5a:55:94:b3:d8:59:2d:76:e1:
        79:8b:d3:b8:76:74:1f:02:41:17:5a:76:fd:15:0b:72:
        ec:8f:3a:9e:d6:81:71:08:41:b8:8b:a5:be:74:44:47:
        27:1f:3a:d6:40:f8:fc:fd:9a:90:2e:b6:37:77:71:1f:
        57:f2:db:cb:99:a0:7a:a8:9e:ad:0a:55:18:99:75:84:
        53:35:c4:c9:3f:c8:f3:90:90:8c
    Fingerprint (MD5):
        A0:64:11:01:F6:F1:08:BA:B2:3C:6C:5F:97:37:D5:AE
    Fingerprint (SHA1):
        B6:30:66:A3:6F:1F:5A:29:80:75:D9:89:47:8F:73:63:78:B2:4E:44

    Friendly Name: Alice-ec

tools.sh: #6855: Listing Alice's pk12 EC file (pk12util -l)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c RC2-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6856: Exporting with [RC2-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC
        Parameters:
            Salt:
                ac:ad:82:12:3e:e4:35:e1:ab:7b:4d:40:63:fc:b4:7b
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #6857: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6858: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c RC2-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6859: Exporting with [RC2-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC
        Parameters:
            Salt:
                93:cf:7d:62:44:7c:9f:40:47:05:22:b2:ba:e5:56:ab
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #6860: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6861: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c RC2-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6862: Exporting with [RC2-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC
        Parameters:
            Salt:
                de:27:24:c9:61:79:16:ca:b8:19:47:71:9a:b1:18:1b
            Iteration Count: 2000 (0x7d0)
tools.sh: #6863: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6864: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6865: Exporting with [DES-EDE3-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                c1:d5:9a:17:82:20:24:28:28:11:5b:ae:ee:a5:4f:f0
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #6866: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6867: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6868: Exporting with [DES-EDE3-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                dd:be:15:cc:8f:09:9a:50:0a:ce:85:ac:09:f9:9a:0e
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #6869: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6870: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6871: Exporting with [DES-EDE3-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                3f:6e:d6:b2:8e:c6:4d:8d:96:6e:35:2f:1a:ea:26:9d
            Iteration Count: 2000 (0x7d0)
tools.sh: #6872: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6873: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6874: Exporting with [AES-128-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        7f:9a:84:39:0b:9c:a5:92:87:ad:a8:91:ea:cc:99:64
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-128-CBC
                Args:
                    04:10:a5:2e:3f:a0:65:4a:63:ac:aa:90:7d:d8:6a:8a:
                    25:b4
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #6875: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6876: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6877: Exporting with [AES-128-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        46:fd:1e:d7:a2:5a:c9:35:c9:a6:c5:3a:9a:33:ec:d8
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-128-CBC
                Args:
                    04:10:d8:56:75:70:2e:31:f7:3e:16:c9:6f:ac:d1:0b:
                    81:c5
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #6878: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6879: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6880: Exporting with [AES-128-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        0d:72:bf:a7:99:d5:6c:67:ca:d6:2e:b6:6a:59:95:66
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-128-CBC
                Args:
                    04:10:f9:36:7f:1f:3f:78:47:b8:17:ae:45:f4:19:04:
                    61:98
tools.sh: #6881: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6882: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6883: Exporting with [AES-192-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        5d:d1:66:35:e2:b2:9d:27:cb:2a:31:8f:90:e5:fc:cd
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-192-CBC
                Args:
                    04:10:d5:2e:cc:3b:a3:f8:09:2d:f1:53:87:4d:ce:fe:
                    1f:f0
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #6884: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6885: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6886: Exporting with [AES-192-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        c7:64:5d:f8:b3:44:d5:a0:de:c3:d5:6d:2b:79:bb:27
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-192-CBC
                Args:
                    04:10:1a:de:ff:94:47:e0:aa:74:21:28:19:37:bd:05:
                    49:93
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #6887: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6888: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6889: Exporting with [AES-192-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        b9:07:70:99:f6:bb:0a:42:69:3b:75:3e:1e:3f:a5:9d
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-192-CBC
                Args:
                    04:10:c7:b9:25:fe:9f:47:36:8b:ce:84:1f:ae:cb:bf:
                    3f:30
tools.sh: #6890: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6891: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6892: Exporting with [AES-256-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        88:e1:32:26:4f:f1:22:2b:41:14:16:a9:a2:29:8f:e7
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-256-CBC
                Args:
                    04:10:62:85:b9:2d:dd:83:f7:74:05:49:53:73:cf:48:
                    f7:4a
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #6893: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6894: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6895: Exporting with [AES-256-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        06:ea:da:54:1d:57:1e:31:7e:81:7a:13:da:d3:c1:e4
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-256-CBC
                Args:
                    04:10:fa:15:59:70:40:8f:3b:92:ed:9c:43:95:3b:66:
                    b7:e3
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #6896: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6897: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6898: Exporting with [AES-256-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        31:0b:83:a6:b3:78:87:97:9f:bc:19:b8:63:b2:5d:6e
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-256-CBC
                Args:
                    04:10:be:2e:93:ec:9a:90:e1:4b:f3:38:66:15:11:f4:
                    4f:a1
tools.sh: #6899: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6900: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6901: Exporting with [CAMELLIA-128-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        dc:1a:43:70:68:ac:98:ec:4e:31:b6:a9:5c:71:27:1d
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-128-CBC
                Args:
                    04:10:5b:6e:d9:01:b7:e0:72:fb:76:53:be:82:f7:b5:
                    8c:20
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #6902: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6903: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6904: Exporting with [CAMELLIA-128-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        64:ff:01:e3:6d:1a:17:bf:72:e1:b9:af:2f:12:9b:dc
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-128-CBC
                Args:
                    04:10:3a:37:69:27:c2:cd:20:34:89:df:d5:9c:bf:5f:
                    c3:cc
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #6905: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6906: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6907: Exporting with [CAMELLIA-128-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        9d:58:30:b1:fd:75:a2:aa:e1:20:b1:35:b6:c3:79:c9
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-128-CBC
                Args:
                    04:10:99:97:9f:17:59:bb:c4:29:4c:81:23:62:a8:0b:
                    38:4a
tools.sh: #6908: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6909: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6910: Exporting with [CAMELLIA-192-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        32:b5:22:c9:d6:6f:20:e4:f9:0e:10:57:aa:a0:d0:b5
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-192-CBC
                Args:
                    04:10:7f:93:ba:02:a4:5e:c0:3e:c6:80:66:e5:60:2f:
                    5f:df
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #6911: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6912: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6913: Exporting with [CAMELLIA-192-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        b2:1c:87:57:2d:94:fc:60:d1:ec:4f:44:8c:33:e1:6e
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-192-CBC
                Args:
                    04:10:ef:f7:31:60:d5:f7:44:9d:96:2b:89:70:10:af:
                    a3:73
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #6914: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6915: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6916: Exporting with [CAMELLIA-192-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        8b:64:c7:e0:b0:fb:72:dd:37:e9:17:de:13:6e:65:4d
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-192-CBC
                Args:
                    04:10:b4:47:6d:12:1b:a5:5f:11:cc:96:af:f8:ee:56:
                    ac:32
tools.sh: #6917: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6918: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6919: Exporting with [CAMELLIA-256-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        21:49:0b:a5:91:3d:6b:b2:e7:62:eb:51:2d:80:35:96
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-256-CBC
                Args:
                    04:10:0b:c7:38:64:2c:7a:f1:18:38:e7:d8:6f:4c:5b:
                    d8:ff
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #6920: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6921: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6922: Exporting with [CAMELLIA-256-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        dc:f3:5c:9a:ef:80:b9:41:fa:01:bc:2b:92:98:f1:85
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-256-CBC
                Args:
                    04:10:82:d9:2b:8a:2b:2c:ad:bc:49:d9:d6:7a:32:be:
                    bb:f0
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #6923: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6924: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6925: Exporting with [CAMELLIA-256-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        d5:04:fc:1f:30:3f:22:10:c3:bb:9d:71:ef:6d:f5:1c
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-256-CBC
                Args:
                    04:10:98:83:6d:c7:21:51:a7:8e:e7:0a:db:1f:9a:fa:
                    91:d0
tools.sh: #6926: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6927: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6928: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
        Parameters:
            Salt:
                33:eb:a4:02:92:fa:70:e6:8e:91:34:95:54:2a:34:7d
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #6929: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6930: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6931: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
        Parameters:
            Salt:
                5f:d6:37:5c:24:04:c9:4e:ca:db:9f:e0:43:91:c7:e6
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #6932: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6933: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6934: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
        Parameters:
            Salt:
                a4:6d:39:e4:b2:5a:19:c8:16:b0:9f:3e:65:a6:47:d4
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #6935: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6936: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6937: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
        Parameters:
            Salt:
                fa:b2:cc:29:17:b4:a3:7e:b0:61:4c:ca:98:bb:aa:d5
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #6938: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6939: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6940: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
        Parameters:
            Salt:
                a0:87:db:d0:df:20:9f:3e:c5:2a:c5:b1:58:72:84:d5
            Iteration Count: 2000 (0x7d0)
tools.sh: #6941: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6942: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6943: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
        Parameters:
            Salt:
                28:00:eb:c1:9b:9b:f5:65:d5:c6:3a:89:69:66:d4:7a
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #6944: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6945: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6946: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
        Parameters:
            Salt:
                eb:91:bd:1e:dd:45:21:31:ef:95:82:f2:08:9a:3b:b7
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #6947: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6948: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6949: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
        Parameters:
            Salt:
                3f:3d:78:22:91:f8:93:c6:e8:a8:ce:7e:40:e7:c7:be
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #6950: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6951: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6952: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
        Parameters:
            Salt:
                1f:38:1e:0b:2f:b1:25:05:13:8f:9f:15:e3:c3:cf:c8
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #6953: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6954: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6955: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
        Parameters:
            Salt:
                ec:da:76:73:85:f3:f6:a6:f4:98:8d:4b:d6:b4:6b:45
            Iteration Count: 2000 (0x7d0)
tools.sh: #6956: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6957: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6958: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
        Parameters:
            Salt:
                68:54:40:92:dd:cd:64:97:e6:9e:af:ba:1d:6b:3c:d1
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #6959: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6960: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6961: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
        Parameters:
            Salt:
                f2:d6:37:ba:79:0a:1a:26:8e:65:c8:ca:c5:53:4f:28
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #6962: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6963: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6964: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
        Parameters:
            Salt:
                b4:70:41:95:18:3c:bc:2e:a0:6c:13:6f:fa:9c:c0:5e
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #6965: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6966: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6967: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
        Parameters:
            Salt:
                67:d5:81:76:9d:2d:5e:2a:8c:ec:b0:53:b6:11:c2:72
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #6968: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6969: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6970: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
        Parameters:
            Salt:
                b8:66:d4:81:52:ea:cb:30:0a:dd:24:46:17:9e:9e:1b
            Iteration Count: 2000 (0x7d0)
tools.sh: #6971: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6972: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6973: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                28:48:8e:d7:37:1b:13:d7:80:b1:8c:95:6a:b5:ae:dd
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #6974: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6975: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6976: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                56:9c:77:80:8e:19:51:99:af:89:7a:a9:78:6b:8e:dd
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #6977: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6978: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6979: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                a0:e4:e4:bd:58:69:af:87:2a:04:f3:f6:80:e2:f6:c2
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #6980: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6981: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6982: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                d6:18:39:10:71:30:e1:c4:ba:7d:5c:90:34:92:f0:b7
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #6983: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6984: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [default:null]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6985: Exporting with [default:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                c3:c6:7d:60:86:16:29:15:ef:df:cb:2a:a0:9b:fe:52
            Iteration Count: 2000 (0x7d0)
tools.sh: #6986: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6987: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6988: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                ed:dd:44:d3:a2:52:19:cf:3b:cb:98:f2:05:75:6f:f9
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #6989: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6990: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6991: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                73:96:77:04:7e:87:9f:c3:ab:9c:c0:4b:04:08:79:71
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #6992: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6993: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6994: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                ac:64:0f:65:1a:e9:2c:e7:05:ca:e5:af:8e:2d:39:ff
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #6995: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6996: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6997: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                22:9f:82:fd:a8:19:e6:40:38:2b:46:3e:7d:0a:74:57
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #6998: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6999: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #7000: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                1d:79:54:fa:19:b7:cb:8b:18:78:96:2c:18:12:37:d7
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #7001: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #7002: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #7003: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                0b:e2:14:84:f1:99:9c:1a:73:c0:0e:e5:e1:3e:7d:84
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #7004: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #7005: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #7006: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                4a:9c:b4:8a:f4:79:20:4d:1f:8b:90:58:af:5a:b5:2a
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #7007: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #7008: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #7009: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                59:8c:7c:97:32:7f:31:dc:38:e0:00:7e:f8:f4:22:0e
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #7010: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #7011: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #7012: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                0c:69:5e:fd:a2:ab:9a:8d:7e:48:22:10:72:a7:0b:ff
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #7013: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #7014: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #7015: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                57:32:df:b5:1c:30:f6:52:43:0c:75:c7:d6:e8:b9:ad
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:49 2012
            Not After : Tue Nov 28 15:56:49 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:3d:f8:9a:a9:e5:f1:1e:3f:c6:54:63:42:47:c3:41:
                    7e:80:20:bf:a4:78:4c:55:a3:be:9d:02:71:e5:55:bc:
                    7b:b1:39:05:67:83:ed:1b:31:76:f7:ac:6a:9e:d8:f0:
                    fd:5b:d4:71:b0:8c:4a:ca:29:5b:14:4f:05:c1:14:e0:
                    f4:36:e9:2e:e9:81:62:7d:0b:24:12:f9:e5:7d:e4:08:
                    d3:e9:5b:7c:16:17:13:63:cc:63:c8:82:6a:f5:e0:fa:
                    a1:2c:95:15:27:76:cc:a0:bb:7e:f4:ff:52:ac:f0:53:
                    9f:e4:e3:a5:4f:97:20:16:f3:76:9e:bd:a0:b9:99:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:9c:47:67:77:78:a8:e7:6e:f7:6d:c3:c1:90:55:15:
        56:9d:5c:31:58:9e:f9:8f:39:6b:e5:21:57:5c:95:ab:
        3f:c4:a7:e2:3f:38:5c:75:7b:a8:e5:41:b8:fd:2f:8a:
        a2:1d:7d:c8:b1:1e:24:95:97:82:b0:36:9d:c7:34:8a:
        79:29:1c:28:a7:97:16:22:47:c7:1d:57:66:b7:30:28:
        3b:0b:e5:7e:13:b4:3a:e7:7f:93:fc:f5:28:53:98:f6:
        e5:c0:1d:65:7a:f5:a9:28:4d:0c:17:69:2d:58:f0:ed:
        58:c8:71:63:97:79:8a:f5:1b:f3:23:51:0f:09:2c:2d
    Fingerprint (MD5):
        DD:3F:ED:F9:9D:2E:39:1D:F7:BC:80:BD:FE:96:BC:DE
    Fingerprint (SHA1):
        A5:54:63:D0:0E:73:B0:16:E8:B7:CC:8A:E8:24:0D:D2:3B:83:E3:B5

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:56:56 2012
            Not After : Tue Nov 28 15:56:56 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a7:8c:f7:b8:26:4a:44:76:a2:dc:1a:dc:a9:61:5d:09:
                    66:de:8c:2b:eb:a2:50:96:0b:cf:71:e8:c2:e4:a3:e1:
                    0b:7e:f9:26:5b:7f:82:c6:18:74:ef:97:de:cf:97:8e:
                    02:dc:3b:11:1d:3f:81:6b:fe:f6:95:48:e2:65:58:60:
                    8c:8f:21:ee:c8:df:f8:bc:51:5d:e4:e5:21:2d:38:37:
                    0b:16:c4:ff:1f:bb:9a:a4:40:11:4c:5c:e4:d2:29:4a:
                    43:5f:9f:a6:8f:1d:36:fe:c8:c4:3d:a0:ae:0d:47:05:
                    fb:93:27:d1:2e:73:98:0c:3e:da:be:60:bb:e6:4d:13
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:0d:52:5f:a7:67:0e:3f:50:21:51:fc:87:63:10:06:
        eb:ff:63:c2:08:e3:d2:e0:f7:4f:22:42:71:8e:3c:5a:
        02:0e:cc:38:f5:7c:98:8a:65:6d:71:6e:90:33:1f:ee:
        15:e4:fc:f8:90:a2:88:d8:13:f4:be:1b:28:20:6c:58:
        ad:e6:29:00:fb:bc:9e:f6:9b:26:ee:08:95:fd:e7:dd:
        67:70:40:28:ec:0d:4a:91:64:08:2d:2a:23:7e:5b:36:
        9d:b6:28:58:1c:65:b8:e7:3e:8c:7a:4b:5a:b2:4b:d9:
        9d:8d:4e:b3:dd:c3:18:e2:95:4b:d4:5d:98:f1:2f:f8
    Fingerprint (MD5):
        04:C5:D3:29:39:45:EE:D0:A4:58:D4:E4:1B:76:30:4B
    Fingerprint (SHA1):
        47:4F:83:69:B9:B3:C5:77:EB:B8:6D:A5:60:9D:93:1E:F8:CA:67:8B

    Friendly Name: Alice

tools.sh: #7016: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #7017: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c null
pk12util: Algorithm: "null": security library: invalid algorithm.
tools.sh: #7018: Exporting with [null:default] (pk12util -o)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #7019: Exporting with [default:null] (pk12util -o)  - PASSED
tools.sh: Create objsign cert -------------------------------
signtool -G "objectsigner" -d ../tools/signdir -p "nss"

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit the browser before continuing this operation. Enter 
"y" to continue, or anything else to abort: 

Enter certificate information.  All fields are optional. Acceptable
characters are numbers, letters, spaces, and apostrophes.
certificate common name: organization: organization unit: state or province: country (must be exactly 2 characters): username: email address: generated public/private key pair
certificate request generated
certificate has been signed
certificate "objsigner" added to database
Exported certificate to x509.raw and x509.cacert.
tools.sh: #7020: Create objsign cert (signtool -G)  - PASSED
tools.sh: Signing a jar of files ----------------------------
signtool -Z nojs.jar -d ../tools/signdir -p "nss" -k objsigner \
         ../tools/html
Generating ../tools/html/META-INF/manifest.mf file..
--> signjs.html
adding ../tools/html/signjs.html to nojs.jar...(deflated 28%)
--> sign.html
adding ../tools/html/sign.html to nojs.jar...(deflated 26%)
Generating zigbert.sf file..
adding ../tools/html/META-INF/manifest.mf to nojs.jar...(deflated 30%)
adding ../tools/html/META-INF/zigbert.sf to nojs.jar...(deflated 36%)
adding ../tools/html/META-INF/zigbert.rsa to nojs.jar...(deflated 32%)
tree "../tools/html" signed successfully
tools.sh: #7021: Signing a jar of files (signtool -Z)  - PASSED
tools.sh: Listing signed files in jar ----------------------
signtool -v nojs.jar -d ../tools/signdir -p nss -k objsigner
archive "nojs.jar" has passed crypto verification.
found a MF master manifest file: META-INF/manifest.mf
found a SF signature manifest file: META-INF/zigbert.sf
  md5 digest on global metainfo: match
  sha digest on global metainfo: match
found a RSA signature file: META-INF/zigbert.rsa

          status   path
    ------------   -------------------
        verified   signjs.html
        verified   sign.html
tools.sh: #7022: Listing signed files in jar (signtool -v)  - PASSED
tools.sh: Show who signed jar ------------------------------
signtool -w nojs.jar -d ../tools/signdir

Signer information:

nickname: objsigner
subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org
issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org
tools.sh: #7023: Show who signed jar (signtool -w)  - PASSED
tools.sh: Signing a xpi of files ----------------------------
signtool -Z nojs.xpi -X -d ../tools/signdir -p "nss" -k objsigner \
         ../tools/html
Generating ../tools/html/META-INF/manifest.mf file..
--> signjs.html
--> sign.html
Generating zigbert.sf file..
Creating XPI Compatible Archive 
adding ../tools/html/META-INF/zigbert.rsa to nojs.xpi...(deflated 32%)
--> signjs.html
adding ../tools/html/signjs.html to nojs.xpi...(deflated 28%)
--> sign.html
adding ../tools/html/sign.html to nojs.xpi...(deflated 26%)
adding ../tools/html/META-INF/manifest.mf to nojs.xpi...(deflated 30%)
adding ../tools/html/META-INF/zigbert.sf to nojs.xpi...(deflated 36%)
tree "../tools/html" signed successfully
tools.sh: #7024: Signing a xpi of files (signtool -Z -X)  - PASSED
tools.sh: Listing signed files in xpi ----------------------
signtool -v nojs.xpi -d ../tools/signdir -p nss -k objsigner
archive "nojs.xpi" has passed crypto verification.
found a RSA signature file: META-INF/zigbert.rsa
found a MF master manifest file: META-INF/manifest.mf
found a SF signature manifest file: META-INF/zigbert.sf
  md5 digest on global metainfo: match
  sha digest on global metainfo: match

          status   path
    ------------   -------------------
        verified   signjs.html
        verified   sign.html
tools.sh: #7025: Listing signed files in xpi (signtool -v)  - PASSED
tools.sh: Show who signed xpi ------------------------------
signtool -w nojs.xpi -d ../tools/signdir

Signer information:

nickname: objsigner
subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org
issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org
tools.sh: #7026: Show who signed xpi (signtool -w)  - PASSED
TIMESTAMP tools END: Wed Nov 28 11:13:40 EST 2012
Running tests for fips
TIMESTAMP fips BEGIN: Wed Nov 28 11:13:40 EST 2012
fips.sh: FIPS 140 Compliance Tests ===============================
fips.sh: Verify this module is in FIPS mode  -----------------
modutil -dbdir ../fips -list

Listing of PKCS #11 Modules
-----------------------------------------------------------
  1. NSS Internal FIPS PKCS #11 Module
 slots: 1 slot attached
status: loaded

 slot: NSS FIPS 140-2 User Private Key Services
token: NSS FIPS 140-2 Certificate DB

  2. RootCerts
library name: /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so
 slots: 1 slot attached
status: loaded

 slot: NSS Builtin Objects
token: Builtin Object Token
-----------------------------------------------------------
FIPS mode enabled.
fips.sh: #7027: Verify this module is in FIPS mode (modutil -chkfips true) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

FIPS_PUB_140_Test_Certificate                                Cu,Cu,Cu
fips.sh: #7028: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: List the FIPS module keys -------------------------
certutil -d ../fips -K -f ../tests.fipspw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
< 0> dsa      530572cc3086b9ab5d1dc21f8130d15307813a06   FIPS_PUB_140_Test_Certificate
fips.sh: #7029: List the FIPS module keys (certutil -K) . - PASSED
fips.sh: Attempt to list FIPS module keys with incorrect password
certutil -d ../fips -K -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/tests.fipsbadpw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
Incorrect password/PIN entered.
certutil: could not authenticate to token NSS FIPS 140-2 Certificate DB.: The security password entered is incorrect.
fips.sh: #7030: Attempt to list FIPS module keys with incorrect password (certutil -K) . - PASSED
certutil -K returned 255
fips.sh: Validate the certificate --------------------------
certutil -d ../fips -V -n FIPS_PUB_140_Test_Certificate -u SR -e -f ../tests.fipspw
certutil: certificate is valid
fips.sh: #7031: Validate the certificate (certutil -V -e) . - PASSED
fips.sh: Export the certificate and key as a PKCS#12 file --
pk12util -d ../fips -o fips140.p12 -n FIPS_PUB_140_Test_Certificate -w ../tests.fipsp12pw -k ../tests.fipspw
pk12util: PKCS12 EXPORT SUCCESSFUL
fips.sh: #7032: Export the certificate and key as a PKCS#12 file (pk12util -o) . - PASSED
fips.sh: Export the certificate as a DER-encoded file ------
certutil -d ../fips -L -n FIPS_PUB_140_Test_Certificate -r -o fips140.crt
fips.sh: #7033: Export the certificate as a DER (certutil -L -r) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

FIPS_PUB_140_Test_Certificate                                Cu,Cu,Cu
fips.sh: #7034: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: Delete the certificate and key from the FIPS module
certutil -d ../fips -F -n FIPS_PUB_140_Test_Certificate -f ../tests.fipspw
fips.sh: #7035: Delete the certificate and key from the FIPS module (certutil -F) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI
fips.sh: #7036: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: List the FIPS module keys.
certutil -d ../fips -K -f ../tests.fipspw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
certutil: no keys found
fips.sh: #7037: List the FIPS module keys (certutil -K) . - PASSED
fips.sh: Import the certificate and key from the PKCS#12 file
pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw
pk12util: PKCS12 IMPORT SUCCESSFUL
fips.sh: #7038: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

FIPS_PUB_140_Test_Certificate                                u,u,u
fips.sh: #7039: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: List the FIPS module keys --------------------------
certutil -d ../fips -K -f ../tests.fipspw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
< 0> dsa      530572cc3086b9ab5d1dc21f8130d15307813a06   FIPS_PUB_140_Test_Certificate
fips.sh: #7040: List the FIPS module keys (certutil -K) . - PASSED
fips.sh: Delete the certificate from the FIPS module
certutil -d ../fips -D -n FIPS_PUB_140_Test_Certificate
fips.sh: #7041: Delete the certificate from the FIPS module (certutil -D) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI
fips.sh: #7042: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: Import the certificate and key from the PKCS#12 file
pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw
pk12util: PKCS12 IMPORT SUCCESSFUL
fips.sh: #7043: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

FIPS_PUB_140_Test_Certificate                                u,u,u
fips.sh: #7044: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: List the FIPS module keys --------------------------
certutil -d ../fips -K -f ../tests.fipspw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
< 0> dsa      530572cc3086b9ab5d1dc21f8130d15307813a06   FIPS_PUB_140_Test_Certificate
fips.sh: #7045: List the FIPS module keys (certutil -K) . - PASSED
fips.sh: Run PK11MODE in FIPSMODE  -----------------
pk11mode -d ../fips -p fips- -f ../tests.fipspw
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
**** Total number of TESTS ran in FIPS MODE is 106. ****
**** ALL TESTS PASSED ****
fips.sh: #7046: Run PK11MODE in FIPS mode (pk11mode) . - PASSED
fips.sh: Run PK11MODE in Non FIPSMODE  -----------------
pk11mode -d ../fips -p nonfips- -f ../tests.fipspw -n
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
**** Total number of TESTS ran in NON FIPS MODE is 104. ****
**** ALL TESTS PASSED ****
fips.sh: #7047: Run PK11MODE in Non FIPS mode (pk11mode -n) . - PASSED
mkdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
mkdir: cannot create directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle': File exists
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libcertdb.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libcerthi.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libcrmf.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libcryptohi.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libdbm.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libfreebl3.chk /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libfreebl3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libfreebl.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libjar.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnspr4.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnspr4.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnss3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnss.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssb.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckfw.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssdbm3.chk /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssdbm3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssdbm.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssdev.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnsspki.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnsssysinit.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnsssysinit.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssutil3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssutil.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkcs12.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkcs7.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixparams.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixpki.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixresults.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixstore.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixtop.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixutil.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libplc4.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libplc4.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libplds4.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libplds4.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsmime3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsmime.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsoftokn3.chk /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsoftokn3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsoftokn.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsqlite3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsqlite.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libssl3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libssl.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
fips.sh: Detect mangled softoken--------------------------
mangling /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle/libsoftokn3.so
mangle -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle/libsoftokn3.so -o -8 -b 5
Changing byte 0x0004e9cd (321997): from 5f (95) to 7f (127)
LD_LIBRARY_PATH=/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle dbtest -r -d ../fips
fips.sh: #7048: Init NSS with a corrupted library (dbtest -r) . - PASSED
fips.sh done
TIMESTAMP fips END: Wed Nov 28 11:14:07 EST 2012
Running tests for crmf
TIMESTAMP crmf BEGIN: Wed Nov 28 11:14:07 EST 2012
crmf.sh: CRMF/CMMF Tests ===============================
crmf.sh: CRMF/CMMF Tests ------------------------------
crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss crmf decode

crmftest v1.0
Generating CRMF request
Decoding CRMF request
crmftest: Processing cert request 0
crmftest: Processing cert request 1
Exiting successfully!!!

crmf.sh: #7049: CRMF test . - PASSED
crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss cmmf

crmftest v1.0
Doing CMMF Stuff
Exiting successfully!!!

crmf.sh: #7050: CMMF test . - PASSED
TIMESTAMP crmf END: Wed Nov 28 11:14:07 EST 2012
Running tests for smime
TIMESTAMP smime BEGIN: Wed Nov 28 11:14:07 EST 2012
smime.sh: S/MIME Tests with ECC ===============================
smime.sh: Signing Detached Message {SHA1} ------------------
cmsutil -S -T -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA1
smime.sh: #7051: Create Detached Signature Alice (SHA1) . - PASSED
cmsutil -D -i alice.dsig.SHA1 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #7052: Verifying Alice's Detached Signature (SHA1) . - PASSED
smime.sh: Signing Attached Message (SHA1) ------------------
cmsutil -S -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA1
smime.sh: #7053: Create Attached Signature Alice (SHA1) . - PASSED
cmsutil -D -i alice.sig.SHA1 -d ../bobdir -o alice.data.SHA1
smime.sh: #7054: Decode Alice's Attached Signature (SHA1) . - PASSED
diff alice.txt alice.data.SHA1
smime.sh: #7055: Compare Attached Signed Data and Original (SHA1) . - PASSED
smime.sh: Signing Detached Message ECDSA w/ {SHA1} ------------------
cmsutil -S -T -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA1
smime.sh: #7056: Create Detached Signature Alice (ECDSA w/ SHA1) . - PASSED
cmsutil -D -i alice-ec.dsig.SHA1 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #7057: Verifying Alice's Detached Signature (ECDSA w/ SHA1) . - PASSED
smime.sh: Signing Attached Message (ECDSA w/ SHA1) ------------------
cmsutil -S -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA1
smime.sh: #7058: Create Attached Signature Alice (ECDSA w/ SHA1) . - PASSED
cmsutil -D -i alice-ec.sig.SHA1 -d ../bobdir -o alice-ec.data.SHA1
smime.sh: #7059: Decode Alice's Attached Signature (ECDSA w/ SHA1) . - PASSED
diff alice.txt alice-ec.data.SHA1
smime.sh: #7060: Compare Attached Signed Data and Original (ECDSA w/ SHA1) . - PASSED
smime.sh: Signing Detached Message {SHA256} ------------------
cmsutil -S -T -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA256
smime.sh: #7061: Create Detached Signature Alice (SHA256) . - PASSED
cmsutil -D -i alice.dsig.SHA256 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #7062: Verifying Alice's Detached Signature (SHA256) . - PASSED
smime.sh: Signing Attached Message (SHA256) ------------------
cmsutil -S -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA256
smime.sh: #7063: Create Attached Signature Alice (SHA256) . - PASSED
cmsutil -D -i alice.sig.SHA256 -d ../bobdir -o alice.data.SHA256
smime.sh: #7064: Decode Alice's Attached Signature (SHA256) . - PASSED
diff alice.txt alice.data.SHA256
smime.sh: #7065: Compare Attached Signed Data and Original (SHA256) . - PASSED
smime.sh: Signing Detached Message ECDSA w/ {SHA256} ------------------
cmsutil -S -T -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA256
smime.sh: #7066: Create Detached Signature Alice (ECDSA w/ SHA256) . - PASSED
cmsutil -D -i alice-ec.dsig.SHA256 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #7067: Verifying Alice's Detached Signature (ECDSA w/ SHA256) . - PASSED
smime.sh: Signing Attached Message (ECDSA w/ SHA256) ------------------
cmsutil -S -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA256
smime.sh: #7068: Create Attached Signature Alice (ECDSA w/ SHA256) . - PASSED
cmsutil -D -i alice-ec.sig.SHA256 -d ../bobdir -o alice-ec.data.SHA256
smime.sh: #7069: Decode Alice's Attached Signature (ECDSA w/ SHA256) . - PASSED
diff alice.txt alice-ec.data.SHA256
smime.sh: #7070: Compare Attached Signed Data and Original (ECDSA w/ SHA256) . - PASSED
smime.sh: Signing Detached Message {SHA384} ------------------
cmsutil -S -T -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA384
smime.sh: #7071: Create Detached Signature Alice (SHA384) . - PASSED
cmsutil -D -i alice.dsig.SHA384 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #7072: Verifying Alice's Detached Signature (SHA384) . - PASSED
smime.sh: Signing Attached Message (SHA384) ------------------
cmsutil -S -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA384
smime.sh: #7073: Create Attached Signature Alice (SHA384) . - PASSED
cmsutil -D -i alice.sig.SHA384 -d ../bobdir -o alice.data.SHA384
smime.sh: #7074: Decode Alice's Attached Signature (SHA384) . - PASSED
diff alice.txt alice.data.SHA384
smime.sh: #7075: Compare Attached Signed Data and Original (SHA384) . - PASSED
smime.sh: Signing Detached Message ECDSA w/ {SHA384} ------------------
cmsutil -S -T -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA384
smime.sh: #7076: Create Detached Signature Alice (ECDSA w/ SHA384) . - PASSED
cmsutil -D -i alice-ec.dsig.SHA384 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #7077: Verifying Alice's Detached Signature (ECDSA w/ SHA384) . - PASSED
smime.sh: Signing Attached Message (ECDSA w/ SHA384) ------------------
cmsutil -S -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA384
smime.sh: #7078: Create Attached Signature Alice (ECDSA w/ SHA384) . - PASSED
cmsutil -D -i alice-ec.sig.SHA384 -d ../bobdir -o alice-ec.data.SHA384
smime.sh: #7079: Decode Alice's Attached Signature (ECDSA w/ SHA384) . - PASSED
diff alice.txt alice-ec.data.SHA384
smime.sh: #7080: Compare Attached Signed Data and Original (ECDSA w/ SHA384) . - PASSED
smime.sh: Signing Detached Message {SHA512} ------------------
cmsutil -S -T -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA512
smime.sh: #7081: Create Detached Signature Alice (SHA512) . - PASSED
cmsutil -D -i alice.dsig.SHA512 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #7082: Verifying Alice's Detached Signature (SHA512) . - PASSED
smime.sh: Signing Attached Message (SHA512) ------------------
cmsutil -S -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA512
smime.sh: #7083: Create Attached Signature Alice (SHA512) . - PASSED
cmsutil -D -i alice.sig.SHA512 -d ../bobdir -o alice.data.SHA512
smime.sh: #7084: Decode Alice's Attached Signature (SHA512) . - PASSED
diff alice.txt alice.data.SHA512
smime.sh: #7085: Compare Attached Signed Data and Original (SHA512) . - PASSED
smime.sh: Signing Detached Message ECDSA w/ {SHA512} ------------------
cmsutil -S -T -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA512
smime.sh: #7086: Create Detached Signature Alice (ECDSA w/ SHA512) . - PASSED
cmsutil -D -i alice-ec.dsig.SHA512 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #7087: Verifying Alice's Detached Signature (ECDSA w/ SHA512) . - PASSED
smime.sh: Signing Attached Message (ECDSA w/ SHA512) ------------------
cmsutil -S -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA512
smime.sh: #7088: Create Attached Signature Alice (ECDSA w/ SHA512) . - PASSED
cmsutil -D -i alice-ec.sig.SHA512 -d ../bobdir -o alice-ec.data.SHA512
smime.sh: #7089: Decode Alice's Attached Signature (ECDSA w/ SHA512) . - PASSED
diff alice.txt alice-ec.data.SHA512
smime.sh: #7090: Compare Attached Signed Data and Original (ECDSA w/ SHA512) . - PASSED
smime.sh: Enveloped Data Tests ------------------------------
cmsutil -E -r bob@bogus.com -i alice.txt -d ../alicedir -p nss \
        -o alice.env
smime.sh: #7091: Create Enveloped Data Alice . - PASSED
cmsutil -D -i alice.env -d ../bobdir -p nss -o alice.data1
smime.sh: #7092: Decode Enveloped Data Alice . - PASSED
diff alice.txt alice.data1
smime.sh: #7093: Compare Decoded Enveloped Data and Original . - PASSED
smime.sh: Testing multiple recipients ------------------------------
cmsutil -E -i alice.txt -d ../alicedir -o alicecc.env \
        -r bob@bogus.com,dave@bogus.com
smime.sh: #7094: Create Multiple Recipients Enveloped Data Alice . - PASSED
smime.sh: Testing multiple email addrs ------------------------------
cmsutil -E -i alice.txt -d ../alicedir -o aliceve.env \
        -r eve@bogus.net
smime.sh: #7095: Encrypt to a Multiple Email cert . - PASSED
cmsutil -D -i alicecc.env -d ../bobdir -p nss -o alice.data2
smime.sh: #7096: Decode Multiple Recipients Enveloped Data Alice by Bob . - PASSED
cmsutil -D -i alicecc.env -d ../dave -p nss -o alice.data3
smime.sh: #7097: Decode Multiple Recipients Enveloped Data Alice by Dave . - PASSED
cmsutil -D -i aliceve.env -d ../eve -p nss -o alice.data4
smime.sh: #7098: Decrypt with a Multiple Email cert . - PASSED
smime.sh: #7099: Compare Decoded Mult. Recipients Enveloped Data Alice/Bob . - PASSED
smime.sh: #7100: Compare Decoded Mult. Recipients Enveloped Data Alice/Dave . - PASSED
smime.sh: #7101: Compare Decoded with Multiple Email cert . - PASSED
smime.sh: Sending CERTS-ONLY Message ------------------------------
cmsutil -O -r "Alice,bob@bogus.com,dave@bogus.com" \
        -d ../alicedir > co.der
smime.sh: #7102: Create Certs-Only Alice . - PASSED
cmsutil -D -i co.der -d ../bobdir
smime.sh: #7103: Verify Certs-Only by CA . - PASSED
smime.sh: Encrypted-Data Message ---------------------------------
cmsutil -C -i alice.txt -e alicehello.env -d ../alicedir \
        -r "bob@bogus.com" > alice.enc
smime.sh: #7104: Create Encrypted-Data . - PASSED
cmsutil -D -i alice.enc -d ../bobdir -e alicehello.env -p nss \
        -o alice.data2
smime.sh: #7105: Decode Encrypted-Data . - PASSED
smime.sh: #7106: Compare Decoded and Original Data . - PASSED
smime.sh: p7 util Data Tests ------------------------------
p7env -d ../alicedir -r Alice -i alice.txt -o alice_p7.env
smime.sh: #7107: Creating envelope for user Alice . - PASSED
p7content -d ../alicedir -i alice.env -o alice_p7.data
smime.sh: #7108: Verifying file delivered to user Alice . - PASSED
diff alice.txt alice_p7.data.sed
smime.sh: #7109: Compare Decoded Enveloped Data and Original . - PASSED
p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e
smime.sh: #7110: Signing file for user Alice . - PASSED
p7verify -d ../alicedir -c alice.txt -s alice.sig
Signature is valid.
smime.sh: #7111: Verifying file delivered to user Alice . - PASSED
TIMESTAMP smime END: Wed Nov 28 11:14:14 EST 2012
Running tests for ssl
TIMESTAMP ssl BEGIN: Wed Nov 28 11:14:14 EST 2012
ssl.sh: SSL tests ===============================
ssl.sh: CRL SSL Client Tests   - with ECC ===============================
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:14:14 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:14 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 22256 >/dev/null 2>/dev/null
selfserv with PID 22256 found at Wed Nov 28 11:14:15 EST 2012
selfserv with PID 22256 started at Wed Nov 28 11:14:15 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7112: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 22256 at Wed Nov 28 11:14:15 EST 2012
kill -USR1 22256
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 22256 killed at Wed Nov 28 11:14:15 EST 2012
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:14:15 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:15 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 22314 >/dev/null 2>/dev/null
selfserv with PID 22314 found at Wed Nov 28 11:14:15 EST 2012
selfserv with PID 22314 started at Wed Nov 28 11:14:15 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7113: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 22314 at Wed Nov 28 11:14:15 EST 2012
kill -USR1 22314
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 22314 killed at Wed Nov 28 11:14:15 EST 2012
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:14:15 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:15 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 22372 >/dev/null 2>/dev/null
selfserv with PID 22372 found at Wed Nov 28 11:14:15 EST 2012
selfserv with PID 22372 started at Wed Nov 28 11:14:15 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7114: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 22372 at Wed Nov 28 11:14:15 EST 2012
kill -USR1 22372
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 22372 killed at Wed Nov 28 11:14:15 EST 2012
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Wed Nov 28 11:14:15 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:15 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 22442 >/dev/null 2>/dev/null
selfserv with PID 22442 found at Wed Nov 28 11:14:15 EST 2012
selfserv with PID 22442 started at Wed Nov 28 11:14:15 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7115: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 22442 at Wed Nov 28 11:14:16 EST 2012
kill -USR1 22442
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 22442 killed at Wed Nov 28 11:14:16 EST 2012
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Wed Nov 28 11:14:16 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:16 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 22500 >/dev/null 2>/dev/null
selfserv with PID 22500 found at Wed Nov 28 11:14:16 EST 2012
selfserv with PID 22500 started at Wed Nov 28 11:14:16 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7116: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 22500 at Wed Nov 28 11:14:16 EST 2012
kill -USR1 22500
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 22500 killed at Wed Nov 28 11:14:16 EST 2012
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Wed Nov 28 11:14:16 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:16 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 22558 >/dev/null 2>/dev/null
selfserv with PID 22558 found at Wed Nov 28 11:14:16 EST 2012
selfserv with PID 22558 started at Wed Nov 28 11:14:16 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7117: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 22558 at Wed Nov 28 11:14:16 EST 2012
kill -USR1 22558
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 22558 killed at Wed Nov 28 11:14:16 EST 2012
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Wed Nov 28 11:14:16 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:16 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 22628 >/dev/null 2>/dev/null
selfserv with PID 22628 found at Wed Nov 28 11:14:16 EST 2012
selfserv with PID 22628 started at Wed Nov 28 11:14:16 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #7118: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 22628 at Wed Nov 28 11:14:17 EST 2012
kill -USR1 22628
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 22628 killed at Wed Nov 28 11:14:17 EST 2012
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Wed Nov 28 11:14:17 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:17 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 22686 >/dev/null 2>/dev/null
selfserv with PID 22686 found at Wed Nov 28 11:14:17 EST 2012
selfserv with PID 22686 started at Wed Nov 28 11:14:17 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7119: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 22686 at Wed Nov 28 11:14:17 EST 2012
kill -USR1 22686
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 22686 killed at Wed Nov 28 11:14:17 EST 2012
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Wed Nov 28 11:14:17 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:17 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 22744 >/dev/null 2>/dev/null
selfserv with PID 22744 found at Wed Nov 28 11:14:17 EST 2012
selfserv with PID 22744 started at Wed Nov 28 11:14:17 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #7120: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 22744 at Wed Nov 28 11:14:17 EST 2012
kill -USR1 22744
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 22744 killed at Wed Nov 28 11:14:17 EST 2012
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:14:17 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:17 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 22814 >/dev/null 2>/dev/null
selfserv with PID 22814 found at Wed Nov 28 11:14:17 EST 2012
selfserv with PID 22814 started at Wed Nov 28 11:14:17 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #7121: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 22814 at Wed Nov 28 11:14:18 EST 2012
kill -USR1 22814
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 22814 killed at Wed Nov 28 11:14:18 EST 2012
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:14:18 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:18 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 22872 >/dev/null 2>/dev/null
selfserv with PID 22872 found at Wed Nov 28 11:14:18 EST 2012
selfserv with PID 22872 started at Wed Nov 28 11:14:18 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #7122: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 22872 at Wed Nov 28 11:14:18 EST 2012
kill -USR1 22872
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 22872 killed at Wed Nov 28 11:14:18 EST 2012
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:14:18 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:18 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 22930 >/dev/null 2>/dev/null
selfserv with PID 22930 found at Wed Nov 28 11:14:18 EST 2012
selfserv with PID 22930 started at Wed Nov 28 11:14:18 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #7123: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 22930 at Wed Nov 28 11:14:18 EST 2012
kill -USR1 22930
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 22930 killed at Wed Nov 28 11:14:18 EST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Wed Nov 28 11:14:18 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:18 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23000 >/dev/null 2>/dev/null
selfserv with PID 23000 found at Wed Nov 28 11:14:18 EST 2012
selfserv with PID 23000 started at Wed Nov 28 11:14:18 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #7124: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 23000 at Wed Nov 28 11:14:19 EST 2012
kill -USR1 23000
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23000 killed at Wed Nov 28 11:14:19 EST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Wed Nov 28 11:14:19 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:19 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23058 >/dev/null 2>/dev/null
selfserv with PID 23058 found at Wed Nov 28 11:14:19 EST 2012
selfserv with PID 23058 started at Wed Nov 28 11:14:19 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #7125: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 23058 at Wed Nov 28 11:14:19 EST 2012
kill -USR1 23058
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23058 killed at Wed Nov 28 11:14:19 EST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Wed Nov 28 11:14:19 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:19 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23116 >/dev/null 2>/dev/null
selfserv with PID 23116 found at Wed Nov 28 11:14:19 EST 2012
selfserv with PID 23116 started at Wed Nov 28 11:14:19 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #7126: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 23116 at Wed Nov 28 11:14:19 EST 2012
kill -USR1 23116
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23116 killed at Wed Nov 28 11:14:19 EST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Wed Nov 28 11:14:19 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:19 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23186 >/dev/null 2>/dev/null
selfserv with PID 23186 found at Wed Nov 28 11:14:19 EST 2012
selfserv with PID 23186 started at Wed Nov 28 11:14:19 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #7127: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 23186 at Wed Nov 28 11:14:20 EST 2012
kill -USR1 23186
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23186 killed at Wed Nov 28 11:14:20 EST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Wed Nov 28 11:14:20 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:20 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23244 >/dev/null 2>/dev/null
selfserv with PID 23244 found at Wed Nov 28 11:14:20 EST 2012
selfserv with PID 23244 started at Wed Nov 28 11:14:20 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7128: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23244 at Wed Nov 28 11:14:20 EST 2012
kill -USR1 23244
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23244 killed at Wed Nov 28 11:14:20 EST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Wed Nov 28 11:14:20 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:20 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23302 >/dev/null 2>/dev/null
selfserv with PID 23302 found at Wed Nov 28 11:14:20 EST 2012
selfserv with PID 23302 started at Wed Nov 28 11:14:20 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #7129: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 23302 at Wed Nov 28 11:14:20 EST 2012
kill -USR1 23302
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23302 killed at Wed Nov 28 11:14:20 EST 2012
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:14:20 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:20 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23372 >/dev/null 2>/dev/null
selfserv with PID 23372 found at Wed Nov 28 11:14:20 EST 2012
selfserv with PID 23372 started at Wed Nov 28 11:14:20 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7130: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23372 at Wed Nov 28 11:14:21 EST 2012
kill -USR1 23372
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23372 killed at Wed Nov 28 11:14:21 EST 2012
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:14:21 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:21 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23430 >/dev/null 2>/dev/null
selfserv with PID 23430 found at Wed Nov 28 11:14:21 EST 2012
selfserv with PID 23430 started at Wed Nov 28 11:14:21 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7131: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23430 at Wed Nov 28 11:14:21 EST 2012
kill -USR1 23430
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23430 killed at Wed Nov 28 11:14:21 EST 2012
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:14:21 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:21 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23488 >/dev/null 2>/dev/null
selfserv with PID 23488 found at Wed Nov 28 11:14:21 EST 2012
selfserv with PID 23488 started at Wed Nov 28 11:14:21 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7132: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23488 at Wed Nov 28 11:14:21 EST 2012
kill -USR1 23488
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23488 killed at Wed Nov 28 11:14:21 EST 2012
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Wed Nov 28 11:14:21 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:21 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23558 >/dev/null 2>/dev/null
selfserv with PID 23558 found at Wed Nov 28 11:14:21 EST 2012
selfserv with PID 23558 started at Wed Nov 28 11:14:21 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7133: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23558 at Wed Nov 28 11:14:22 EST 2012
kill -USR1 23558
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23558 killed at Wed Nov 28 11:14:22 EST 2012
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Wed Nov 28 11:14:22 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:22 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23616 >/dev/null 2>/dev/null
selfserv with PID 23616 found at Wed Nov 28 11:14:22 EST 2012
selfserv with PID 23616 started at Wed Nov 28 11:14:22 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7134: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23616 at Wed Nov 28 11:14:22 EST 2012
kill -USR1 23616
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23616 killed at Wed Nov 28 11:14:22 EST 2012
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Wed Nov 28 11:14:22 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:22 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23674 >/dev/null 2>/dev/null
selfserv with PID 23674 found at Wed Nov 28 11:14:22 EST 2012
selfserv with PID 23674 started at Wed Nov 28 11:14:22 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7135: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23674 at Wed Nov 28 11:14:22 EST 2012
kill -USR1 23674
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23674 killed at Wed Nov 28 11:14:22 EST 2012
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Wed Nov 28 11:14:22 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:22 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23744 >/dev/null 2>/dev/null
selfserv with PID 23744 found at Wed Nov 28 11:14:22 EST 2012
selfserv with PID 23744 started at Wed Nov 28 11:14:22 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #7136: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 23744 at Wed Nov 28 11:14:23 EST 2012
kill -USR1 23744
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23744 killed at Wed Nov 28 11:14:23 EST 2012
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Wed Nov 28 11:14:23 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:23 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23802 >/dev/null 2>/dev/null
selfserv with PID 23802 found at Wed Nov 28 11:14:23 EST 2012
selfserv with PID 23802 started at Wed Nov 28 11:14:23 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7137: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23802 at Wed Nov 28 11:14:23 EST 2012
kill -USR1 23802
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23802 killed at Wed Nov 28 11:14:23 EST 2012
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Wed Nov 28 11:14:23 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:23 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23860 >/dev/null 2>/dev/null
selfserv with PID 23860 found at Wed Nov 28 11:14:23 EST 2012
selfserv with PID 23860 started at Wed Nov 28 11:14:23 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #7138: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 23860 at Wed Nov 28 11:14:23 EST 2012
kill -USR1 23860
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23860 killed at Wed Nov 28 11:14:23 EST 2012
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:14:23 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:23 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23930 >/dev/null 2>/dev/null
selfserv with PID 23930 found at Wed Nov 28 11:14:23 EST 2012
selfserv with PID 23930 started at Wed Nov 28 11:14:23 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #7139: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 23930 at Wed Nov 28 11:14:24 EST 2012
kill -USR1 23930
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23930 killed at Wed Nov 28 11:14:24 EST 2012
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:14:24 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:24 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23988 >/dev/null 2>/dev/null
selfserv with PID 23988 found at Wed Nov 28 11:14:24 EST 2012
selfserv with PID 23988 started at Wed Nov 28 11:14:24 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #7140: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 23988 at Wed Nov 28 11:14:24 EST 2012
kill -USR1 23988
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23988 killed at Wed Nov 28 11:14:24 EST 2012
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:14:24 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:24 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24046 >/dev/null 2>/dev/null
selfserv with PID 24046 found at Wed Nov 28 11:14:24 EST 2012
selfserv with PID 24046 started at Wed Nov 28 11:14:24 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #7141: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 24046 at Wed Nov 28 11:14:24 EST 2012
kill -USR1 24046
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24046 killed at Wed Nov 28 11:14:24 EST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Wed Nov 28 11:14:24 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:24 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24116 >/dev/null 2>/dev/null
selfserv with PID 24116 found at Wed Nov 28 11:14:24 EST 2012
selfserv with PID 24116 started at Wed Nov 28 11:14:24 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #7142: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 24116 at Wed Nov 28 11:14:25 EST 2012
kill -USR1 24116
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24116 killed at Wed Nov 28 11:14:25 EST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Wed Nov 28 11:14:25 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:25 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24174 >/dev/null 2>/dev/null
selfserv with PID 24174 found at Wed Nov 28 11:14:25 EST 2012
selfserv with PID 24174 started at Wed Nov 28 11:14:25 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #7143: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 24174 at Wed Nov 28 11:14:25 EST 2012
kill -USR1 24174
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24174 killed at Wed Nov 28 11:14:25 EST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Wed Nov 28 11:14:25 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:25 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24232 >/dev/null 2>/dev/null
selfserv with PID 24232 found at Wed Nov 28 11:14:25 EST 2012
selfserv with PID 24232 started at Wed Nov 28 11:14:25 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #7144: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 24232 at Wed Nov 28 11:14:25 EST 2012
kill -USR1 24232
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24232 killed at Wed Nov 28 11:14:25 EST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Wed Nov 28 11:14:25 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:25 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24302 >/dev/null 2>/dev/null
selfserv with PID 24302 found at Wed Nov 28 11:14:25 EST 2012
selfserv with PID 24302 started at Wed Nov 28 11:14:25 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #7145: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 24302 at Wed Nov 28 11:14:26 EST 2012
kill -USR1 24302
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24302 killed at Wed Nov 28 11:14:26 EST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Wed Nov 28 11:14:26 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:26 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24360 >/dev/null 2>/dev/null
selfserv with PID 24360 found at Wed Nov 28 11:14:26 EST 2012
selfserv with PID 24360 started at Wed Nov 28 11:14:26 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7146: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24360 at Wed Nov 28 11:14:26 EST 2012
kill -USR1 24360
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24360 killed at Wed Nov 28 11:14:26 EST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Wed Nov 28 11:14:26 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:26 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24418 >/dev/null 2>/dev/null
selfserv with PID 24418 found at Wed Nov 28 11:14:26 EST 2012
selfserv with PID 24418 started at Wed Nov 28 11:14:26 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #7147: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 24418 at Wed Nov 28 11:14:26 EST 2012
kill -USR1 24418
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24418 killed at Wed Nov 28 11:14:26 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:14:26 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:26 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24488 >/dev/null 2>/dev/null
selfserv with PID 24488 found at Wed Nov 28 11:14:26 EST 2012
selfserv with PID 24488 started at Wed Nov 28 11:14:26 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7148: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24488 at Wed Nov 28 11:14:27 EST 2012
kill -USR1 24488
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24488 killed at Wed Nov 28 11:14:27 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:14:27 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:27 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24546 >/dev/null 2>/dev/null
selfserv with PID 24546 found at Wed Nov 28 11:14:27 EST 2012
selfserv with PID 24546 started at Wed Nov 28 11:14:27 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7149: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24546 at Wed Nov 28 11:14:27 EST 2012
kill -USR1 24546
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24546 killed at Wed Nov 28 11:14:27 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:14:27 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:27 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24604 >/dev/null 2>/dev/null
selfserv with PID 24604 found at Wed Nov 28 11:14:27 EST 2012
selfserv with PID 24604 started at Wed Nov 28 11:14:27 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7150: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24604 at Wed Nov 28 11:14:27 EST 2012
kill -USR1 24604
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24604 killed at Wed Nov 28 11:14:27 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:14:27 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:27 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24674 >/dev/null 2>/dev/null
selfserv with PID 24674 found at Wed Nov 28 11:14:27 EST 2012
selfserv with PID 24674 started at Wed Nov 28 11:14:27 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7151: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24674 at Wed Nov 28 11:14:28 EST 2012
kill -USR1 24674
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24674 killed at Wed Nov 28 11:14:28 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:14:28 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:28 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24732 >/dev/null 2>/dev/null
selfserv with PID 24732 found at Wed Nov 28 11:14:28 EST 2012
selfserv with PID 24732 started at Wed Nov 28 11:14:28 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7152: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24732 at Wed Nov 28 11:14:28 EST 2012
kill -USR1 24732
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24732 killed at Wed Nov 28 11:14:28 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:14:28 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:28 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24790 >/dev/null 2>/dev/null
selfserv with PID 24790 found at Wed Nov 28 11:14:28 EST 2012
selfserv with PID 24790 started at Wed Nov 28 11:14:28 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7153: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24790 at Wed Nov 28 11:14:28 EST 2012
kill -USR1 24790
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24790 killed at Wed Nov 28 11:14:28 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:14:28 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:28 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24860 >/dev/null 2>/dev/null
selfserv with PID 24860 found at Wed Nov 28 11:14:28 EST 2012
selfserv with PID 24860 started at Wed Nov 28 11:14:28 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #7154: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24860 at Wed Nov 28 11:14:29 EST 2012
kill -USR1 24860
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24860 killed at Wed Nov 28 11:14:29 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:14:29 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:29 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24918 >/dev/null 2>/dev/null
selfserv with PID 24918 found at Wed Nov 28 11:14:29 EST 2012
selfserv with PID 24918 started at Wed Nov 28 11:14:29 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7155: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24918 at Wed Nov 28 11:14:29 EST 2012
kill -USR1 24918
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24918 killed at Wed Nov 28 11:14:29 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:14:29 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:29 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24976 >/dev/null 2>/dev/null
selfserv with PID 24976 found at Wed Nov 28 11:14:29 EST 2012
selfserv with PID 24976 started at Wed Nov 28 11:14:29 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #7156: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24976 at Wed Nov 28 11:14:29 EST 2012
kill -USR1 24976
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24976 killed at Wed Nov 28 11:14:29 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:14:29 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:29 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25046 >/dev/null 2>/dev/null
selfserv with PID 25046 found at Wed Nov 28 11:14:29 EST 2012
selfserv with PID 25046 started at Wed Nov 28 11:14:29 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #7157: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25046 at Wed Nov 28 11:14:30 EST 2012
kill -USR1 25046
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25046 killed at Wed Nov 28 11:14:30 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:14:30 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:30 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25104 >/dev/null 2>/dev/null
selfserv with PID 25104 found at Wed Nov 28 11:14:30 EST 2012
selfserv with PID 25104 started at Wed Nov 28 11:14:30 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #7158: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25104 at Wed Nov 28 11:14:30 EST 2012
kill -USR1 25104
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25104 killed at Wed Nov 28 11:14:30 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:14:30 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:30 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25162 >/dev/null 2>/dev/null
selfserv with PID 25162 found at Wed Nov 28 11:14:30 EST 2012
selfserv with PID 25162 started at Wed Nov 28 11:14:30 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #7159: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25162 at Wed Nov 28 11:14:30 EST 2012
kill -USR1 25162
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25162 killed at Wed Nov 28 11:14:30 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:14:30 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:30 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25232 >/dev/null 2>/dev/null
selfserv with PID 25232 found at Wed Nov 28 11:14:30 EST 2012
selfserv with PID 25232 started at Wed Nov 28 11:14:30 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #7160: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25232 at Wed Nov 28 11:14:31 EST 2012
kill -USR1 25232
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25232 killed at Wed Nov 28 11:14:31 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:14:31 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:31 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25290 >/dev/null 2>/dev/null
selfserv with PID 25290 found at Wed Nov 28 11:14:31 EST 2012
selfserv with PID 25290 started at Wed Nov 28 11:14:31 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #7161: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25290 at Wed Nov 28 11:14:31 EST 2012
kill -USR1 25290
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25290 killed at Wed Nov 28 11:14:31 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:14:31 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:31 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25348 >/dev/null 2>/dev/null
selfserv with PID 25348 found at Wed Nov 28 11:14:31 EST 2012
selfserv with PID 25348 started at Wed Nov 28 11:14:31 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #7162: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25348 at Wed Nov 28 11:14:31 EST 2012
kill -USR1 25348
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25348 killed at Wed Nov 28 11:14:31 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:14:31 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:31 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25418 >/dev/null 2>/dev/null
selfserv with PID 25418 found at Wed Nov 28 11:14:31 EST 2012
selfserv with PID 25418 started at Wed Nov 28 11:14:31 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #7163: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25418 at Wed Nov 28 11:14:32 EST 2012
kill -USR1 25418
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25418 killed at Wed Nov 28 11:14:32 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:14:32 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:32 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25476 >/dev/null 2>/dev/null
selfserv with PID 25476 found at Wed Nov 28 11:14:32 EST 2012
selfserv with PID 25476 started at Wed Nov 28 11:14:32 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7164: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25476 at Wed Nov 28 11:14:32 EST 2012
kill -USR1 25476
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25476 killed at Wed Nov 28 11:14:32 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:14:32 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:32 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25534 >/dev/null 2>/dev/null
selfserv with PID 25534 found at Wed Nov 28 11:14:32 EST 2012
selfserv with PID 25534 started at Wed Nov 28 11:14:32 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #7165: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25534 at Wed Nov 28 11:14:32 EST 2012
kill -USR1 25534
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25534 killed at Wed Nov 28 11:14:32 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:14:32 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:32 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25604 >/dev/null 2>/dev/null
selfserv with PID 25604 found at Wed Nov 28 11:14:32 EST 2012
selfserv with PID 25604 started at Wed Nov 28 11:14:32 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7166: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25604 at Wed Nov 28 11:14:33 EST 2012
kill -USR1 25604
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25604 killed at Wed Nov 28 11:14:33 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:14:33 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:33 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25662 >/dev/null 2>/dev/null
selfserv with PID 25662 found at Wed Nov 28 11:14:33 EST 2012
selfserv with PID 25662 started at Wed Nov 28 11:14:33 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7167: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25662 at Wed Nov 28 11:14:33 EST 2012
kill -USR1 25662
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25662 killed at Wed Nov 28 11:14:33 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:14:33 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:33 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25720 >/dev/null 2>/dev/null
selfserv with PID 25720 found at Wed Nov 28 11:14:33 EST 2012
selfserv with PID 25720 started at Wed Nov 28 11:14:33 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7168: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25720 at Wed Nov 28 11:14:33 EST 2012
kill -USR1 25720
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25720 killed at Wed Nov 28 11:14:33 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:14:33 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:33 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25790 >/dev/null 2>/dev/null
selfserv with PID 25790 found at Wed Nov 28 11:14:33 EST 2012
selfserv with PID 25790 started at Wed Nov 28 11:14:33 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7169: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25790 at Wed Nov 28 11:14:34 EST 2012
kill -USR1 25790
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25790 killed at Wed Nov 28 11:14:34 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:14:34 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:34 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25848 >/dev/null 2>/dev/null
selfserv with PID 25848 found at Wed Nov 28 11:14:34 EST 2012
selfserv with PID 25848 started at Wed Nov 28 11:14:34 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7170: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25848 at Wed Nov 28 11:14:34 EST 2012
kill -USR1 25848
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25848 killed at Wed Nov 28 11:14:34 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:14:34 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:34 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25906 >/dev/null 2>/dev/null
selfserv with PID 25906 found at Wed Nov 28 11:14:34 EST 2012
selfserv with PID 25906 started at Wed Nov 28 11:14:34 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7171: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25906 at Wed Nov 28 11:14:34 EST 2012
kill -USR1 25906
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25906 killed at Wed Nov 28 11:14:34 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:14:34 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:34 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25976 >/dev/null 2>/dev/null
selfserv with PID 25976 found at Wed Nov 28 11:14:34 EST 2012
selfserv with PID 25976 started at Wed Nov 28 11:14:34 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #7172: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25976 at Wed Nov 28 11:14:35 EST 2012
kill -USR1 25976
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25976 killed at Wed Nov 28 11:14:35 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:14:35 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:35 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 26034 >/dev/null 2>/dev/null
selfserv with PID 26034 found at Wed Nov 28 11:14:35 EST 2012
selfserv with PID 26034 started at Wed Nov 28 11:14:35 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7173: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26034 at Wed Nov 28 11:14:35 EST 2012
kill -USR1 26034
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 26034 killed at Wed Nov 28 11:14:35 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:14:35 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:35 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 26092 >/dev/null 2>/dev/null
selfserv with PID 26092 found at Wed Nov 28 11:14:35 EST 2012
selfserv with PID 26092 started at Wed Nov 28 11:14:35 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #7174: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26092 at Wed Nov 28 11:14:35 EST 2012
kill -USR1 26092
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 26092 killed at Wed Nov 28 11:14:35 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:14:35 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:35 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 26162 >/dev/null 2>/dev/null
selfserv with PID 26162 found at Wed Nov 28 11:14:36 EST 2012
selfserv with PID 26162 started at Wed Nov 28 11:14:36 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #7175: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26162 at Wed Nov 28 11:14:36 EST 2012
kill -USR1 26162
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 26162 killed at Wed Nov 28 11:14:36 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:14:36 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:36 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 26220 >/dev/null 2>/dev/null
selfserv with PID 26220 found at Wed Nov 28 11:14:36 EST 2012
selfserv with PID 26220 started at Wed Nov 28 11:14:36 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #7176: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26220 at Wed Nov 28 11:14:36 EST 2012
kill -USR1 26220
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 26220 killed at Wed Nov 28 11:14:36 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:14:36 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:36 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 26278 >/dev/null 2>/dev/null
selfserv with PID 26278 found at Wed Nov 28 11:14:36 EST 2012
selfserv with PID 26278 started at Wed Nov 28 11:14:36 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #7177: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26278 at Wed Nov 28 11:14:36 EST 2012
kill -USR1 26278
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 26278 killed at Wed Nov 28 11:14:36 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:14:36 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:36 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 26348 >/dev/null 2>/dev/null
selfserv with PID 26348 found at Wed Nov 28 11:14:36 EST 2012
selfserv with PID 26348 started at Wed Nov 28 11:14:36 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #7178: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26348 at Wed Nov 28 11:14:37 EST 2012
kill -USR1 26348
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 26348 killed at Wed Nov 28 11:14:37 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:14:37 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 26406 >/dev/null 2>/dev/null
selfserv with PID 26406 found at Wed Nov 28 11:14:37 EST 2012
selfserv with PID 26406 started at Wed Nov 28 11:14:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #7179: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26406 at Wed Nov 28 11:14:37 EST 2012
kill -USR1 26406
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 26406 killed at Wed Nov 28 11:14:37 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:14:37 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 26464 >/dev/null 2>/dev/null
selfserv with PID 26464 found at Wed Nov 28 11:14:37 EST 2012
selfserv with PID 26464 started at Wed Nov 28 11:14:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #7180: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26464 at Wed Nov 28 11:14:37 EST 2012
kill -USR1 26464
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 26464 killed at Wed Nov 28 11:14:37 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:14:37 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 26535 >/dev/null 2>/dev/null
selfserv with PID 26535 found at Wed Nov 28 11:14:37 EST 2012
selfserv with PID 26535 started at Wed Nov 28 11:14:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #7181: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26535 at Wed Nov 28 11:14:38 EST 2012
kill -USR1 26535
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 26535 killed at Wed Nov 28 11:14:38 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:14:38 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 26593 >/dev/null 2>/dev/null
selfserv with PID 26593 found at Wed Nov 28 11:14:38 EST 2012
selfserv with PID 26593 started at Wed Nov 28 11:14:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7182: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26593 at Wed Nov 28 11:14:38 EST 2012
kill -USR1 26593
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 26593 killed at Wed Nov 28 11:14:38 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:14:38 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 26651 >/dev/null 2>/dev/null
selfserv with PID 26651 found at Wed Nov 28 11:14:38 EST 2012
selfserv with PID 26651 started at Wed Nov 28 11:14:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #7183: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26651 at Wed Nov 28 11:14:38 EST 2012
kill -USR1 26651
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 26651 killed at Wed Nov 28 11:14:38 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:14:39 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 26721 >/dev/null 2>/dev/null
selfserv with PID 26721 found at Wed Nov 28 11:14:39 EST 2012
selfserv with PID 26721 started at Wed Nov 28 11:14:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7184: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26721 at Wed Nov 28 11:14:39 EST 2012
kill -USR1 26721
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 26721 killed at Wed Nov 28 11:14:39 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:14:39 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 26779 >/dev/null 2>/dev/null
selfserv with PID 26779 found at Wed Nov 28 11:14:39 EST 2012
selfserv with PID 26779 started at Wed Nov 28 11:14:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7185: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26779 at Wed Nov 28 11:14:39 EST 2012
kill -USR1 26779
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 26779 killed at Wed Nov 28 11:14:39 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:14:39 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 26837 >/dev/null 2>/dev/null
selfserv with PID 26837 found at Wed Nov 28 11:14:39 EST 2012
selfserv with PID 26837 started at Wed Nov 28 11:14:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7186: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26837 at Wed Nov 28 11:14:39 EST 2012
kill -USR1 26837
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 26837 killed at Wed Nov 28 11:14:39 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:14:39 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 26907 >/dev/null 2>/dev/null
selfserv with PID 26907 found at Wed Nov 28 11:14:40 EST 2012
selfserv with PID 26907 started at Wed Nov 28 11:14:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7187: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26907 at Wed Nov 28 11:14:40 EST 2012
kill -USR1 26907
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 26907 killed at Wed Nov 28 11:14:40 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:14:40 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 26965 >/dev/null 2>/dev/null
selfserv with PID 26965 found at Wed Nov 28 11:14:40 EST 2012
selfserv with PID 26965 started at Wed Nov 28 11:14:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7188: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26965 at Wed Nov 28 11:14:40 EST 2012
kill -USR1 26965
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 26965 killed at Wed Nov 28 11:14:40 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:14:40 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 27023 >/dev/null 2>/dev/null
selfserv with PID 27023 found at Wed Nov 28 11:14:40 EST 2012
selfserv with PID 27023 started at Wed Nov 28 11:14:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7189: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27023 at Wed Nov 28 11:14:41 EST 2012
kill -USR1 27023
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 27023 killed at Wed Nov 28 11:14:41 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:14:41 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 27093 >/dev/null 2>/dev/null
selfserv with PID 27093 found at Wed Nov 28 11:14:41 EST 2012
selfserv with PID 27093 started at Wed Nov 28 11:14:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #7190: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 27093 at Wed Nov 28 11:14:41 EST 2012
kill -USR1 27093
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 27093 killed at Wed Nov 28 11:14:41 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:14:41 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 27151 >/dev/null 2>/dev/null
selfserv with PID 27151 found at Wed Nov 28 11:14:41 EST 2012
selfserv with PID 27151 started at Wed Nov 28 11:14:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7191: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27151 at Wed Nov 28 11:14:41 EST 2012
kill -USR1 27151
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 27151 killed at Wed Nov 28 11:14:41 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:14:41 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 27209 >/dev/null 2>/dev/null
selfserv with PID 27209 found at Wed Nov 28 11:14:41 EST 2012
selfserv with PID 27209 started at Wed Nov 28 11:14:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #7192: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 27209 at Wed Nov 28 11:14:42 EST 2012
kill -USR1 27209
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 27209 killed at Wed Nov 28 11:14:42 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:14:42 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 27279 >/dev/null 2>/dev/null
selfserv with PID 27279 found at Wed Nov 28 11:14:42 EST 2012
selfserv with PID 27279 started at Wed Nov 28 11:14:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #7193: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 27279 at Wed Nov 28 11:14:42 EST 2012
kill -USR1 27279
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 27279 killed at Wed Nov 28 11:14:42 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:14:42 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 27337 >/dev/null 2>/dev/null
selfserv with PID 27337 found at Wed Nov 28 11:14:42 EST 2012
selfserv with PID 27337 started at Wed Nov 28 11:14:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #7194: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 27337 at Wed Nov 28 11:14:42 EST 2012
kill -USR1 27337
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 27337 killed at Wed Nov 28 11:14:42 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:14:42 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 27395 >/dev/null 2>/dev/null
selfserv with PID 27395 found at Wed Nov 28 11:14:42 EST 2012
selfserv with PID 27395 started at Wed Nov 28 11:14:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #7195: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 27395 at Wed Nov 28 11:14:43 EST 2012
kill -USR1 27395
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 27395 killed at Wed Nov 28 11:14:43 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:14:43 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 27465 >/dev/null 2>/dev/null
selfserv with PID 27465 found at Wed Nov 28 11:14:43 EST 2012
selfserv with PID 27465 started at Wed Nov 28 11:14:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #7196: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 27465 at Wed Nov 28 11:14:43 EST 2012
kill -USR1 27465
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 27465 killed at Wed Nov 28 11:14:43 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:14:43 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 27523 >/dev/null 2>/dev/null
selfserv with PID 27523 found at Wed Nov 28 11:14:43 EST 2012
selfserv with PID 27523 started at Wed Nov 28 11:14:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #7197: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 27523 at Wed Nov 28 11:14:43 EST 2012
kill -USR1 27523
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 27523 killed at Wed Nov 28 11:14:43 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:14:43 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 27581 >/dev/null 2>/dev/null
selfserv with PID 27581 found at Wed Nov 28 11:14:43 EST 2012
selfserv with PID 27581 started at Wed Nov 28 11:14:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #7198: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 27581 at Wed Nov 28 11:14:43 EST 2012
kill -USR1 27581
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 27581 killed at Wed Nov 28 11:14:43 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:14:44 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 27651 >/dev/null 2>/dev/null
selfserv with PID 27651 found at Wed Nov 28 11:14:44 EST 2012
selfserv with PID 27651 started at Wed Nov 28 11:14:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #7199: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 27651 at Wed Nov 28 11:14:44 EST 2012
kill -USR1 27651
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 27651 killed at Wed Nov 28 11:14:44 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:14:44 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 27709 >/dev/null 2>/dev/null
selfserv with PID 27709 found at Wed Nov 28 11:14:44 EST 2012
selfserv with PID 27709 started at Wed Nov 28 11:14:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7200: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27709 at Wed Nov 28 11:14:44 EST 2012
kill -USR1 27709
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 27709 killed at Wed Nov 28 11:14:44 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:14:44 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 27767 >/dev/null 2>/dev/null
selfserv with PID 27767 found at Wed Nov 28 11:14:44 EST 2012
selfserv with PID 27767 started at Wed Nov 28 11:14:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #7201: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 27767 at Wed Nov 28 11:14:45 EST 2012
kill -USR1 27767
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 27767 killed at Wed Nov 28 11:14:45 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:14:45 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:45 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 27846 >/dev/null 2>/dev/null
selfserv with PID 27846 found at Wed Nov 28 11:14:45 EST 2012
selfserv with PID 27846 started at Wed Nov 28 11:14:45 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7202: TLS Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27846 at Wed Nov 28 11:14:45 EST 2012
kill -USR1 27846
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 27846 killed at Wed Nov 28 11:14:45 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:14:45 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:45 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 27904 >/dev/null 2>/dev/null
selfserv with PID 27904 found at Wed Nov 28 11:14:45 EST 2012
selfserv with PID 27904 started at Wed Nov 28 11:14:45 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7203: TLS Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27904 at Wed Nov 28 11:14:45 EST 2012
kill -USR1 27904
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 27904 killed at Wed Nov 28 11:14:45 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:14:45 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:45 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 27962 >/dev/null 2>/dev/null
selfserv with PID 27962 found at Wed Nov 28 11:14:45 EST 2012
selfserv with PID 27962 started at Wed Nov 28 11:14:45 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7204: TLS Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27962 at Wed Nov 28 11:14:46 EST 2012
kill -USR1 27962
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 27962 killed at Wed Nov 28 11:14:46 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:14:46 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 28032 >/dev/null 2>/dev/null
selfserv with PID 28032 found at Wed Nov 28 11:14:46 EST 2012
selfserv with PID 28032 started at Wed Nov 28 11:14:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #7205: TLS Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 28032 at Wed Nov 28 11:14:46 EST 2012
kill -USR1 28032
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 28032 killed at Wed Nov 28 11:14:46 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:14:46 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 28090 >/dev/null 2>/dev/null
selfserv with PID 28090 found at Wed Nov 28 11:14:46 EST 2012
selfserv with PID 28090 started at Wed Nov 28 11:14:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7206: TLS Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28090 at Wed Nov 28 11:14:46 EST 2012
kill -USR1 28090
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 28090 killed at Wed Nov 28 11:14:46 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:14:46 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 28148 >/dev/null 2>/dev/null
selfserv with PID 28148 found at Wed Nov 28 11:14:46 EST 2012
selfserv with PID 28148 started at Wed Nov 28 11:14:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #7207: TLS Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 28148 at Wed Nov 28 11:14:47 EST 2012
kill -USR1 28148
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 28148 killed at Wed Nov 28 11:14:47 EST 2012
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:14:47 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 28218 >/dev/null 2>/dev/null
selfserv with PID 28218 found at Wed Nov 28 11:14:47 EST 2012
selfserv with PID 28218 started at Wed Nov 28 11:14:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #7208: TLS Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 28218 at Wed Nov 28 11:14:47 EST 2012
kill -USR1 28218
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 28218 killed at Wed Nov 28 11:14:47 EST 2012
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:14:47 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 28276 >/dev/null 2>/dev/null
selfserv with PID 28276 found at Wed Nov 28 11:14:47 EST 2012
selfserv with PID 28276 started at Wed Nov 28 11:14:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #7209: TLS Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 28276 at Wed Nov 28 11:14:47 EST 2012
kill -USR1 28276
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 28276 killed at Wed Nov 28 11:14:47 EST 2012
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:14:47 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 28334 >/dev/null 2>/dev/null
selfserv with PID 28334 found at Wed Nov 28 11:14:47 EST 2012
selfserv with PID 28334 started at Wed Nov 28 11:14:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #7210: TLS Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 28334 at Wed Nov 28 11:14:48 EST 2012
kill -USR1 28334
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 28334 killed at Wed Nov 28 11:14:48 EST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:14:48 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 28404 >/dev/null 2>/dev/null
selfserv with PID 28404 found at Wed Nov 28 11:14:48 EST 2012
selfserv with PID 28404 started at Wed Nov 28 11:14:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #7211: TLS Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 28404 at Wed Nov 28 11:14:48 EST 2012
kill -USR1 28404
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 28404 killed at Wed Nov 28 11:14:48 EST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:14:48 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 28462 >/dev/null 2>/dev/null
selfserv with PID 28462 found at Wed Nov 28 11:14:48 EST 2012
selfserv with PID 28462 started at Wed Nov 28 11:14:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7212: TLS Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28462 at Wed Nov 28 11:14:48 EST 2012
kill -USR1 28462
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 28462 killed at Wed Nov 28 11:14:48 EST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:14:48 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 28520 >/dev/null 2>/dev/null
selfserv with PID 28520 found at Wed Nov 28 11:14:48 EST 2012
selfserv with PID 28520 started at Wed Nov 28 11:14:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #7213: TLS Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 28520 at Wed Nov 28 11:14:49 EST 2012
kill -USR1 28520
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 28520 killed at Wed Nov 28 11:14:49 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:14:49 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:49 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 28590 >/dev/null 2>/dev/null
selfserv with PID 28590 found at Wed Nov 28 11:14:49 EST 2012
selfserv with PID 28590 started at Wed Nov 28 11:14:49 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7214: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28590 at Wed Nov 28 11:14:49 EST 2012
kill -USR1 28590
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 28590 killed at Wed Nov 28 11:14:49 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:14:49 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:49 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 28648 >/dev/null 2>/dev/null
selfserv with PID 28648 found at Wed Nov 28 11:14:49 EST 2012
selfserv with PID 28648 started at Wed Nov 28 11:14:49 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7215: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28648 at Wed Nov 28 11:14:49 EST 2012
kill -USR1 28648
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 28648 killed at Wed Nov 28 11:14:49 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:14:50 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:50 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 28706 >/dev/null 2>/dev/null
selfserv with PID 28706 found at Wed Nov 28 11:14:50 EST 2012
selfserv with PID 28706 started at Wed Nov 28 11:14:50 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7216: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28706 at Wed Nov 28 11:14:50 EST 2012
kill -USR1 28706
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 28706 killed at Wed Nov 28 11:14:50 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:14:50 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:50 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 28776 >/dev/null 2>/dev/null
selfserv with PID 28776 found at Wed Nov 28 11:14:50 EST 2012
selfserv with PID 28776 started at Wed Nov 28 11:14:50 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #7217: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 28776 at Wed Nov 28 11:14:50 EST 2012
kill -USR1 28776
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 28776 killed at Wed Nov 28 11:14:50 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:14:50 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:50 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 28834 >/dev/null 2>/dev/null
selfserv with PID 28834 found at Wed Nov 28 11:14:50 EST 2012
selfserv with PID 28834 started at Wed Nov 28 11:14:50 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7218: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28834 at Wed Nov 28 11:14:51 EST 2012
kill -USR1 28834
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 28834 killed at Wed Nov 28 11:14:51 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:14:51 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:51 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 28892 >/dev/null 2>/dev/null
selfserv with PID 28892 found at Wed Nov 28 11:14:51 EST 2012
selfserv with PID 28892 started at Wed Nov 28 11:14:51 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #7219: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 28892 at Wed Nov 28 11:14:51 EST 2012
kill -USR1 28892
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 28892 killed at Wed Nov 28 11:14:51 EST 2012
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:14:51 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:51 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 28962 >/dev/null 2>/dev/null
selfserv with PID 28962 found at Wed Nov 28 11:14:51 EST 2012
selfserv with PID 28962 started at Wed Nov 28 11:14:51 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #7220: SSL3 Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 28962 at Wed Nov 28 11:14:51 EST 2012
kill -USR1 28962
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 28962 killed at Wed Nov 28 11:14:51 EST 2012
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:14:51 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:51 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 29020 >/dev/null 2>/dev/null
selfserv with PID 29020 found at Wed Nov 28 11:14:51 EST 2012
selfserv with PID 29020 started at Wed Nov 28 11:14:51 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #7221: SSL3 Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 29020 at Wed Nov 28 11:14:52 EST 2012
kill -USR1 29020
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 29020 killed at Wed Nov 28 11:14:52 EST 2012
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:14:52 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:52 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 29078 >/dev/null 2>/dev/null
selfserv with PID 29078 found at Wed Nov 28 11:14:52 EST 2012
selfserv with PID 29078 started at Wed Nov 28 11:14:52 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #7222: SSL3 Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 29078 at Wed Nov 28 11:14:52 EST 2012
kill -USR1 29078
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 29078 killed at Wed Nov 28 11:14:52 EST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:14:52 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:52 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 29148 >/dev/null 2>/dev/null
selfserv with PID 29148 found at Wed Nov 28 11:14:52 EST 2012
selfserv with PID 29148 started at Wed Nov 28 11:14:52 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #7223: SSL3 Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 29148 at Wed Nov 28 11:14:52 EST 2012
kill -USR1 29148
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 29148 killed at Wed Nov 28 11:14:52 EST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:14:52 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:52 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 29206 >/dev/null 2>/dev/null
selfserv with PID 29206 found at Wed Nov 28 11:14:52 EST 2012
selfserv with PID 29206 started at Wed Nov 28 11:14:52 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7224: SSL3 Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 29206 at Wed Nov 28 11:14:53 EST 2012
kill -USR1 29206
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 29206 killed at Wed Nov 28 11:14:53 EST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:14:53 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:53 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 29264 >/dev/null 2>/dev/null
selfserv with PID 29264 found at Wed Nov 28 11:14:53 EST 2012
selfserv with PID 29264 started at Wed Nov 28 11:14:53 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #7225: SSL3 Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 29264 at Wed Nov 28 11:14:53 EST 2012
kill -USR1 29264
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 29264 killed at Wed Nov 28 11:14:53 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:14:53 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:53 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 29334 >/dev/null 2>/dev/null
selfserv with PID 29334 found at Wed Nov 28 11:14:53 EST 2012
selfserv with PID 29334 started at Wed Nov 28 11:14:53 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7226: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 29334 at Wed Nov 28 11:14:53 EST 2012
kill -USR1 29334
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 29334 killed at Wed Nov 28 11:14:53 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:14:53 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:53 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 29392 >/dev/null 2>/dev/null
selfserv with PID 29392 found at Wed Nov 28 11:14:53 EST 2012
selfserv with PID 29392 started at Wed Nov 28 11:14:53 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7227: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 29392 at Wed Nov 28 11:14:54 EST 2012
kill -USR1 29392
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 29392 killed at Wed Nov 28 11:14:54 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:14:54 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:54 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 29450 >/dev/null 2>/dev/null
selfserv with PID 29450 found at Wed Nov 28 11:14:54 EST 2012
selfserv with PID 29450 started at Wed Nov 28 11:14:54 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7228: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 29450 at Wed Nov 28 11:14:54 EST 2012
kill -USR1 29450
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 29450 killed at Wed Nov 28 11:14:54 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:14:54 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:54 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 29520 >/dev/null 2>/dev/null
selfserv with PID 29520 found at Wed Nov 28 11:14:54 EST 2012
selfserv with PID 29520 started at Wed Nov 28 11:14:54 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #7229: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 29520 at Wed Nov 28 11:14:54 EST 2012
kill -USR1 29520
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 29520 killed at Wed Nov 28 11:14:54 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:14:54 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:54 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 29578 >/dev/null 2>/dev/null
selfserv with PID 29578 found at Wed Nov 28 11:14:54 EST 2012
selfserv with PID 29578 started at Wed Nov 28 11:14:54 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7230: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 29578 at Wed Nov 28 11:14:55 EST 2012
kill -USR1 29578
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 29578 killed at Wed Nov 28 11:14:55 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:14:55 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:55 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 29636 >/dev/null 2>/dev/null
selfserv with PID 29636 found at Wed Nov 28 11:14:55 EST 2012
selfserv with PID 29636 started at Wed Nov 28 11:14:55 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #7231: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 29636 at Wed Nov 28 11:14:55 EST 2012
kill -USR1 29636
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 29636 killed at Wed Nov 28 11:14:55 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:14:55 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:55 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 29706 >/dev/null 2>/dev/null
selfserv with PID 29706 found at Wed Nov 28 11:14:55 EST 2012
selfserv with PID 29706 started at Wed Nov 28 11:14:55 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #7232: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 29706 at Wed Nov 28 11:14:55 EST 2012
kill -USR1 29706
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 29706 killed at Wed Nov 28 11:14:56 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:14:56 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:56 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 29764 >/dev/null 2>/dev/null
selfserv with PID 29764 found at Wed Nov 28 11:14:56 EST 2012
selfserv with PID 29764 started at Wed Nov 28 11:14:56 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #7233: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 29764 at Wed Nov 28 11:14:56 EST 2012
kill -USR1 29764
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 29764 killed at Wed Nov 28 11:14:56 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:14:56 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:56 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 29822 >/dev/null 2>/dev/null
selfserv with PID 29822 found at Wed Nov 28 11:14:56 EST 2012
selfserv with PID 29822 started at Wed Nov 28 11:14:56 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #7234: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 29822 at Wed Nov 28 11:14:56 EST 2012
kill -USR1 29822
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 29822 killed at Wed Nov 28 11:14:56 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:14:56 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:56 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 29892 >/dev/null 2>/dev/null
selfserv with PID 29892 found at Wed Nov 28 11:14:56 EST 2012
selfserv with PID 29892 started at Wed Nov 28 11:14:56 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #7235: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 29892 at Wed Nov 28 11:14:57 EST 2012
kill -USR1 29892
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 29892 killed at Wed Nov 28 11:14:57 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:14:57 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:57 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 29950 >/dev/null 2>/dev/null
selfserv with PID 29950 found at Wed Nov 28 11:14:57 EST 2012
selfserv with PID 29950 started at Wed Nov 28 11:14:57 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7236: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 29950 at Wed Nov 28 11:14:57 EST 2012
kill -USR1 29950
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 29950 killed at Wed Nov 28 11:14:57 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:14:57 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:57 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 30008 >/dev/null 2>/dev/null
selfserv with PID 30008 found at Wed Nov 28 11:14:57 EST 2012
selfserv with PID 30008 started at Wed Nov 28 11:14:57 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #7237: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 30008 at Wed Nov 28 11:14:57 EST 2012
kill -USR1 30008
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 30008 killed at Wed Nov 28 11:14:57 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:14:57 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:57 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 30078 >/dev/null 2>/dev/null
selfserv with PID 30078 found at Wed Nov 28 11:14:57 EST 2012
selfserv with PID 30078 started at Wed Nov 28 11:14:57 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7238: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30078 at Wed Nov 28 11:14:58 EST 2012
kill -USR1 30078
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 30078 killed at Wed Nov 28 11:14:58 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:14:58 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:58 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 30136 >/dev/null 2>/dev/null
selfserv with PID 30136 found at Wed Nov 28 11:14:58 EST 2012
selfserv with PID 30136 started at Wed Nov 28 11:14:58 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7239: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30136 at Wed Nov 28 11:14:58 EST 2012
kill -USR1 30136
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 30136 killed at Wed Nov 28 11:14:58 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:14:58 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:58 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 30194 >/dev/null 2>/dev/null
selfserv with PID 30194 found at Wed Nov 28 11:14:58 EST 2012
selfserv with PID 30194 started at Wed Nov 28 11:14:58 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7240: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30194 at Wed Nov 28 11:14:58 EST 2012
kill -USR1 30194
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 30194 killed at Wed Nov 28 11:14:58 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:14:58 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:58 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 30264 >/dev/null 2>/dev/null
selfserv with PID 30264 found at Wed Nov 28 11:14:58 EST 2012
selfserv with PID 30264 started at Wed Nov 28 11:14:58 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #7241: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 30264 at Wed Nov 28 11:14:59 EST 2012
kill -USR1 30264
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 30264 killed at Wed Nov 28 11:14:59 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:14:59 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:59 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 30322 >/dev/null 2>/dev/null
selfserv with PID 30322 found at Wed Nov 28 11:14:59 EST 2012
selfserv with PID 30322 started at Wed Nov 28 11:14:59 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7242: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30322 at Wed Nov 28 11:14:59 EST 2012
kill -USR1 30322
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 30322 killed at Wed Nov 28 11:14:59 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:14:59 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:59 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 30380 >/dev/null 2>/dev/null
selfserv with PID 30380 found at Wed Nov 28 11:14:59 EST 2012
selfserv with PID 30380 started at Wed Nov 28 11:14:59 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #7243: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 30380 at Wed Nov 28 11:14:59 EST 2012
kill -USR1 30380
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 30380 killed at Wed Nov 28 11:14:59 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:14:59 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:14:59 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 30450 >/dev/null 2>/dev/null
selfserv with PID 30450 found at Wed Nov 28 11:14:59 EST 2012
selfserv with PID 30450 started at Wed Nov 28 11:14:59 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #7244: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 30450 at Wed Nov 28 11:15:00 EST 2012
kill -USR1 30450
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 30450 killed at Wed Nov 28 11:15:00 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:15:00 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:15:00 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 30508 >/dev/null 2>/dev/null
selfserv with PID 30508 found at Wed Nov 28 11:15:00 EST 2012
selfserv with PID 30508 started at Wed Nov 28 11:15:00 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #7245: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 30508 at Wed Nov 28 11:15:00 EST 2012
kill -USR1 30508
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 30508 killed at Wed Nov 28 11:15:00 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:15:00 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:15:00 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 30566 >/dev/null 2>/dev/null
selfserv with PID 30566 found at Wed Nov 28 11:15:00 EST 2012
selfserv with PID 30566 started at Wed Nov 28 11:15:00 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #7246: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 30566 at Wed Nov 28 11:15:00 EST 2012
kill -USR1 30566
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 30566 killed at Wed Nov 28 11:15:00 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:15:00 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:15:00 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 30636 >/dev/null 2>/dev/null
selfserv with PID 30636 found at Wed Nov 28 11:15:00 EST 2012
selfserv with PID 30636 started at Wed Nov 28 11:15:00 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #7247: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 30636 at Wed Nov 28 11:15:01 EST 2012
kill -USR1 30636
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 30636 killed at Wed Nov 28 11:15:01 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:15:01 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:15:01 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 30694 >/dev/null 2>/dev/null
selfserv with PID 30694 found at Wed Nov 28 11:15:01 EST 2012
selfserv with PID 30694 started at Wed Nov 28 11:15:01 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7248: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30694 at Wed Nov 28 11:15:01 EST 2012
kill -USR1 30694
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 30694 killed at Wed Nov 28 11:15:01 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:15:01 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:15:01 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 30752 >/dev/null 2>/dev/null
selfserv with PID 30752 found at Wed Nov 28 11:15:01 EST 2012
selfserv with PID 30752 started at Wed Nov 28 11:15:01 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #7249: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 30752 at Wed Nov 28 11:15:01 EST 2012
kill -USR1 30752
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 30752 killed at Wed Nov 28 11:15:01 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:15:02 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:15:02 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 30822 >/dev/null 2>/dev/null
selfserv with PID 30822 found at Wed Nov 28 11:15:02 EST 2012
selfserv with PID 30822 started at Wed Nov 28 11:15:02 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7250: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30822 at Wed Nov 28 11:15:02 EST 2012
kill -USR1 30822
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 30822 killed at Wed Nov 28 11:15:02 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:15:02 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:15:02 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 30880 >/dev/null 2>/dev/null
selfserv with PID 30880 found at Wed Nov 28 11:15:02 EST 2012
selfserv with PID 30880 started at Wed Nov 28 11:15:02 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7251: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30880 at Wed Nov 28 11:15:02 EST 2012
kill -USR1 30880
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 30880 killed at Wed Nov 28 11:15:02 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:15:02 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:15:02 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 30938 >/dev/null 2>/dev/null
selfserv with PID 30938 found at Wed Nov 28 11:15:02 EST 2012
selfserv with PID 30938 started at Wed Nov 28 11:15:02 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7252: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30938 at Wed Nov 28 11:15:02 EST 2012
kill -USR1 30938
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 30938 killed at Wed Nov 28 11:15:02 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:15:02 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:15:02 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 31008 >/dev/null 2>/dev/null
selfserv with PID 31008 found at Wed Nov 28 11:15:03 EST 2012
selfserv with PID 31008 started at Wed Nov 28 11:15:03 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #7253: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 31008 at Wed Nov 28 11:15:03 EST 2012
kill -USR1 31008
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 31008 killed at Wed Nov 28 11:15:03 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:15:03 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:15:03 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 31066 >/dev/null 2>/dev/null
selfserv with PID 31066 found at Wed Nov 28 11:15:03 EST 2012
selfserv with PID 31066 started at Wed Nov 28 11:15:03 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7254: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31066 at Wed Nov 28 11:15:03 EST 2012
kill -USR1 31066
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 31066 killed at Wed Nov 28 11:15:03 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:15:03 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:15:03 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 31124 >/dev/null 2>/dev/null
selfserv with PID 31124 found at Wed Nov 28 11:15:03 EST 2012
selfserv with PID 31124 started at Wed Nov 28 11:15:03 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #7255: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 31124 at Wed Nov 28 11:15:04 EST 2012
kill -USR1 31124
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 31124 killed at Wed Nov 28 11:15:04 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:15:04 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:15:04 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 31194 >/dev/null 2>/dev/null
selfserv with PID 31194 found at Wed Nov 28 11:15:04 EST 2012
selfserv with PID 31194 started at Wed Nov 28 11:15:04 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #7256: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 31194 at Wed Nov 28 11:15:04 EST 2012
kill -USR1 31194
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 31194 killed at Wed Nov 28 11:15:04 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:15:04 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:15:04 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 31252 >/dev/null 2>/dev/null
selfserv with PID 31252 found at Wed Nov 28 11:15:04 EST 2012
selfserv with PID 31252 started at Wed Nov 28 11:15:04 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #7257: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 31252 at Wed Nov 28 11:15:04 EST 2012
kill -USR1 31252
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 31252 killed at Wed Nov 28 11:15:04 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:15:04 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:15:04 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 31310 >/dev/null 2>/dev/null
selfserv with PID 31310 found at Wed Nov 28 11:15:04 EST 2012
selfserv with PID 31310 started at Wed Nov 28 11:15:04 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #7258: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 31310 at Wed Nov 28 11:15:05 EST 2012
kill -USR1 31310
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 31310 killed at Wed Nov 28 11:15:05 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:15:05 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:15:05 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 31380 >/dev/null 2>/dev/null
selfserv with PID 31380 found at Wed Nov 28 11:15:05 EST 2012
selfserv with PID 31380 started at Wed Nov 28 11:15:05 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #7259: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 31380 at Wed Nov 28 11:15:05 EST 2012
kill -USR1 31380
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 31380 killed at Wed Nov 28 11:15:05 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:15:05 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:15:05 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 31438 >/dev/null 2>/dev/null
selfserv with PID 31438 found at Wed Nov 28 11:15:05 EST 2012
selfserv with PID 31438 started at Wed Nov 28 11:15:05 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7260: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31438 at Wed Nov 28 11:15:05 EST 2012
kill -USR1 31438
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 31438 killed at Wed Nov 28 11:15:05 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:15:05 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:15:05 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 31496 >/dev/null 2>/dev/null
selfserv with PID 31496 found at Wed Nov 28 11:15:05 EST 2012
selfserv with PID 31496 started at Wed Nov 28 11:15:05 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #7261: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 31496 at Wed Nov 28 11:15:06 EST 2012
kill -USR1 31496
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 31496 killed at Wed Nov 28 11:15:06 EST 2012
ssl.sh: Cache CRL SSL Client Tests   - with ECC ===============================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/authin.tl.tmp
0
selfserv starting at Wed Nov 28 11:15:06 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:15:06 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 31561 >/dev/null 2>/dev/null
selfserv with PID 31561 found at Wed Nov 28 11:15:06 EST 2012
selfserv with PID 31561 started at Wed Nov 28 11:15:06 EST 2012
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 31561 >/dev/null 2>/dev/null
selfserv with PID 31561 found at Wed Nov 28 11:15:06 EST 2012
ssl.sh: #7262: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31561 >/dev/null 2>/dev/null
selfserv with PID 31561 found at Wed Nov 28 11:15:06 EST 2012
ssl.sh: #7263: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 31561 >/dev/null 2>/dev/null
selfserv with PID 31561 found at Wed Nov 28 11:15:06 EST 2012
ssl.sh: #7264: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser43   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31561 >/dev/null 2>/dev/null
selfserv with PID 31561 found at Wed Nov 28 11:15:07 EST 2012
ssl.sh: #7265: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser44   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31561 >/dev/null 2>/dev/null
selfserv with PID 31561 found at Wed Nov 28 11:15:07 EST 2012
ssl.sh: #7266: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser45   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31561 >/dev/null 2>/dev/null
selfserv with PID 31561 found at Wed Nov 28 11:15:07 EST 2012
ssl.sh: #7267: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser46   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31561 >/dev/null 2>/dev/null
selfserv with PID 31561 found at Wed Nov 28 11:15:07 EST 2012
ssl.sh: #7268: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser47   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31561 >/dev/null 2>/dev/null
selfserv with PID 31561 found at Wed Nov 28 11:15:07 EST 2012
ssl.sh: #7269: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser48   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31561 >/dev/null 2>/dev/null
selfserv with PID 31561 found at Wed Nov 28 11:15:07 EST 2012
ssl.sh: #7270: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser49   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31561 >/dev/null 2>/dev/null
selfserv with PID 31561 found at Wed Nov 28 11:15:08 EST 2012
ssl.sh: #7271: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser50   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31561 >/dev/null 2>/dev/null
selfserv with PID 31561 found at Wed Nov 28 11:15:08 EST 2012
ssl.sh: #7272: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser51   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31561 >/dev/null 2>/dev/null
selfserv with PID 31561 found at Wed Nov 28 11:15:08 EST 2012
ssl.sh: #7273: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser52   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31561 >/dev/null 2>/dev/null
selfserv with PID 31561 found at Wed Nov 28 11:15:08 EST 2012
ssl.sh: #7274: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/server/root.crl_43-48

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 161 bytes
tstclnt: Writing 161 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31561 >/dev/null 2>/dev/null
selfserv with PID 31561 found at Wed Nov 28 11:15:08 EST 2012
================= CRL Reloaded =============
ssl.sh: #7275: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 31561 >/dev/null 2>/dev/null
selfserv with PID 31561 found at Wed Nov 28 11:15:09 EST 2012
ssl.sh: #7276: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31561 >/dev/null 2>/dev/null
selfserv with PID 31561 found at Wed Nov 28 11:15:09 EST 2012
ssl.sh: #7277: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 31561 >/dev/null 2>/dev/null
selfserv with PID 31561 found at Wed Nov 28 11:15:09 EST 2012
ssl.sh: #7278: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser43   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 31561 >/dev/null 2>/dev/null
selfserv with PID 31561 found at Wed Nov 28 11:15:09 EST 2012
ssl.sh: #7279: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser44   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 31561 >/dev/null 2>/dev/null
selfserv with PID 31561 found at Wed Nov 28 11:15:09 EST 2012
ssl.sh: #7280: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser45   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 31561 >/dev/null 2>/dev/null
selfserv with PID 31561 found at Wed Nov 28 11:15:09 EST 2012
ssl.sh: #7281: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser46   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31561 >/dev/null 2>/dev/null
selfserv with PID 31561 found at Wed Nov 28 11:15:10 EST 2012
ssl.sh: #7282: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser47   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 31561 >/dev/null 2>/dev/null
selfserv with PID 31561 found at Wed Nov 28 11:15:10 EST 2012
ssl.sh: #7283: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser48   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 31561 >/dev/null 2>/dev/null
selfserv with PID 31561 found at Wed Nov 28 11:15:10 EST 2012
ssl.sh: #7284: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser49   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31561 >/dev/null 2>/dev/null
selfserv with PID 31561 found at Wed Nov 28 11:15:10 EST 2012
ssl.sh: #7285: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser50   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31561 >/dev/null 2>/dev/null
selfserv with PID 31561 found at Wed Nov 28 11:15:10 EST 2012
ssl.sh: #7286: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser51   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31561 >/dev/null 2>/dev/null
selfserv with PID 31561 found at Wed Nov 28 11:15:10 EST 2012
ssl.sh: #7287: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser52   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31561 >/dev/null 2>/dev/null
selfserv with PID 31561 found at Wed Nov 28 11:15:11 EST 2012
ssl.sh: #7288: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/server/root.crl_49-52

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 161 bytes
tstclnt: Writing 161 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31561 >/dev/null 2>/dev/null
selfserv with PID 31561 found at Wed Nov 28 11:15:11 EST 2012
================= CRL Reloaded =============
ssl.sh: #7289: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 31561 >/dev/null 2>/dev/null
selfserv with PID 31561 found at Wed Nov 28 11:15:11 EST 2012
ssl.sh: #7290: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31561 >/dev/null 2>/dev/null
selfserv with PID 31561 found at Wed Nov 28 11:15:11 EST 2012
ssl.sh: #7291: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 31561 >/dev/null 2>/dev/null
selfserv with PID 31561 found at Wed Nov 28 11:15:11 EST 2012
ssl.sh: #7292: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser43   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 31561 >/dev/null 2>/dev/null
selfserv with PID 31561 found at Wed Nov 28 11:15:11 EST 2012
ssl.sh: #7293: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser44   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 31561 >/dev/null 2>/dev/null
selfserv with PID 31561 found at Wed Nov 28 11:15:12 EST 2012
ssl.sh: #7294: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser45   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 31561 >/dev/null 2>/dev/null
selfserv with PID 31561 found at Wed Nov 28 11:15:12 EST 2012
ssl.sh: #7295: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser46   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31561 >/dev/null 2>/dev/null
selfserv with PID 31561 found at Wed Nov 28 11:15:12 EST 2012
ssl.sh: #7296: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser47   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 31561 >/dev/null 2>/dev/null
selfserv with PID 31561 found at Wed Nov 28 11:15:12 EST 2012
ssl.sh: #7297: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser48   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 31561 >/dev/null 2>/dev/null
selfserv with PID 31561 found at Wed Nov 28 11:15:12 EST 2012
ssl.sh: #7298: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser49   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 31561 >/dev/null 2>/dev/null
selfserv with PID 31561 found at Wed Nov 28 11:15:13 EST 2012
ssl.sh: #7299: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser50   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 31561 >/dev/null 2>/dev/null
selfserv with PID 31561 found at Wed Nov 28 11:15:13 EST 2012
ssl.sh: #7300: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser51   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31561 >/dev/null 2>/dev/null
selfserv with PID 31561 found at Wed Nov 28 11:15:13 EST 2012
ssl.sh: #7301: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser52   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 31561 >/dev/null 2>/dev/null
selfserv with PID 31561 found at Wed Nov 28 11:15:13 EST 2012
ssl.sh: #7302: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 31561 at Wed Nov 28 11:15:13 EST 2012
kill -USR1 31561
selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 31561 killed at Wed Nov 28 11:15:13 EST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Wed Nov 28 11:15:13 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:15:13 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 592 >/dev/null 2>/dev/null
selfserv with PID 592 found at Wed Nov 28 11:15:13 EST 2012
selfserv with PID 592 started at Wed Nov 28 11:15:13 EST 2012
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 592 >/dev/null 2>/dev/null
selfserv with PID 592 found at Wed Nov 28 11:15:13 EST 2012
ssl.sh: #7303: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 592 >/dev/null 2>/dev/null
selfserv with PID 592 found at Wed Nov 28 11:15:14 EST 2012
ssl.sh: #7304: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 592 >/dev/null 2>/dev/null
selfserv with PID 592 found at Wed Nov 28 11:15:14 EST 2012
ssl.sh: #7305: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser43 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 592 >/dev/null 2>/dev/null
selfserv with PID 592 found at Wed Nov 28 11:15:14 EST 2012
ssl.sh: #7306: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser44 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 592 >/dev/null 2>/dev/null
selfserv with PID 592 found at Wed Nov 28 11:15:14 EST 2012
ssl.sh: #7307: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser45 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 592 >/dev/null 2>/dev/null
selfserv with PID 592 found at Wed Nov 28 11:15:14 EST 2012
ssl.sh: #7308: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser46 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 592 >/dev/null 2>/dev/null
selfserv with PID 592 found at Wed Nov 28 11:15:15 EST 2012
ssl.sh: #7309: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser47 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 592 >/dev/null 2>/dev/null
selfserv with PID 592 found at Wed Nov 28 11:15:15 EST 2012
ssl.sh: #7310: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser48 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 592 >/dev/null 2>/dev/null
selfserv with PID 592 found at Wed Nov 28 11:15:15 EST 2012
ssl.sh: #7311: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser49 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 592 >/dev/null 2>/dev/null
selfserv with PID 592 found at Wed Nov 28 11:15:15 EST 2012
ssl.sh: #7312: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser50 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 592 >/dev/null 2>/dev/null
selfserv with PID 592 found at Wed Nov 28 11:15:15 EST 2012
ssl.sh: #7313: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser51 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 592 >/dev/null 2>/dev/null
selfserv with PID 592 found at Wed Nov 28 11:15:15 EST 2012
ssl.sh: #7314: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser52 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 592 >/dev/null 2>/dev/null
selfserv with PID 592 found at Wed Nov 28 11:15:16 EST 2012
ssl.sh: #7315: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/server/root.crl_43-48

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 161 bytes
tstclnt: Writing 161 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 592 >/dev/null 2>/dev/null
selfserv with PID 592 found at Wed Nov 28 11:15:16 EST 2012
================= CRL Reloaded =============
ssl.sh: #7316: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 592 >/dev/null 2>/dev/null
selfserv with PID 592 found at Wed Nov 28 11:15:16 EST 2012
ssl.sh: #7317: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 592 >/dev/null 2>/dev/null
selfserv with PID 592 found at Wed Nov 28 11:15:16 EST 2012
ssl.sh: #7318: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 592 >/dev/null 2>/dev/null
selfserv with PID 592 found at Wed Nov 28 11:15:16 EST 2012
ssl.sh: #7319: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser43 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 592 >/dev/null 2>/dev/null
selfserv with PID 592 found at Wed Nov 28 11:15:17 EST 2012
ssl.sh: #7320: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser44 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 592 >/dev/null 2>/dev/null
selfserv with PID 592 found at Wed Nov 28 11:15:17 EST 2012
ssl.sh: #7321: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser45 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 592 >/dev/null 2>/dev/null
selfserv with PID 592 found at Wed Nov 28 11:15:17 EST 2012
ssl.sh: #7322: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser46 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 592 >/dev/null 2>/dev/null
selfserv with PID 592 found at Wed Nov 28 11:15:17 EST 2012
ssl.sh: #7323: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser47 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 592 >/dev/null 2>/dev/null
selfserv with PID 592 found at Wed Nov 28 11:15:17 EST 2012
ssl.sh: #7324: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser48 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 592 >/dev/null 2>/dev/null
selfserv with PID 592 found at Wed Nov 28 11:15:17 EST 2012
ssl.sh: #7325: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser49 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 592 >/dev/null 2>/dev/null
selfserv with PID 592 found at Wed Nov 28 11:15:18 EST 2012
ssl.sh: #7326: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser50 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 592 >/dev/null 2>/dev/null
selfserv with PID 592 found at Wed Nov 28 11:15:18 EST 2012
ssl.sh: #7327: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser51 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 592 >/dev/null 2>/dev/null
selfserv with PID 592 found at Wed Nov 28 11:15:18 EST 2012
ssl.sh: #7328: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser52 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 592 >/dev/null 2>/dev/null
selfserv with PID 592 found at Wed Nov 28 11:15:18 EST 2012
ssl.sh: #7329: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/server/root.crl_49-52

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 161 bytes
tstclnt: Writing 161 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 592 >/dev/null 2>/dev/null
selfserv with PID 592 found at Wed Nov 28 11:15:18 EST 2012
================= CRL Reloaded =============
ssl.sh: #7330: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 592 >/dev/null 2>/dev/null
selfserv with PID 592 found at Wed Nov 28 11:15:18 EST 2012
ssl.sh: #7331: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 592 >/dev/null 2>/dev/null
selfserv with PID 592 found at Wed Nov 28 11:15:19 EST 2012
ssl.sh: #7332: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 592 >/dev/null 2>/dev/null
selfserv with PID 592 found at Wed Nov 28 11:15:19 EST 2012
ssl.sh: #7333: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser43 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 592 >/dev/null 2>/dev/null
selfserv with PID 592 found at Wed Nov 28 11:15:19 EST 2012
ssl.sh: #7334: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser44 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 592 >/dev/null 2>/dev/null
selfserv with PID 592 found at Wed Nov 28 11:15:19 EST 2012
ssl.sh: #7335: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser45 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 592 >/dev/null 2>/dev/null
selfserv with PID 592 found at Wed Nov 28 11:15:19 EST 2012
ssl.sh: #7336: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser46 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 592 >/dev/null 2>/dev/null
selfserv with PID 592 found at Wed Nov 28 11:15:20 EST 2012
ssl.sh: #7337: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser47 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 592 >/dev/null 2>/dev/null
selfserv with PID 592 found at Wed Nov 28 11:15:20 EST 2012
ssl.sh: #7338: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser48 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 592 >/dev/null 2>/dev/null
selfserv with PID 592 found at Wed Nov 28 11:15:20 EST 2012
ssl.sh: #7339: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser49 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 592 >/dev/null 2>/dev/null
selfserv with PID 592 found at Wed Nov 28 11:15:20 EST 2012
ssl.sh: #7340: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser50 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 592 >/dev/null 2>/dev/null
selfserv with PID 592 found at Wed Nov 28 11:15:20 EST 2012
ssl.sh: #7341: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser51 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 592 >/dev/null 2>/dev/null
selfserv with PID 592 found at Wed Nov 28 11:15:20 EST 2012
ssl.sh: #7342: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser52 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 592 >/dev/null 2>/dev/null
selfserv with PID 592 found at Wed Nov 28 11:15:21 EST 2012
ssl.sh: #7343: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 592 at Wed Nov 28 11:15:21 EST 2012
kill -USR1 592
selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 592 killed at Wed Nov 28 11:15:21 EST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Wed Nov 28 11:15:21 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:15:21 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 2132 >/dev/null 2>/dev/null
selfserv with PID 2132 found at Wed Nov 28 11:15:21 EST 2012
selfserv with PID 2132 started at Wed Nov 28 11:15:21 EST 2012
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 2132 >/dev/null 2>/dev/null
selfserv with PID 2132 found at Wed Nov 28 11:15:21 EST 2012
ssl.sh: #7344: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2132 >/dev/null 2>/dev/null
selfserv with PID 2132 found at Wed Nov 28 11:15:21 EST 2012
ssl.sh: #7345: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 2132 >/dev/null 2>/dev/null
selfserv with PID 2132 found at Wed Nov 28 11:15:21 EST 2012
ssl.sh: #7346: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser43-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2132 >/dev/null 2>/dev/null
selfserv with PID 2132 found at Wed Nov 28 11:15:22 EST 2012
ssl.sh: #7347: TLS Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser44-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2132 >/dev/null 2>/dev/null
selfserv with PID 2132 found at Wed Nov 28 11:15:22 EST 2012
ssl.sh: #7348: TLS Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser45-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2132 >/dev/null 2>/dev/null
selfserv with PID 2132 found at Wed Nov 28 11:15:22 EST 2012
ssl.sh: #7349: TLS Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser46-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2132 >/dev/null 2>/dev/null
selfserv with PID 2132 found at Wed Nov 28 11:15:22 EST 2012
ssl.sh: #7350: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser47-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2132 >/dev/null 2>/dev/null
selfserv with PID 2132 found at Wed Nov 28 11:15:22 EST 2012
ssl.sh: #7351: TLS Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser48-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2132 >/dev/null 2>/dev/null
selfserv with PID 2132 found at Wed Nov 28 11:15:23 EST 2012
ssl.sh: #7352: TLS Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser49-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2132 >/dev/null 2>/dev/null
selfserv with PID 2132 found at Wed Nov 28 11:15:23 EST 2012
ssl.sh: #7353: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser50-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2132 >/dev/null 2>/dev/null
selfserv with PID 2132 found at Wed Nov 28 11:15:23 EST 2012
ssl.sh: #7354: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser51-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2132 >/dev/null 2>/dev/null
selfserv with PID 2132 found at Wed Nov 28 11:15:23 EST 2012
ssl.sh: #7355: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser52-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2132 >/dev/null 2>/dev/null
selfserv with PID 2132 found at Wed Nov 28 11:15:23 EST 2012
ssl.sh: #7356: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/server/root.crl_43-48-ec

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 164 bytes
tstclnt: Writing 164 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2132 >/dev/null 2>/dev/null
selfserv with PID 2132 found at Wed Nov 28 11:15:24 EST 2012
================= CRL Reloaded =============
ssl.sh: #7357: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 2132 >/dev/null 2>/dev/null
selfserv with PID 2132 found at Wed Nov 28 11:15:24 EST 2012
ssl.sh: #7358: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2132 >/dev/null 2>/dev/null
selfserv with PID 2132 found at Wed Nov 28 11:15:24 EST 2012
ssl.sh: #7359: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 2132 >/dev/null 2>/dev/null
selfserv with PID 2132 found at Wed Nov 28 11:15:24 EST 2012
ssl.sh: #7360: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser43-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 2132 >/dev/null 2>/dev/null
selfserv with PID 2132 found at Wed Nov 28 11:15:24 EST 2012
ssl.sh: #7361: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser44-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 2132 >/dev/null 2>/dev/null
selfserv with PID 2132 found at Wed Nov 28 11:15:25 EST 2012
ssl.sh: #7362: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser45-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 2132 >/dev/null 2>/dev/null
selfserv with PID 2132 found at Wed Nov 28 11:15:25 EST 2012
ssl.sh: #7363: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser46-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2132 >/dev/null 2>/dev/null
selfserv with PID 2132 found at Wed Nov 28 11:15:25 EST 2012
ssl.sh: #7364: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser47-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 2132 >/dev/null 2>/dev/null
selfserv with PID 2132 found at Wed Nov 28 11:15:25 EST 2012
ssl.sh: #7365: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser48-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 2132 >/dev/null 2>/dev/null
selfserv with PID 2132 found at Wed Nov 28 11:15:25 EST 2012
ssl.sh: #7366: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser49-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2132 >/dev/null 2>/dev/null
selfserv with PID 2132 found at Wed Nov 28 11:15:26 EST 2012
ssl.sh: #7367: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser50-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2132 >/dev/null 2>/dev/null
selfserv with PID 2132 found at Wed Nov 28 11:15:26 EST 2012
ssl.sh: #7368: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser51-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2132 >/dev/null 2>/dev/null
selfserv with PID 2132 found at Wed Nov 28 11:15:26 EST 2012
ssl.sh: #7369: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser52-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2132 >/dev/null 2>/dev/null
selfserv with PID 2132 found at Wed Nov 28 11:15:26 EST 2012
ssl.sh: #7370: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/server/root.crl_49-52-ec

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 164 bytes
tstclnt: Writing 164 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2132 >/dev/null 2>/dev/null
selfserv with PID 2132 found at Wed Nov 28 11:15:26 EST 2012
================= CRL Reloaded =============
ssl.sh: #7371: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 2132 >/dev/null 2>/dev/null
selfserv with PID 2132 found at Wed Nov 28 11:15:27 EST 2012
ssl.sh: #7372: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2132 >/dev/null 2>/dev/null
selfserv with PID 2132 found at Wed Nov 28 11:15:27 EST 2012
ssl.sh: #7373: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 2132 >/dev/null 2>/dev/null
selfserv with PID 2132 found at Wed Nov 28 11:15:27 EST 2012
ssl.sh: #7374: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser43-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 2132 >/dev/null 2>/dev/null
selfserv with PID 2132 found at Wed Nov 28 11:15:27 EST 2012
ssl.sh: #7375: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser44-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 2132 >/dev/null 2>/dev/null
selfserv with PID 2132 found at Wed Nov 28 11:15:27 EST 2012
ssl.sh: #7376: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser45-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 2132 >/dev/null 2>/dev/null
selfserv with PID 2132 found at Wed Nov 28 11:15:28 EST 2012
ssl.sh: #7377: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser46-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2132 >/dev/null 2>/dev/null
selfserv with PID 2132 found at Wed Nov 28 11:15:28 EST 2012
ssl.sh: #7378: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser47-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 2132 >/dev/null 2>/dev/null
selfserv with PID 2132 found at Wed Nov 28 11:15:28 EST 2012
ssl.sh: #7379: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser48-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 2132 >/dev/null 2>/dev/null
selfserv with PID 2132 found at Wed Nov 28 11:15:28 EST 2012
ssl.sh: #7380: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser49-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 2132 >/dev/null 2>/dev/null
selfserv with PID 2132 found at Wed Nov 28 11:15:28 EST 2012
ssl.sh: #7381: TLS Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser50-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 2132 >/dev/null 2>/dev/null
selfserv with PID 2132 found at Wed Nov 28 11:15:29 EST 2012
ssl.sh: #7382: TLS Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser51-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2132 >/dev/null 2>/dev/null
selfserv with PID 2132 found at Wed Nov 28 11:15:29 EST 2012
ssl.sh: #7383: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser52-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 2132 >/dev/null 2>/dev/null
selfserv with PID 2132 found at Wed Nov 28 11:15:29 EST 2012
ssl.sh: #7384: TLS Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 2132 at Wed Nov 28 11:15:29 EST 2012
kill -USR1 2132
selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 2132 killed at Wed Nov 28 11:15:29 EST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:15:29 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:15:29 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 3599 >/dev/null 2>/dev/null
selfserv with PID 3599 found at Wed Nov 28 11:15:29 EST 2012
selfserv with PID 3599 started at Wed Nov 28 11:15:29 EST 2012
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 3599 >/dev/null 2>/dev/null
selfserv with PID 3599 found at Wed Nov 28 11:15:29 EST 2012
ssl.sh: #7385: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3599 >/dev/null 2>/dev/null
selfserv with PID 3599 found at Wed Nov 28 11:15:30 EST 2012
ssl.sh: #7386: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 3599 >/dev/null 2>/dev/null
selfserv with PID 3599 found at Wed Nov 28 11:15:30 EST 2012
ssl.sh: #7387: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser43-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3599 >/dev/null 2>/dev/null
selfserv with PID 3599 found at Wed Nov 28 11:15:30 EST 2012
ssl.sh: #7388: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser44-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3599 >/dev/null 2>/dev/null
selfserv with PID 3599 found at Wed Nov 28 11:15:30 EST 2012
ssl.sh: #7389: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser45-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3599 >/dev/null 2>/dev/null
selfserv with PID 3599 found at Wed Nov 28 11:15:30 EST 2012
ssl.sh: #7390: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser46-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3599 >/dev/null 2>/dev/null
selfserv with PID 3599 found at Wed Nov 28 11:15:31 EST 2012
ssl.sh: #7391: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser47-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3599 >/dev/null 2>/dev/null
selfserv with PID 3599 found at Wed Nov 28 11:15:31 EST 2012
ssl.sh: #7392: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser48-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3599 >/dev/null 2>/dev/null
selfserv with PID 3599 found at Wed Nov 28 11:15:31 EST 2012
ssl.sh: #7393: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser49-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3599 >/dev/null 2>/dev/null
selfserv with PID 3599 found at Wed Nov 28 11:15:31 EST 2012
ssl.sh: #7394: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser50-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3599 >/dev/null 2>/dev/null
selfserv with PID 3599 found at Wed Nov 28 11:15:31 EST 2012
ssl.sh: #7395: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser51-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3599 >/dev/null 2>/dev/null
selfserv with PID 3599 found at Wed Nov 28 11:15:32 EST 2012
ssl.sh: #7396: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser52-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3599 >/dev/null 2>/dev/null
selfserv with PID 3599 found at Wed Nov 28 11:15:32 EST 2012
ssl.sh: #7397: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/server/root.crl_43-48-ec

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 164 bytes
tstclnt: Writing 164 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3599 >/dev/null 2>/dev/null
selfserv with PID 3599 found at Wed Nov 28 11:15:32 EST 2012
================= CRL Reloaded =============
ssl.sh: #7398: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 3599 >/dev/null 2>/dev/null
selfserv with PID 3599 found at Wed Nov 28 11:15:32 EST 2012
ssl.sh: #7399: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3599 >/dev/null 2>/dev/null
selfserv with PID 3599 found at Wed Nov 28 11:15:32 EST 2012
ssl.sh: #7400: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 3599 >/dev/null 2>/dev/null
selfserv with PID 3599 found at Wed Nov 28 11:15:33 EST 2012
ssl.sh: #7401: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser43-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 3599 >/dev/null 2>/dev/null
selfserv with PID 3599 found at Wed Nov 28 11:15:33 EST 2012
ssl.sh: #7402: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser44-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 3599 >/dev/null 2>/dev/null
selfserv with PID 3599 found at Wed Nov 28 11:15:33 EST 2012
ssl.sh: #7403: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser45-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 3599 >/dev/null 2>/dev/null
selfserv with PID 3599 found at Wed Nov 28 11:15:33 EST 2012
ssl.sh: #7404: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser46-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3599 >/dev/null 2>/dev/null
selfserv with PID 3599 found at Wed Nov 28 11:15:33 EST 2012
ssl.sh: #7405: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser47-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 3599 >/dev/null 2>/dev/null
selfserv with PID 3599 found at Wed Nov 28 11:15:33 EST 2012
ssl.sh: #7406: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser48-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 3599 >/dev/null 2>/dev/null
selfserv with PID 3599 found at Wed Nov 28 11:15:34 EST 2012
ssl.sh: #7407: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser49-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3599 >/dev/null 2>/dev/null
selfserv with PID 3599 found at Wed Nov 28 11:15:34 EST 2012
ssl.sh: #7408: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser50-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3599 >/dev/null 2>/dev/null
selfserv with PID 3599 found at Wed Nov 28 11:15:34 EST 2012
ssl.sh: #7409: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser51-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3599 >/dev/null 2>/dev/null
selfserv with PID 3599 found at Wed Nov 28 11:15:34 EST 2012
ssl.sh: #7410: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser52-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3599 >/dev/null 2>/dev/null
selfserv with PID 3599 found at Wed Nov 28 11:15:35 EST 2012
ssl.sh: #7411: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/server/root.crl_49-52-ec

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 164 bytes
tstclnt: Writing 164 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3599 >/dev/null 2>/dev/null
selfserv with PID 3599 found at Wed Nov 28 11:15:35 EST 2012
================= CRL Reloaded =============
ssl.sh: #7412: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 3599 >/dev/null 2>/dev/null
selfserv with PID 3599 found at Wed Nov 28 11:15:35 EST 2012
ssl.sh: #7413: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3599 >/dev/null 2>/dev/null
selfserv with PID 3599 found at Wed Nov 28 11:15:35 EST 2012
ssl.sh: #7414: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 3599 >/dev/null 2>/dev/null
selfserv with PID 3599 found at Wed Nov 28 11:15:35 EST 2012
ssl.sh: #7415: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser43-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 3599 >/dev/null 2>/dev/null
selfserv with PID 3599 found at Wed Nov 28 11:15:35 EST 2012
ssl.sh: #7416: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser44-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 3599 >/dev/null 2>/dev/null
selfserv with PID 3599 found at Wed Nov 28 11:15:36 EST 2012
ssl.sh: #7417: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser45-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 3599 >/dev/null 2>/dev/null
selfserv with PID 3599 found at Wed Nov 28 11:15:36 EST 2012
ssl.sh: #7418: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser46-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3599 >/dev/null 2>/dev/null
selfserv with PID 3599 found at Wed Nov 28 11:15:36 EST 2012
ssl.sh: #7419: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser47-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 3599 >/dev/null 2>/dev/null
selfserv with PID 3599 found at Wed Nov 28 11:15:36 EST 2012
ssl.sh: #7420: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser48-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 3599 >/dev/null 2>/dev/null
selfserv with PID 3599 found at Wed Nov 28 11:15:36 EST 2012
ssl.sh: #7421: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser49-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 3599 >/dev/null 2>/dev/null
selfserv with PID 3599 found at Wed Nov 28 11:15:37 EST 2012
ssl.sh: #7422: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser50-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 3599 >/dev/null 2>/dev/null
selfserv with PID 3599 found at Wed Nov 28 11:15:37 EST 2012
ssl.sh: #7423: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser51-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3599 >/dev/null 2>/dev/null
selfserv with PID 3599 found at Wed Nov 28 11:15:37 EST 2012
ssl.sh: #7424: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser52-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 3599 >/dev/null 2>/dev/null
selfserv with PID 3599 found at Wed Nov 28 11:15:37 EST 2012
ssl.sh: #7425: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 3599 at Wed Nov 28 11:15:37 EST 2012
kill -USR1 3599
selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 3599 killed at Wed Nov 28 11:15:37 EST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:15:37 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:15:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 5062 >/dev/null 2>/dev/null
selfserv with PID 5062 found at Wed Nov 28 11:15:37 EST 2012
selfserv with PID 5062 started at Wed Nov 28 11:15:37 EST 2012
trying to kill selfserv with PID 5062 at Wed Nov 28 11:15:37 EST 2012
kill -USR1 5062
./ssl.sh: line 173:  5062 User defined signal 1   ${PROFTOOL} ${BINDIR}/selfserv -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 5062 killed at Wed Nov 28 11:15:37 EST 2012
selfserv starting at Wed Nov 28 11:15:37 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:15:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 5096 >/dev/null 2>/dev/null
selfserv with PID 5096 found at Wed Nov 28 11:15:37 EST 2012
selfserv with PID 5096 started at Wed Nov 28 11:15:37 EST 2012
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5096 >/dev/null 2>/dev/null
selfserv with PID 5096 found at Wed Nov 28 11:15:38 EST 2012
ssl.sh: #7426: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5096 >/dev/null 2>/dev/null
selfserv with PID 5096 found at Wed Nov 28 11:15:38 EST 2012
ssl.sh: #7427: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5096 >/dev/null 2>/dev/null
selfserv with PID 5096 found at Wed Nov 28 11:15:38 EST 2012
ssl.sh: #7428: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5096 >/dev/null 2>/dev/null
selfserv with PID 5096 found at Wed Nov 28 11:15:38 EST 2012
ssl.sh: #7429: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5096 >/dev/null 2>/dev/null
selfserv with PID 5096 found at Wed Nov 28 11:15:38 EST 2012
ssl.sh: #7430: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5096 >/dev/null 2>/dev/null
selfserv with PID 5096 found at Wed Nov 28 11:15:39 EST 2012
ssl.sh: #7431: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5096 >/dev/null 2>/dev/null
selfserv with PID 5096 found at Wed Nov 28 11:15:39 EST 2012
ssl.sh: #7432: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5096 >/dev/null 2>/dev/null
selfserv with PID 5096 found at Wed Nov 28 11:15:39 EST 2012
ssl.sh: #7433: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5096 >/dev/null 2>/dev/null
selfserv with PID 5096 found at Wed Nov 28 11:15:39 EST 2012
ssl.sh: #7434: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5096 >/dev/null 2>/dev/null
selfserv with PID 5096 found at Wed Nov 28 11:15:39 EST 2012
ssl.sh: #7435: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5096 >/dev/null 2>/dev/null
selfserv with PID 5096 found at Wed Nov 28 11:15:40 EST 2012
ssl.sh: #7436: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5096 >/dev/null 2>/dev/null
selfserv with PID 5096 found at Wed Nov 28 11:15:40 EST 2012
ssl.sh: #7437: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5096 >/dev/null 2>/dev/null
selfserv with PID 5096 found at Wed Nov 28 11:15:40 EST 2012
ssl.sh: #7438: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/server/root.crl_43-48

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 161 bytes
tstclnt: Writing 161 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5096 >/dev/null 2>/dev/null
selfserv with PID 5096 found at Wed Nov 28 11:15:40 EST 2012
================= CRL Reloaded =============
ssl.sh: #7439: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5096 >/dev/null 2>/dev/null
selfserv with PID 5096 found at Wed Nov 28 11:15:40 EST 2012
ssl.sh: #7440: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5096 >/dev/null 2>/dev/null
selfserv with PID 5096 found at Wed Nov 28 11:15:40 EST 2012
ssl.sh: #7441: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5096 >/dev/null 2>/dev/null
selfserv with PID 5096 found at Wed Nov 28 11:15:41 EST 2012
ssl.sh: #7442: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5096 >/dev/null 2>/dev/null
selfserv with PID 5096 found at Wed Nov 28 11:15:41 EST 2012
ssl.sh: #7443: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5096 >/dev/null 2>/dev/null
selfserv with PID 5096 found at Wed Nov 28 11:15:41 EST 2012
ssl.sh: #7444: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5096 >/dev/null 2>/dev/null
selfserv with PID 5096 found at Wed Nov 28 11:15:41 EST 2012
ssl.sh: #7445: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5096 >/dev/null 2>/dev/null
selfserv with PID 5096 found at Wed Nov 28 11:15:41 EST 2012
ssl.sh: #7446: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5096 >/dev/null 2>/dev/null
selfserv with PID 5096 found at Wed Nov 28 11:15:42 EST 2012
ssl.sh: #7447: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5096 >/dev/null 2>/dev/null
selfserv with PID 5096 found at Wed Nov 28 11:15:42 EST 2012
ssl.sh: #7448: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5096 >/dev/null 2>/dev/null
selfserv with PID 5096 found at Wed Nov 28 11:15:42 EST 2012
ssl.sh: #7449: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5096 >/dev/null 2>/dev/null
selfserv with PID 5096 found at Wed Nov 28 11:15:42 EST 2012
ssl.sh: #7450: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5096 >/dev/null 2>/dev/null
selfserv with PID 5096 found at Wed Nov 28 11:15:42 EST 2012
ssl.sh: #7451: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5096 >/dev/null 2>/dev/null
selfserv with PID 5096 found at Wed Nov 28 11:15:42 EST 2012
ssl.sh: #7452: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/server/root.crl_49-52

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 161 bytes
tstclnt: Writing 161 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5096 >/dev/null 2>/dev/null
selfserv with PID 5096 found at Wed Nov 28 11:15:43 EST 2012
================= CRL Reloaded =============
ssl.sh: #7453: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5096 >/dev/null 2>/dev/null
selfserv with PID 5096 found at Wed Nov 28 11:15:43 EST 2012
ssl.sh: #7454: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5096 >/dev/null 2>/dev/null
selfserv with PID 5096 found at Wed Nov 28 11:15:43 EST 2012
ssl.sh: #7455: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5096 >/dev/null 2>/dev/null
selfserv with PID 5096 found at Wed Nov 28 11:15:43 EST 2012
ssl.sh: #7456: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5096 >/dev/null 2>/dev/null
selfserv with PID 5096 found at Wed Nov 28 11:15:43 EST 2012
ssl.sh: #7457: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5096 >/dev/null 2>/dev/null
selfserv with PID 5096 found at Wed Nov 28 11:15:43 EST 2012
ssl.sh: #7458: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5096 >/dev/null 2>/dev/null
selfserv with PID 5096 found at Wed Nov 28 11:15:44 EST 2012
ssl.sh: #7459: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5096 >/dev/null 2>/dev/null
selfserv with PID 5096 found at Wed Nov 28 11:15:44 EST 2012
ssl.sh: #7460: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5096 >/dev/null 2>/dev/null
selfserv with PID 5096 found at Wed Nov 28 11:15:44 EST 2012
ssl.sh: #7461: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5096 >/dev/null 2>/dev/null
selfserv with PID 5096 found at Wed Nov 28 11:15:44 EST 2012
ssl.sh: #7462: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5096 >/dev/null 2>/dev/null
selfserv with PID 5096 found at Wed Nov 28 11:15:44 EST 2012
ssl.sh: #7463: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5096 >/dev/null 2>/dev/null
selfserv with PID 5096 found at Wed Nov 28 11:15:45 EST 2012
ssl.sh: #7464: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5096 >/dev/null 2>/dev/null
selfserv with PID 5096 found at Wed Nov 28 11:15:45 EST 2012
ssl.sh: #7465: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5096 >/dev/null 2>/dev/null
selfserv with PID 5096 found at Wed Nov 28 11:15:45 EST 2012
ssl.sh: #7466: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 5096 at Wed Nov 28 11:15:45 EST 2012
kill -USR1 5096
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 5096 killed at Wed Nov 28 11:15:45 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:15:45 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:15:45 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 6559 >/dev/null 2>/dev/null
selfserv with PID 6559 found at Wed Nov 28 11:15:45 EST 2012
selfserv with PID 6559 started at Wed Nov 28 11:15:45 EST 2012
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6559 >/dev/null 2>/dev/null
selfserv with PID 6559 found at Wed Nov 28 11:15:45 EST 2012
ssl.sh: #7467: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6559 >/dev/null 2>/dev/null
selfserv with PID 6559 found at Wed Nov 28 11:15:46 EST 2012
ssl.sh: #7468: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6559 >/dev/null 2>/dev/null
selfserv with PID 6559 found at Wed Nov 28 11:15:46 EST 2012
ssl.sh: #7469: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6559 >/dev/null 2>/dev/null
selfserv with PID 6559 found at Wed Nov 28 11:15:46 EST 2012
ssl.sh: #7470: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6559 >/dev/null 2>/dev/null
selfserv with PID 6559 found at Wed Nov 28 11:15:46 EST 2012
ssl.sh: #7471: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6559 >/dev/null 2>/dev/null
selfserv with PID 6559 found at Wed Nov 28 11:15:46 EST 2012
ssl.sh: #7472: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6559 >/dev/null 2>/dev/null
selfserv with PID 6559 found at Wed Nov 28 11:15:46 EST 2012
ssl.sh: #7473: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6559 >/dev/null 2>/dev/null
selfserv with PID 6559 found at Wed Nov 28 11:15:47 EST 2012
ssl.sh: #7474: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6559 >/dev/null 2>/dev/null
selfserv with PID 6559 found at Wed Nov 28 11:15:47 EST 2012
ssl.sh: #7475: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6559 >/dev/null 2>/dev/null
selfserv with PID 6559 found at Wed Nov 28 11:15:47 EST 2012
ssl.sh: #7476: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6559 >/dev/null 2>/dev/null
selfserv with PID 6559 found at Wed Nov 28 11:15:47 EST 2012
ssl.sh: #7477: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6559 >/dev/null 2>/dev/null
selfserv with PID 6559 found at Wed Nov 28 11:15:47 EST 2012
ssl.sh: #7478: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6559 >/dev/null 2>/dev/null
selfserv with PID 6559 found at Wed Nov 28 11:15:48 EST 2012
ssl.sh: #7479: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/server/root.crl_43-48

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 161 bytes
tstclnt: Writing 161 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6559 >/dev/null 2>/dev/null
selfserv with PID 6559 found at Wed Nov 28 11:15:48 EST 2012
================= CRL Reloaded =============
ssl.sh: #7480: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6559 >/dev/null 2>/dev/null
selfserv with PID 6559 found at Wed Nov 28 11:15:48 EST 2012
ssl.sh: #7481: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6559 >/dev/null 2>/dev/null
selfserv with PID 6559 found at Wed Nov 28 11:15:48 EST 2012
ssl.sh: #7482: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6559 >/dev/null 2>/dev/null
selfserv with PID 6559 found at Wed Nov 28 11:15:48 EST 2012
ssl.sh: #7483: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6559 >/dev/null 2>/dev/null
selfserv with PID 6559 found at Wed Nov 28 11:15:48 EST 2012
ssl.sh: #7484: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6559 >/dev/null 2>/dev/null
selfserv with PID 6559 found at Wed Nov 28 11:15:49 EST 2012
ssl.sh: #7485: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6559 >/dev/null 2>/dev/null
selfserv with PID 6559 found at Wed Nov 28 11:15:49 EST 2012
ssl.sh: #7486: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6559 >/dev/null 2>/dev/null
selfserv with PID 6559 found at Wed Nov 28 11:15:49 EST 2012
ssl.sh: #7487: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6559 >/dev/null 2>/dev/null
selfserv with PID 6559 found at Wed Nov 28 11:15:49 EST 2012
ssl.sh: #7488: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6559 >/dev/null 2>/dev/null
selfserv with PID 6559 found at Wed Nov 28 11:15:49 EST 2012
ssl.sh: #7489: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6559 >/dev/null 2>/dev/null
selfserv with PID 6559 found at Wed Nov 28 11:15:49 EST 2012
ssl.sh: #7490: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6559 >/dev/null 2>/dev/null
selfserv with PID 6559 found at Wed Nov 28 11:15:50 EST 2012
ssl.sh: #7491: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6559 >/dev/null 2>/dev/null
selfserv with PID 6559 found at Wed Nov 28 11:15:50 EST 2012
ssl.sh: #7492: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6559 >/dev/null 2>/dev/null
selfserv with PID 6559 found at Wed Nov 28 11:15:50 EST 2012
ssl.sh: #7493: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/server/root.crl_49-52

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 161 bytes
tstclnt: Writing 161 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6559 >/dev/null 2>/dev/null
selfserv with PID 6559 found at Wed Nov 28 11:15:50 EST 2012
================= CRL Reloaded =============
ssl.sh: #7494: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6559 >/dev/null 2>/dev/null
selfserv with PID 6559 found at Wed Nov 28 11:15:50 EST 2012
ssl.sh: #7495: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6559 >/dev/null 2>/dev/null
selfserv with PID 6559 found at Wed Nov 28 11:15:51 EST 2012
ssl.sh: #7496: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6559 >/dev/null 2>/dev/null
selfserv with PID 6559 found at Wed Nov 28 11:15:51 EST 2012
ssl.sh: #7497: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6559 >/dev/null 2>/dev/null
selfserv with PID 6559 found at Wed Nov 28 11:15:51 EST 2012
ssl.sh: #7498: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6559 >/dev/null 2>/dev/null
selfserv with PID 6559 found at Wed Nov 28 11:15:51 EST 2012
ssl.sh: #7499: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6559 >/dev/null 2>/dev/null
selfserv with PID 6559 found at Wed Nov 28 11:15:51 EST 2012
ssl.sh: #7500: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6559 >/dev/null 2>/dev/null
selfserv with PID 6559 found at Wed Nov 28 11:15:51 EST 2012
ssl.sh: #7501: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6559 >/dev/null 2>/dev/null
selfserv with PID 6559 found at Wed Nov 28 11:15:52 EST 2012
ssl.sh: #7502: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6559 >/dev/null 2>/dev/null
selfserv with PID 6559 found at Wed Nov 28 11:15:52 EST 2012
ssl.sh: #7503: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6559 >/dev/null 2>/dev/null
selfserv with PID 6559 found at Wed Nov 28 11:15:52 EST 2012
ssl.sh: #7504: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6559 >/dev/null 2>/dev/null
selfserv with PID 6559 found at Wed Nov 28 11:15:52 EST 2012
ssl.sh: #7505: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6559 >/dev/null 2>/dev/null
selfserv with PID 6559 found at Wed Nov 28 11:15:52 EST 2012
ssl.sh: #7506: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6559 >/dev/null 2>/dev/null
selfserv with PID 6559 found at Wed Nov 28 11:15:53 EST 2012
ssl.sh: #7507: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 6559 at Wed Nov 28 11:15:53 EST 2012
kill -USR1 6559
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 6559 killed at Wed Nov 28 11:15:53 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:15:53 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:15:53 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 8021 >/dev/null 2>/dev/null
selfserv with PID 8021 found at Wed Nov 28 11:15:53 EST 2012
selfserv with PID 8021 started at Wed Nov 28 11:15:53 EST 2012
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8021 >/dev/null 2>/dev/null
selfserv with PID 8021 found at Wed Nov 28 11:15:53 EST 2012
ssl.sh: #7508: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8021 >/dev/null 2>/dev/null
selfserv with PID 8021 found at Wed Nov 28 11:15:53 EST 2012
ssl.sh: #7509: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8021 >/dev/null 2>/dev/null
selfserv with PID 8021 found at Wed Nov 28 11:15:53 EST 2012
ssl.sh: #7510: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8021 >/dev/null 2>/dev/null
selfserv with PID 8021 found at Wed Nov 28 11:15:53 EST 2012
ssl.sh: #7511: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8021 >/dev/null 2>/dev/null
selfserv with PID 8021 found at Wed Nov 28 11:15:54 EST 2012
ssl.sh: #7512: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8021 >/dev/null 2>/dev/null
selfserv with PID 8021 found at Wed Nov 28 11:15:54 EST 2012
ssl.sh: #7513: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8021 >/dev/null 2>/dev/null
selfserv with PID 8021 found at Wed Nov 28 11:15:54 EST 2012
ssl.sh: #7514: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8021 >/dev/null 2>/dev/null
selfserv with PID 8021 found at Wed Nov 28 11:15:54 EST 2012
ssl.sh: #7515: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8021 >/dev/null 2>/dev/null
selfserv with PID 8021 found at Wed Nov 28 11:15:54 EST 2012
ssl.sh: #7516: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8021 >/dev/null 2>/dev/null
selfserv with PID 8021 found at Wed Nov 28 11:15:55 EST 2012
ssl.sh: #7517: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8021 >/dev/null 2>/dev/null
selfserv with PID 8021 found at Wed Nov 28 11:15:55 EST 2012
ssl.sh: #7518: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8021 >/dev/null 2>/dev/null
selfserv with PID 8021 found at Wed Nov 28 11:15:55 EST 2012
ssl.sh: #7519: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8021 >/dev/null 2>/dev/null
selfserv with PID 8021 found at Wed Nov 28 11:15:55 EST 2012
ssl.sh: #7520: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/server/root.crl_43-48

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 161 bytes
tstclnt: Writing 161 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8021 >/dev/null 2>/dev/null
selfserv with PID 8021 found at Wed Nov 28 11:15:55 EST 2012
================= CRL Reloaded =============
ssl.sh: #7521: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8021 >/dev/null 2>/dev/null
selfserv with PID 8021 found at Wed Nov 28 11:15:55 EST 2012
ssl.sh: #7522: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8021 >/dev/null 2>/dev/null
selfserv with PID 8021 found at Wed Nov 28 11:15:56 EST 2012
ssl.sh: #7523: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8021 >/dev/null 2>/dev/null
selfserv with PID 8021 found at Wed Nov 28 11:15:56 EST 2012
ssl.sh: #7524: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8021 >/dev/null 2>/dev/null
selfserv with PID 8021 found at Wed Nov 28 11:15:56 EST 2012
ssl.sh: #7525: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8021 >/dev/null 2>/dev/null
selfserv with PID 8021 found at Wed Nov 28 11:15:56 EST 2012
ssl.sh: #7526: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8021 >/dev/null 2>/dev/null
selfserv with PID 8021 found at Wed Nov 28 11:15:56 EST 2012
ssl.sh: #7527: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8021 >/dev/null 2>/dev/null
selfserv with PID 8021 found at Wed Nov 28 11:15:56 EST 2012
ssl.sh: #7528: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8021 >/dev/null 2>/dev/null
selfserv with PID 8021 found at Wed Nov 28 11:15:57 EST 2012
ssl.sh: #7529: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8021 >/dev/null 2>/dev/null
selfserv with PID 8021 found at Wed Nov 28 11:15:57 EST 2012
ssl.sh: #7530: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8021 >/dev/null 2>/dev/null
selfserv with PID 8021 found at Wed Nov 28 11:15:57 EST 2012
ssl.sh: #7531: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8021 >/dev/null 2>/dev/null
selfserv with PID 8021 found at Wed Nov 28 11:15:57 EST 2012
ssl.sh: #7532: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8021 >/dev/null 2>/dev/null
selfserv with PID 8021 found at Wed Nov 28 11:15:57 EST 2012
ssl.sh: #7533: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8021 >/dev/null 2>/dev/null
selfserv with PID 8021 found at Wed Nov 28 11:15:58 EST 2012
ssl.sh: #7534: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/server/root.crl_49-52

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 161 bytes
tstclnt: Writing 161 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8021 >/dev/null 2>/dev/null
selfserv with PID 8021 found at Wed Nov 28 11:15:58 EST 2012
================= CRL Reloaded =============
ssl.sh: #7535: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8021 >/dev/null 2>/dev/null
selfserv with PID 8021 found at Wed Nov 28 11:15:58 EST 2012
ssl.sh: #7536: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8021 >/dev/null 2>/dev/null
selfserv with PID 8021 found at Wed Nov 28 11:15:58 EST 2012
ssl.sh: #7537: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8021 >/dev/null 2>/dev/null
selfserv with PID 8021 found at Wed Nov 28 11:15:58 EST 2012
ssl.sh: #7538: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8021 >/dev/null 2>/dev/null
selfserv with PID 8021 found at Wed Nov 28 11:15:58 EST 2012
ssl.sh: #7539: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8021 >/dev/null 2>/dev/null
selfserv with PID 8021 found at Wed Nov 28 11:15:59 EST 2012
ssl.sh: #7540: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8021 >/dev/null 2>/dev/null
selfserv with PID 8021 found at Wed Nov 28 11:15:59 EST 2012
ssl.sh: #7541: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8021 >/dev/null 2>/dev/null
selfserv with PID 8021 found at Wed Nov 28 11:15:59 EST 2012
ssl.sh: #7542: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8021 >/dev/null 2>/dev/null
selfserv with PID 8021 found at Wed Nov 28 11:15:59 EST 2012
ssl.sh: #7543: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8021 >/dev/null 2>/dev/null
selfserv with PID 8021 found at Wed Nov 28 11:15:59 EST 2012
ssl.sh: #7544: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8021 >/dev/null 2>/dev/null
selfserv with PID 8021 found at Wed Nov 28 11:15:59 EST 2012
ssl.sh: #7545: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8021 >/dev/null 2>/dev/null
selfserv with PID 8021 found at Wed Nov 28 11:16:00 EST 2012
ssl.sh: #7546: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8021 >/dev/null 2>/dev/null
selfserv with PID 8021 found at Wed Nov 28 11:16:00 EST 2012
ssl.sh: #7547: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8021 >/dev/null 2>/dev/null
selfserv with PID 8021 found at Wed Nov 28 11:16:00 EST 2012
ssl.sh: #7548: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 8021 at Wed Nov 28 11:16:00 EST 2012
kill -USR1 8021
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 8021 killed at Wed Nov 28 11:16:00 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:16:00 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:16:00 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 9485 >/dev/null 2>/dev/null
selfserv with PID 9485 found at Wed Nov 28 11:16:00 EST 2012
selfserv with PID 9485 started at Wed Nov 28 11:16:00 EST 2012
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9485 >/dev/null 2>/dev/null
selfserv with PID 9485 found at Wed Nov 28 11:16:00 EST 2012
ssl.sh: #7549: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9485 >/dev/null 2>/dev/null
selfserv with PID 9485 found at Wed Nov 28 11:16:01 EST 2012
ssl.sh: #7550: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9485 >/dev/null 2>/dev/null
selfserv with PID 9485 found at Wed Nov 28 11:16:01 EST 2012
ssl.sh: #7551: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9485 >/dev/null 2>/dev/null
selfserv with PID 9485 found at Wed Nov 28 11:16:01 EST 2012
ssl.sh: #7552: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9485 >/dev/null 2>/dev/null
selfserv with PID 9485 found at Wed Nov 28 11:16:01 EST 2012
ssl.sh: #7553: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9485 >/dev/null 2>/dev/null
selfserv with PID 9485 found at Wed Nov 28 11:16:01 EST 2012
ssl.sh: #7554: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9485 >/dev/null 2>/dev/null
selfserv with PID 9485 found at Wed Nov 28 11:16:02 EST 2012
ssl.sh: #7555: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9485 >/dev/null 2>/dev/null
selfserv with PID 9485 found at Wed Nov 28 11:16:02 EST 2012
ssl.sh: #7556: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9485 >/dev/null 2>/dev/null
selfserv with PID 9485 found at Wed Nov 28 11:16:02 EST 2012
ssl.sh: #7557: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9485 >/dev/null 2>/dev/null
selfserv with PID 9485 found at Wed Nov 28 11:16:02 EST 2012
ssl.sh: #7558: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9485 >/dev/null 2>/dev/null
selfserv with PID 9485 found at Wed Nov 28 11:16:02 EST 2012
ssl.sh: #7559: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9485 >/dev/null 2>/dev/null
selfserv with PID 9485 found at Wed Nov 28 11:16:03 EST 2012
ssl.sh: #7560: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9485 >/dev/null 2>/dev/null
selfserv with PID 9485 found at Wed Nov 28 11:16:03 EST 2012
ssl.sh: #7561: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/server/root.crl_43-48-ec

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 164 bytes
tstclnt: Writing 164 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9485 >/dev/null 2>/dev/null
selfserv with PID 9485 found at Wed Nov 28 11:16:03 EST 2012
================= CRL Reloaded =============
ssl.sh: #7562: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9485 >/dev/null 2>/dev/null
selfserv with PID 9485 found at Wed Nov 28 11:16:03 EST 2012
ssl.sh: #7563: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9485 >/dev/null 2>/dev/null
selfserv with PID 9485 found at Wed Nov 28 11:16:03 EST 2012
ssl.sh: #7564: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9485 >/dev/null 2>/dev/null
selfserv with PID 9485 found at Wed Nov 28 11:16:04 EST 2012
ssl.sh: #7565: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9485 >/dev/null 2>/dev/null
selfserv with PID 9485 found at Wed Nov 28 11:16:04 EST 2012
ssl.sh: #7566: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9485 >/dev/null 2>/dev/null
selfserv with PID 9485 found at Wed Nov 28 11:16:04 EST 2012
ssl.sh: #7567: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9485 >/dev/null 2>/dev/null
selfserv with PID 9485 found at Wed Nov 28 11:16:04 EST 2012
ssl.sh: #7568: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9485 >/dev/null 2>/dev/null
selfserv with PID 9485 found at Wed Nov 28 11:16:04 EST 2012
ssl.sh: #7569: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9485 >/dev/null 2>/dev/null
selfserv with PID 9485 found at Wed Nov 28 11:16:04 EST 2012
ssl.sh: #7570: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9485 >/dev/null 2>/dev/null
selfserv with PID 9485 found at Wed Nov 28 11:16:05 EST 2012
ssl.sh: #7571: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9485 >/dev/null 2>/dev/null
selfserv with PID 9485 found at Wed Nov 28 11:16:05 EST 2012
ssl.sh: #7572: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9485 >/dev/null 2>/dev/null
selfserv with PID 9485 found at Wed Nov 28 11:16:05 EST 2012
ssl.sh: #7573: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9485 >/dev/null 2>/dev/null
selfserv with PID 9485 found at Wed Nov 28 11:16:05 EST 2012
ssl.sh: #7574: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9485 >/dev/null 2>/dev/null
selfserv with PID 9485 found at Wed Nov 28 11:16:05 EST 2012
ssl.sh: #7575: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/server/root.crl_49-52-ec

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 164 bytes
tstclnt: Writing 164 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9485 >/dev/null 2>/dev/null
selfserv with PID 9485 found at Wed Nov 28 11:16:06 EST 2012
================= CRL Reloaded =============
ssl.sh: #7576: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9485 >/dev/null 2>/dev/null
selfserv with PID 9485 found at Wed Nov 28 11:16:06 EST 2012
ssl.sh: #7577: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9485 >/dev/null 2>/dev/null
selfserv with PID 9485 found at Wed Nov 28 11:16:06 EST 2012
ssl.sh: #7578: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9485 >/dev/null 2>/dev/null
selfserv with PID 9485 found at Wed Nov 28 11:16:06 EST 2012
ssl.sh: #7579: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9485 >/dev/null 2>/dev/null
selfserv with PID 9485 found at Wed Nov 28 11:16:06 EST 2012
ssl.sh: #7580: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9485 >/dev/null 2>/dev/null
selfserv with PID 9485 found at Wed Nov 28 11:16:07 EST 2012
ssl.sh: #7581: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9485 >/dev/null 2>/dev/null
selfserv with PID 9485 found at Wed Nov 28 11:16:07 EST 2012
ssl.sh: #7582: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9485 >/dev/null 2>/dev/null
selfserv with PID 9485 found at Wed Nov 28 11:16:07 EST 2012
ssl.sh: #7583: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9485 >/dev/null 2>/dev/null
selfserv with PID 9485 found at Wed Nov 28 11:16:07 EST 2012
ssl.sh: #7584: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9485 >/dev/null 2>/dev/null
selfserv with PID 9485 found at Wed Nov 28 11:16:07 EST 2012
ssl.sh: #7585: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9485 >/dev/null 2>/dev/null
selfserv with PID 9485 found at Wed Nov 28 11:16:08 EST 2012
ssl.sh: #7586: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9485 >/dev/null 2>/dev/null
selfserv with PID 9485 found at Wed Nov 28 11:16:08 EST 2012
ssl.sh: #7587: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9485 >/dev/null 2>/dev/null
selfserv with PID 9485 found at Wed Nov 28 11:16:08 EST 2012
ssl.sh: #7588: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9485 >/dev/null 2>/dev/null
selfserv with PID 9485 found at Wed Nov 28 11:16:08 EST 2012
ssl.sh: #7589: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 9485 at Wed Nov 28 11:16:08 EST 2012
kill -USR1 9485
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 9485 killed at Wed Nov 28 11:16:08 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:16:08 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:16:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 10960 >/dev/null 2>/dev/null
selfserv with PID 10960 found at Wed Nov 28 11:16:08 EST 2012
selfserv with PID 10960 started at Wed Nov 28 11:16:08 EST 2012
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10960 >/dev/null 2>/dev/null
selfserv with PID 10960 found at Wed Nov 28 11:16:09 EST 2012
ssl.sh: #7590: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10960 >/dev/null 2>/dev/null
selfserv with PID 10960 found at Wed Nov 28 11:16:09 EST 2012
ssl.sh: #7591: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10960 >/dev/null 2>/dev/null
selfserv with PID 10960 found at Wed Nov 28 11:16:09 EST 2012
ssl.sh: #7592: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10960 >/dev/null 2>/dev/null
selfserv with PID 10960 found at Wed Nov 28 11:16:09 EST 2012
ssl.sh: #7593: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10960 >/dev/null 2>/dev/null
selfserv with PID 10960 found at Wed Nov 28 11:16:09 EST 2012
ssl.sh: #7594: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10960 >/dev/null 2>/dev/null
selfserv with PID 10960 found at Wed Nov 28 11:16:09 EST 2012
ssl.sh: #7595: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10960 >/dev/null 2>/dev/null
selfserv with PID 10960 found at Wed Nov 28 11:16:10 EST 2012
ssl.sh: #7596: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10960 >/dev/null 2>/dev/null
selfserv with PID 10960 found at Wed Nov 28 11:16:10 EST 2012
ssl.sh: #7597: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10960 >/dev/null 2>/dev/null
selfserv with PID 10960 found at Wed Nov 28 11:16:10 EST 2012
ssl.sh: #7598: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10960 >/dev/null 2>/dev/null
selfserv with PID 10960 found at Wed Nov 28 11:16:10 EST 2012
ssl.sh: #7599: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10960 >/dev/null 2>/dev/null
selfserv with PID 10960 found at Wed Nov 28 11:16:10 EST 2012
ssl.sh: #7600: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10960 >/dev/null 2>/dev/null
selfserv with PID 10960 found at Wed Nov 28 11:16:11 EST 2012
ssl.sh: #7601: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10960 >/dev/null 2>/dev/null
selfserv with PID 10960 found at Wed Nov 28 11:16:11 EST 2012
ssl.sh: #7602: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/server/root.crl_43-48-ec

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 164 bytes
tstclnt: Writing 164 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10960 >/dev/null 2>/dev/null
selfserv with PID 10960 found at Wed Nov 28 11:16:11 EST 2012
================= CRL Reloaded =============
ssl.sh: #7603: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10960 >/dev/null 2>/dev/null
selfserv with PID 10960 found at Wed Nov 28 11:16:11 EST 2012
ssl.sh: #7604: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10960 >/dev/null 2>/dev/null
selfserv with PID 10960 found at Wed Nov 28 11:16:11 EST 2012
ssl.sh: #7605: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10960 >/dev/null 2>/dev/null
selfserv with PID 10960 found at Wed Nov 28 11:16:12 EST 2012
ssl.sh: #7606: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10960 >/dev/null 2>/dev/null
selfserv with PID 10960 found at Wed Nov 28 11:16:12 EST 2012
ssl.sh: #7607: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10960 >/dev/null 2>/dev/null
selfserv with PID 10960 found at Wed Nov 28 11:16:12 EST 2012
ssl.sh: #7608: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10960 >/dev/null 2>/dev/null
selfserv with PID 10960 found at Wed Nov 28 11:16:12 EST 2012
ssl.sh: #7609: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10960 >/dev/null 2>/dev/null
selfserv with PID 10960 found at Wed Nov 28 11:16:12 EST 2012
ssl.sh: #7610: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10960 >/dev/null 2>/dev/null
selfserv with PID 10960 found at Wed Nov 28 11:16:13 EST 2012
ssl.sh: #7611: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10960 >/dev/null 2>/dev/null
selfserv with PID 10960 found at Wed Nov 28 11:16:13 EST 2012
ssl.sh: #7612: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10960 >/dev/null 2>/dev/null
selfserv with PID 10960 found at Wed Nov 28 11:16:13 EST 2012
ssl.sh: #7613: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10960 >/dev/null 2>/dev/null
selfserv with PID 10960 found at Wed Nov 28 11:16:13 EST 2012
ssl.sh: #7614: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10960 >/dev/null 2>/dev/null
selfserv with PID 10960 found at Wed Nov 28 11:16:13 EST 2012
ssl.sh: #7615: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10960 >/dev/null 2>/dev/null
selfserv with PID 10960 found at Wed Nov 28 11:16:14 EST 2012
ssl.sh: #7616: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/server/root.crl_49-52-ec

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 164 bytes
tstclnt: Writing 164 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10960 >/dev/null 2>/dev/null
selfserv with PID 10960 found at Wed Nov 28 11:16:14 EST 2012
================= CRL Reloaded =============
ssl.sh: #7617: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10960 >/dev/null 2>/dev/null
selfserv with PID 10960 found at Wed Nov 28 11:16:14 EST 2012
ssl.sh: #7618: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10960 >/dev/null 2>/dev/null
selfserv with PID 10960 found at Wed Nov 28 11:16:14 EST 2012
ssl.sh: #7619: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10960 >/dev/null 2>/dev/null
selfserv with PID 10960 found at Wed Nov 28 11:16:14 EST 2012
ssl.sh: #7620: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10960 >/dev/null 2>/dev/null
selfserv with PID 10960 found at Wed Nov 28 11:16:15 EST 2012
ssl.sh: #7621: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10960 >/dev/null 2>/dev/null
selfserv with PID 10960 found at Wed Nov 28 11:16:15 EST 2012
ssl.sh: #7622: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10960 >/dev/null 2>/dev/null
selfserv with PID 10960 found at Wed Nov 28 11:16:15 EST 2012
ssl.sh: #7623: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10960 >/dev/null 2>/dev/null
selfserv with PID 10960 found at Wed Nov 28 11:16:15 EST 2012
ssl.sh: #7624: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10960 >/dev/null 2>/dev/null
selfserv with PID 10960 found at Wed Nov 28 11:16:15 EST 2012
ssl.sh: #7625: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10960 >/dev/null 2>/dev/null
selfserv with PID 10960 found at Wed Nov 28 11:16:16 EST 2012
ssl.sh: #7626: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10960 >/dev/null 2>/dev/null
selfserv with PID 10960 found at Wed Nov 28 11:16:16 EST 2012
ssl.sh: #7627: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10960 >/dev/null 2>/dev/null
selfserv with PID 10960 found at Wed Nov 28 11:16:16 EST 2012
ssl.sh: #7628: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10960 >/dev/null 2>/dev/null
selfserv with PID 10960 found at Wed Nov 28 11:16:16 EST 2012
ssl.sh: #7629: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10960 >/dev/null 2>/dev/null
selfserv with PID 10960 found at Wed Nov 28 11:16:16 EST 2012
ssl.sh: #7630: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 10960 at Wed Nov 28 11:16:16 EST 2012
kill -USR1 10960
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 10960 killed at Wed Nov 28 11:16:16 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:16:16 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:16:16 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 12427 >/dev/null 2>/dev/null
selfserv with PID 12427 found at Wed Nov 28 11:16:16 EST 2012
selfserv with PID 12427 started at Wed Nov 28 11:16:16 EST 2012
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12427 >/dev/null 2>/dev/null
selfserv with PID 12427 found at Wed Nov 28 11:16:17 EST 2012
ssl.sh: #7631: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12427 >/dev/null 2>/dev/null
selfserv with PID 12427 found at Wed Nov 28 11:16:17 EST 2012
ssl.sh: #7632: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12427 >/dev/null 2>/dev/null
selfserv with PID 12427 found at Wed Nov 28 11:16:17 EST 2012
ssl.sh: #7633: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12427 >/dev/null 2>/dev/null
selfserv with PID 12427 found at Wed Nov 28 11:16:17 EST 2012
ssl.sh: #7634: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12427 >/dev/null 2>/dev/null
selfserv with PID 12427 found at Wed Nov 28 11:16:18 EST 2012
ssl.sh: #7635: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12427 >/dev/null 2>/dev/null
selfserv with PID 12427 found at Wed Nov 28 11:16:18 EST 2012
ssl.sh: #7636: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12427 >/dev/null 2>/dev/null
selfserv with PID 12427 found at Wed Nov 28 11:16:18 EST 2012
ssl.sh: #7637: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12427 >/dev/null 2>/dev/null
selfserv with PID 12427 found at Wed Nov 28 11:16:18 EST 2012
ssl.sh: #7638: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12427 >/dev/null 2>/dev/null
selfserv with PID 12427 found at Wed Nov 28 11:16:18 EST 2012
ssl.sh: #7639: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12427 >/dev/null 2>/dev/null
selfserv with PID 12427 found at Wed Nov 28 11:16:19 EST 2012
ssl.sh: #7640: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12427 >/dev/null 2>/dev/null
selfserv with PID 12427 found at Wed Nov 28 11:16:19 EST 2012
ssl.sh: #7641: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12427 >/dev/null 2>/dev/null
selfserv with PID 12427 found at Wed Nov 28 11:16:19 EST 2012
ssl.sh: #7642: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12427 >/dev/null 2>/dev/null
selfserv with PID 12427 found at Wed Nov 28 11:16:19 EST 2012
ssl.sh: #7643: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/server/root.crl_43-48-ec

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 164 bytes
tstclnt: Writing 164 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12427 >/dev/null 2>/dev/null
selfserv with PID 12427 found at Wed Nov 28 11:16:19 EST 2012
================= CRL Reloaded =============
ssl.sh: #7644: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12427 >/dev/null 2>/dev/null
selfserv with PID 12427 found at Wed Nov 28 11:16:20 EST 2012
ssl.sh: #7645: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12427 >/dev/null 2>/dev/null
selfserv with PID 12427 found at Wed Nov 28 11:16:20 EST 2012
ssl.sh: #7646: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12427 >/dev/null 2>/dev/null
selfserv with PID 12427 found at Wed Nov 28 11:16:20 EST 2012
ssl.sh: #7647: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12427 >/dev/null 2>/dev/null
selfserv with PID 12427 found at Wed Nov 28 11:16:20 EST 2012
ssl.sh: #7648: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12427 >/dev/null 2>/dev/null
selfserv with PID 12427 found at Wed Nov 28 11:16:20 EST 2012
ssl.sh: #7649: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12427 >/dev/null 2>/dev/null
selfserv with PID 12427 found at Wed Nov 28 11:16:20 EST 2012
ssl.sh: #7650: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12427 >/dev/null 2>/dev/null
selfserv with PID 12427 found at Wed Nov 28 11:16:21 EST 2012
ssl.sh: #7651: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12427 >/dev/null 2>/dev/null
selfserv with PID 12427 found at Wed Nov 28 11:16:21 EST 2012
ssl.sh: #7652: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12427 >/dev/null 2>/dev/null
selfserv with PID 12427 found at Wed Nov 28 11:16:21 EST 2012
ssl.sh: #7653: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12427 >/dev/null 2>/dev/null
selfserv with PID 12427 found at Wed Nov 28 11:16:21 EST 2012
ssl.sh: #7654: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12427 >/dev/null 2>/dev/null
selfserv with PID 12427 found at Wed Nov 28 11:16:22 EST 2012
ssl.sh: #7655: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12427 >/dev/null 2>/dev/null
selfserv with PID 12427 found at Wed Nov 28 11:16:22 EST 2012
ssl.sh: #7656: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12427 >/dev/null 2>/dev/null
selfserv with PID 12427 found at Wed Nov 28 11:16:22 EST 2012
ssl.sh: #7657: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/server/root.crl_49-52-ec

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 164 bytes
tstclnt: Writing 164 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12427 >/dev/null 2>/dev/null
selfserv with PID 12427 found at Wed Nov 28 11:16:22 EST 2012
================= CRL Reloaded =============
ssl.sh: #7658: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12427 >/dev/null 2>/dev/null
selfserv with PID 12427 found at Wed Nov 28 11:16:22 EST 2012
ssl.sh: #7659: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12427 >/dev/null 2>/dev/null
selfserv with PID 12427 found at Wed Nov 28 11:16:23 EST 2012
ssl.sh: #7660: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12427 >/dev/null 2>/dev/null
selfserv with PID 12427 found at Wed Nov 28 11:16:23 EST 2012
ssl.sh: #7661: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12427 >/dev/null 2>/dev/null
selfserv with PID 12427 found at Wed Nov 28 11:16:23 EST 2012
ssl.sh: #7662: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12427 >/dev/null 2>/dev/null
selfserv with PID 12427 found at Wed Nov 28 11:16:23 EST 2012
ssl.sh: #7663: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12427 >/dev/null 2>/dev/null
selfserv with PID 12427 found at Wed Nov 28 11:16:23 EST 2012
ssl.sh: #7664: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12427 >/dev/null 2>/dev/null
selfserv with PID 12427 found at Wed Nov 28 11:16:23 EST 2012
ssl.sh: #7665: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12427 >/dev/null 2>/dev/null
selfserv with PID 12427 found at Wed Nov 28 11:16:24 EST 2012
ssl.sh: #7666: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12427 >/dev/null 2>/dev/null
selfserv with PID 12427 found at Wed Nov 28 11:16:24 EST 2012
ssl.sh: #7667: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12427 >/dev/null 2>/dev/null
selfserv with PID 12427 found at Wed Nov 28 11:16:24 EST 2012
ssl.sh: #7668: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12427 >/dev/null 2>/dev/null
selfserv with PID 12427 found at Wed Nov 28 11:16:24 EST 2012
ssl.sh: #7669: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12427 >/dev/null 2>/dev/null
selfserv with PID 12427 found at Wed Nov 28 11:16:24 EST 2012
ssl.sh: #7670: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12427 >/dev/null 2>/dev/null
selfserv with PID 12427 found at Wed Nov 28 11:16:25 EST 2012
ssl.sh: #7671: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 12427 at Wed Nov 28 11:16:25 EST 2012
kill -USR1 12427
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 12427 killed at Wed Nov 28 11:16:25 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:16:25 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:16:25 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 13891 >/dev/null 2>/dev/null
selfserv with PID 13891 found at Wed Nov 28 11:16:25 EST 2012
selfserv with PID 13891 started at Wed Nov 28 11:16:25 EST 2012
trying to kill selfserv with PID 13891 at Wed Nov 28 11:16:25 EST 2012
kill -USR1 13891
./ssl.sh: line 173: 13891 User defined signal 1   ${PROFTOOL} ${BINDIR}/selfserv -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 13891 killed at Wed Nov 28 11:16:25 EST 2012
selfserv starting at Wed Nov 28 11:16:25 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:16:25 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 13925 >/dev/null 2>/dev/null
selfserv with PID 13925 found at Wed Nov 28 11:16:25 EST 2012
selfserv with PID 13925 started at Wed Nov 28 11:16:25 EST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13925 >/dev/null 2>/dev/null
selfserv with PID 13925 found at Wed Nov 28 11:16:25 EST 2012
ssl.sh: #7672: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13925 >/dev/null 2>/dev/null
selfserv with PID 13925 found at Wed Nov 28 11:16:25 EST 2012
ssl.sh: #7673: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13925 >/dev/null 2>/dev/null
selfserv with PID 13925 found at Wed Nov 28 11:16:25 EST 2012
ssl.sh: #7674: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13925 >/dev/null 2>/dev/null
selfserv with PID 13925 found at Wed Nov 28 11:16:25 EST 2012
ssl.sh: #7675: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13925 >/dev/null 2>/dev/null
selfserv with PID 13925 found at Wed Nov 28 11:16:26 EST 2012
ssl.sh: #7676: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13925 >/dev/null 2>/dev/null
selfserv with PID 13925 found at Wed Nov 28 11:16:26 EST 2012
ssl.sh: #7677: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13925 >/dev/null 2>/dev/null
selfserv with PID 13925 found at Wed Nov 28 11:16:26 EST 2012
ssl.sh: #7678: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13925 >/dev/null 2>/dev/null
selfserv with PID 13925 found at Wed Nov 28 11:16:26 EST 2012
ssl.sh: #7679: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13925 >/dev/null 2>/dev/null
selfserv with PID 13925 found at Wed Nov 28 11:16:26 EST 2012
ssl.sh: #7680: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13925 >/dev/null 2>/dev/null
selfserv with PID 13925 found at Wed Nov 28 11:16:27 EST 2012
ssl.sh: #7681: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13925 >/dev/null 2>/dev/null
selfserv with PID 13925 found at Wed Nov 28 11:16:27 EST 2012
ssl.sh: #7682: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13925 >/dev/null 2>/dev/null
selfserv with PID 13925 found at Wed Nov 28 11:16:27 EST 2012
ssl.sh: #7683: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13925 >/dev/null 2>/dev/null
selfserv with PID 13925 found at Wed Nov 28 11:16:27 EST 2012
ssl.sh: #7684: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/server/root.crl_43-48

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 161 bytes
tstclnt: Writing 161 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13925 >/dev/null 2>/dev/null
selfserv with PID 13925 found at Wed Nov 28 11:16:27 EST 2012
================= CRL Reloaded =============
ssl.sh: #7685: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13925 >/dev/null 2>/dev/null
selfserv with PID 13925 found at Wed Nov 28 11:16:27 EST 2012
ssl.sh: #7686: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13925 >/dev/null 2>/dev/null
selfserv with PID 13925 found at Wed Nov 28 11:16:28 EST 2012
ssl.sh: #7687: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13925 >/dev/null 2>/dev/null
selfserv with PID 13925 found at Wed Nov 28 11:16:28 EST 2012
ssl.sh: #7688: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13925 >/dev/null 2>/dev/null
selfserv with PID 13925 found at Wed Nov 28 11:16:28 EST 2012
ssl.sh: #7689: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13925 >/dev/null 2>/dev/null
selfserv with PID 13925 found at Wed Nov 28 11:16:28 EST 2012
ssl.sh: #7690: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13925 >/dev/null 2>/dev/null
selfserv with PID 13925 found at Wed Nov 28 11:16:28 EST 2012
ssl.sh: #7691: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13925 >/dev/null 2>/dev/null
selfserv with PID 13925 found at Wed Nov 28 11:16:28 EST 2012
ssl.sh: #7692: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13925 >/dev/null 2>/dev/null
selfserv with PID 13925 found at Wed Nov 28 11:16:29 EST 2012
ssl.sh: #7693: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13925 >/dev/null 2>/dev/null
selfserv with PID 13925 found at Wed Nov 28 11:16:29 EST 2012
ssl.sh: #7694: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13925 >/dev/null 2>/dev/null
selfserv with PID 13925 found at Wed Nov 28 11:16:29 EST 2012
ssl.sh: #7695: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13925 >/dev/null 2>/dev/null
selfserv with PID 13925 found at Wed Nov 28 11:16:29 EST 2012
ssl.sh: #7696: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13925 >/dev/null 2>/dev/null
selfserv with PID 13925 found at Wed Nov 28 11:16:29 EST 2012
ssl.sh: #7697: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13925 >/dev/null 2>/dev/null
selfserv with PID 13925 found at Wed Nov 28 11:16:30 EST 2012
ssl.sh: #7698: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/server/root.crl_49-52

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 161 bytes
tstclnt: Writing 161 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13925 >/dev/null 2>/dev/null
selfserv with PID 13925 found at Wed Nov 28 11:16:30 EST 2012
================= CRL Reloaded =============
ssl.sh: #7699: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13925 >/dev/null 2>/dev/null
selfserv with PID 13925 found at Wed Nov 28 11:16:30 EST 2012
ssl.sh: #7700: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13925 >/dev/null 2>/dev/null
selfserv with PID 13925 found at Wed Nov 28 11:16:30 EST 2012
ssl.sh: #7701: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13925 >/dev/null 2>/dev/null
selfserv with PID 13925 found at Wed Nov 28 11:16:30 EST 2012
ssl.sh: #7702: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13925 >/dev/null 2>/dev/null
selfserv with PID 13925 found at Wed Nov 28 11:16:30 EST 2012
ssl.sh: #7703: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13925 >/dev/null 2>/dev/null
selfserv with PID 13925 found at Wed Nov 28 11:16:31 EST 2012
ssl.sh: #7704: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13925 >/dev/null 2>/dev/null
selfserv with PID 13925 found at Wed Nov 28 11:16:31 EST 2012
ssl.sh: #7705: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13925 >/dev/null 2>/dev/null
selfserv with PID 13925 found at Wed Nov 28 11:16:31 EST 2012
ssl.sh: #7706: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13925 >/dev/null 2>/dev/null
selfserv with PID 13925 found at Wed Nov 28 11:16:31 EST 2012
ssl.sh: #7707: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13925 >/dev/null 2>/dev/null
selfserv with PID 13925 found at Wed Nov 28 11:16:31 EST 2012
ssl.sh: #7708: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13925 >/dev/null 2>/dev/null
selfserv with PID 13925 found at Wed Nov 28 11:16:32 EST 2012
ssl.sh: #7709: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13925 >/dev/null 2>/dev/null
selfserv with PID 13925 found at Wed Nov 28 11:16:32 EST 2012
ssl.sh: #7710: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13925 >/dev/null 2>/dev/null
selfserv with PID 13925 found at Wed Nov 28 11:16:32 EST 2012
ssl.sh: #7711: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13925 >/dev/null 2>/dev/null
selfserv with PID 13925 found at Wed Nov 28 11:16:32 EST 2012
ssl.sh: #7712: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 13925 at Wed Nov 28 11:16:32 EST 2012
kill -USR1 13925
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 13925 killed at Wed Nov 28 11:16:32 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:16:32 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:16:32 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 15387 >/dev/null 2>/dev/null
selfserv with PID 15387 found at Wed Nov 28 11:16:32 EST 2012
selfserv with PID 15387 started at Wed Nov 28 11:16:32 EST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15387 >/dev/null 2>/dev/null
selfserv with PID 15387 found at Wed Nov 28 11:16:33 EST 2012
ssl.sh: #7713: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15387 >/dev/null 2>/dev/null
selfserv with PID 15387 found at Wed Nov 28 11:16:33 EST 2012
ssl.sh: #7714: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15387 >/dev/null 2>/dev/null
selfserv with PID 15387 found at Wed Nov 28 11:16:33 EST 2012
ssl.sh: #7715: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15387 >/dev/null 2>/dev/null
selfserv with PID 15387 found at Wed Nov 28 11:16:33 EST 2012
ssl.sh: #7716: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15387 >/dev/null 2>/dev/null
selfserv with PID 15387 found at Wed Nov 28 11:16:33 EST 2012
ssl.sh: #7717: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15387 >/dev/null 2>/dev/null
selfserv with PID 15387 found at Wed Nov 28 11:16:33 EST 2012
ssl.sh: #7718: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15387 >/dev/null 2>/dev/null
selfserv with PID 15387 found at Wed Nov 28 11:16:34 EST 2012
ssl.sh: #7719: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15387 >/dev/null 2>/dev/null
selfserv with PID 15387 found at Wed Nov 28 11:16:34 EST 2012
ssl.sh: #7720: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15387 >/dev/null 2>/dev/null
selfserv with PID 15387 found at Wed Nov 28 11:16:34 EST 2012
ssl.sh: #7721: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15387 >/dev/null 2>/dev/null
selfserv with PID 15387 found at Wed Nov 28 11:16:34 EST 2012
ssl.sh: #7722: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15387 >/dev/null 2>/dev/null
selfserv with PID 15387 found at Wed Nov 28 11:16:34 EST 2012
ssl.sh: #7723: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15387 >/dev/null 2>/dev/null
selfserv with PID 15387 found at Wed Nov 28 11:16:35 EST 2012
ssl.sh: #7724: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15387 >/dev/null 2>/dev/null
selfserv with PID 15387 found at Wed Nov 28 11:16:35 EST 2012
ssl.sh: #7725: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/server/root.crl_43-48

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 161 bytes
tstclnt: Writing 161 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15387 >/dev/null 2>/dev/null
selfserv with PID 15387 found at Wed Nov 28 11:16:35 EST 2012
================= CRL Reloaded =============
ssl.sh: #7726: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15387 >/dev/null 2>/dev/null
selfserv with PID 15387 found at Wed Nov 28 11:16:35 EST 2012
ssl.sh: #7727: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15387 >/dev/null 2>/dev/null
selfserv with PID 15387 found at Wed Nov 28 11:16:35 EST 2012
ssl.sh: #7728: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15387 >/dev/null 2>/dev/null
selfserv with PID 15387 found at Wed Nov 28 11:16:35 EST 2012
ssl.sh: #7729: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15387 >/dev/null 2>/dev/null
selfserv with PID 15387 found at Wed Nov 28 11:16:36 EST 2012
ssl.sh: #7730: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15387 >/dev/null 2>/dev/null
selfserv with PID 15387 found at Wed Nov 28 11:16:36 EST 2012
ssl.sh: #7731: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15387 >/dev/null 2>/dev/null
selfserv with PID 15387 found at Wed Nov 28 11:16:36 EST 2012
ssl.sh: #7732: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15387 >/dev/null 2>/dev/null
selfserv with PID 15387 found at Wed Nov 28 11:16:36 EST 2012
ssl.sh: #7733: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15387 >/dev/null 2>/dev/null
selfserv with PID 15387 found at Wed Nov 28 11:16:36 EST 2012
ssl.sh: #7734: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15387 >/dev/null 2>/dev/null
selfserv with PID 15387 found at Wed Nov 28 11:16:37 EST 2012
ssl.sh: #7735: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15387 >/dev/null 2>/dev/null
selfserv with PID 15387 found at Wed Nov 28 11:16:37 EST 2012
ssl.sh: #7736: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15387 >/dev/null 2>/dev/null
selfserv with PID 15387 found at Wed Nov 28 11:16:37 EST 2012
ssl.sh: #7737: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15387 >/dev/null 2>/dev/null
selfserv with PID 15387 found at Wed Nov 28 11:16:37 EST 2012
ssl.sh: #7738: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15387 >/dev/null 2>/dev/null
selfserv with PID 15387 found at Wed Nov 28 11:16:37 EST 2012
ssl.sh: #7739: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/server/root.crl_49-52

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 161 bytes
tstclnt: Writing 161 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15387 >/dev/null 2>/dev/null
selfserv with PID 15387 found at Wed Nov 28 11:16:38 EST 2012
================= CRL Reloaded =============
ssl.sh: #7740: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x09 for socket out_flags.
tstclnt: PR_Poll returned 0x09 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15387 >/dev/null 2>/dev/null
selfserv with PID 15387 found at Wed Nov 28 11:16:38 EST 2012
ssl.sh: #7741: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15387 >/dev/null 2>/dev/null
selfserv with PID 15387 found at Wed Nov 28 11:16:38 EST 2012
ssl.sh: #7742: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15387 >/dev/null 2>/dev/null
selfserv with PID 15387 found at Wed Nov 28 11:16:38 EST 2012
ssl.sh: #7743: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15387 >/dev/null 2>/dev/null
selfserv with PID 15387 found at Wed Nov 28 11:16:38 EST 2012
ssl.sh: #7744: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15387 >/dev/null 2>/dev/null
selfserv with PID 15387 found at Wed Nov 28 11:16:38 EST 2012
ssl.sh: #7745: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15387 >/dev/null 2>/dev/null
selfserv with PID 15387 found at Wed Nov 28 11:16:39 EST 2012
ssl.sh: #7746: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15387 >/dev/null 2>/dev/null
selfserv with PID 15387 found at Wed Nov 28 11:16:39 EST 2012
ssl.sh: #7747: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15387 >/dev/null 2>/dev/null
selfserv with PID 15387 found at Wed Nov 28 11:16:39 EST 2012
ssl.sh: #7748: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15387 >/dev/null 2>/dev/null
selfserv with PID 15387 found at Wed Nov 28 11:16:39 EST 2012
ssl.sh: #7749: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15387 >/dev/null 2>/dev/null
selfserv with PID 15387 found at Wed Nov 28 11:16:39 EST 2012
ssl.sh: #7750: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15387 >/dev/null 2>/dev/null
selfserv with PID 15387 found at Wed Nov 28 11:16:39 EST 2012
ssl.sh: #7751: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15387 >/dev/null 2>/dev/null
selfserv with PID 15387 found at Wed Nov 28 11:16:40 EST 2012
ssl.sh: #7752: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15387 >/dev/null 2>/dev/null
selfserv with PID 15387 found at Wed Nov 28 11:16:40 EST 2012
ssl.sh: #7753: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 15387 at Wed Nov 28 11:16:40 EST 2012
kill -USR1 15387
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 15387 killed at Wed Nov 28 11:16:40 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:16:40 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:16:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 16850 >/dev/null 2>/dev/null
selfserv with PID 16850 found at Wed Nov 28 11:16:40 EST 2012
selfserv with PID 16850 started at Wed Nov 28 11:16:40 EST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16850 >/dev/null 2>/dev/null
selfserv with PID 16850 found at Wed Nov 28 11:16:40 EST 2012
ssl.sh: #7754: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16850 >/dev/null 2>/dev/null
selfserv with PID 16850 found at Wed Nov 28 11:16:40 EST 2012
ssl.sh: #7755: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16850 >/dev/null 2>/dev/null
selfserv with PID 16850 found at Wed Nov 28 11:16:41 EST 2012
ssl.sh: #7756: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16850 >/dev/null 2>/dev/null
selfserv with PID 16850 found at Wed Nov 28 11:16:41 EST 2012
ssl.sh: #7757: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16850 >/dev/null 2>/dev/null
selfserv with PID 16850 found at Wed Nov 28 11:16:41 EST 2012
ssl.sh: #7758: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16850 >/dev/null 2>/dev/null
selfserv with PID 16850 found at Wed Nov 28 11:16:41 EST 2012
ssl.sh: #7759: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16850 >/dev/null 2>/dev/null
selfserv with PID 16850 found at Wed Nov 28 11:16:41 EST 2012
ssl.sh: #7760: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16850 >/dev/null 2>/dev/null
selfserv with PID 16850 found at Wed Nov 28 11:16:42 EST 2012
ssl.sh: #7761: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16850 >/dev/null 2>/dev/null
selfserv with PID 16850 found at Wed Nov 28 11:16:42 EST 2012
ssl.sh: #7762: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16850 >/dev/null 2>/dev/null
selfserv with PID 16850 found at Wed Nov 28 11:16:42 EST 2012
ssl.sh: #7763: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16850 >/dev/null 2>/dev/null
selfserv with PID 16850 found at Wed Nov 28 11:16:42 EST 2012
ssl.sh: #7764: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16850 >/dev/null 2>/dev/null
selfserv with PID 16850 found at Wed Nov 28 11:16:42 EST 2012
ssl.sh: #7765: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16850 >/dev/null 2>/dev/null
selfserv with PID 16850 found at Wed Nov 28 11:16:42 EST 2012
ssl.sh: #7766: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/server/root.crl_43-48

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 161 bytes
tstclnt: Writing 161 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16850 >/dev/null 2>/dev/null
selfserv with PID 16850 found at Wed Nov 28 11:16:43 EST 2012
================= CRL Reloaded =============
ssl.sh: #7767: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16850 >/dev/null 2>/dev/null
selfserv with PID 16850 found at Wed Nov 28 11:16:43 EST 2012
ssl.sh: #7768: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16850 >/dev/null 2>/dev/null
selfserv with PID 16850 found at Wed Nov 28 11:16:43 EST 2012
ssl.sh: #7769: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16850 >/dev/null 2>/dev/null
selfserv with PID 16850 found at Wed Nov 28 11:16:43 EST 2012
ssl.sh: #7770: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16850 >/dev/null 2>/dev/null
selfserv with PID 16850 found at Wed Nov 28 11:16:43 EST 2012
ssl.sh: #7771: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16850 >/dev/null 2>/dev/null
selfserv with PID 16850 found at Wed Nov 28 11:16:44 EST 2012
ssl.sh: #7772: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16850 >/dev/null 2>/dev/null
selfserv with PID 16850 found at Wed Nov 28 11:16:44 EST 2012
ssl.sh: #7773: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16850 >/dev/null 2>/dev/null
selfserv with PID 16850 found at Wed Nov 28 11:16:44 EST 2012
ssl.sh: #7774: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16850 >/dev/null 2>/dev/null
selfserv with PID 16850 found at Wed Nov 28 11:16:44 EST 2012
ssl.sh: #7775: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16850 >/dev/null 2>/dev/null
selfserv with PID 16850 found at Wed Nov 28 11:16:44 EST 2012
ssl.sh: #7776: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16850 >/dev/null 2>/dev/null
selfserv with PID 16850 found at Wed Nov 28 11:16:44 EST 2012
ssl.sh: #7777: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16850 >/dev/null 2>/dev/null
selfserv with PID 16850 found at Wed Nov 28 11:16:45 EST 2012
ssl.sh: #7778: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16850 >/dev/null 2>/dev/null
selfserv with PID 16850 found at Wed Nov 28 11:16:45 EST 2012
ssl.sh: #7779: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16850 >/dev/null 2>/dev/null
selfserv with PID 16850 found at Wed Nov 28 11:16:45 EST 2012
ssl.sh: #7780: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/server/root.crl_49-52

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 161 bytes
tstclnt: Writing 161 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16850 >/dev/null 2>/dev/null
selfserv with PID 16850 found at Wed Nov 28 11:16:45 EST 2012
================= CRL Reloaded =============
ssl.sh: #7781: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16850 >/dev/null 2>/dev/null
selfserv with PID 16850 found at Wed Nov 28 11:16:45 EST 2012
ssl.sh: #7782: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16850 >/dev/null 2>/dev/null
selfserv with PID 16850 found at Wed Nov 28 11:16:46 EST 2012
ssl.sh: #7783: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16850 >/dev/null 2>/dev/null
selfserv with PID 16850 found at Wed Nov 28 11:16:46 EST 2012
ssl.sh: #7784: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16850 >/dev/null 2>/dev/null
selfserv with PID 16850 found at Wed Nov 28 11:16:46 EST 2012
ssl.sh: #7785: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16850 >/dev/null 2>/dev/null
selfserv with PID 16850 found at Wed Nov 28 11:16:46 EST 2012
ssl.sh: #7786: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16850 >/dev/null 2>/dev/null
selfserv with PID 16850 found at Wed Nov 28 11:16:46 EST 2012
ssl.sh: #7787: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16850 >/dev/null 2>/dev/null
selfserv with PID 16850 found at Wed Nov 28 11:16:46 EST 2012
ssl.sh: #7788: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16850 >/dev/null 2>/dev/null
selfserv with PID 16850 found at Wed Nov 28 11:16:47 EST 2012
ssl.sh: #7789: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16850 >/dev/null 2>/dev/null
selfserv with PID 16850 found at Wed Nov 28 11:16:47 EST 2012
ssl.sh: #7790: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16850 >/dev/null 2>/dev/null
selfserv with PID 16850 found at Wed Nov 28 11:16:47 EST 2012
ssl.sh: #7791: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16850 >/dev/null 2>/dev/null
selfserv with PID 16850 found at Wed Nov 28 11:16:47 EST 2012
ssl.sh: #7792: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16850 >/dev/null 2>/dev/null
selfserv with PID 16850 found at Wed Nov 28 11:16:47 EST 2012
ssl.sh: #7793: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16850 >/dev/null 2>/dev/null
selfserv with PID 16850 found at Wed Nov 28 11:16:48 EST 2012
ssl.sh: #7794: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 16850 at Wed Nov 28 11:16:48 EST 2012
kill -USR1 16850
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 16850 killed at Wed Nov 28 11:16:48 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:16:48 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:16:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 18313 >/dev/null 2>/dev/null
selfserv with PID 18313 found at Wed Nov 28 11:16:48 EST 2012
selfserv with PID 18313 started at Wed Nov 28 11:16:48 EST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18313 >/dev/null 2>/dev/null
selfserv with PID 18313 found at Wed Nov 28 11:16:48 EST 2012
ssl.sh: #7795: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18313 >/dev/null 2>/dev/null
selfserv with PID 18313 found at Wed Nov 28 11:16:48 EST 2012
ssl.sh: #7796: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18313 >/dev/null 2>/dev/null
selfserv with PID 18313 found at Wed Nov 28 11:16:48 EST 2012
ssl.sh: #7797: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18313 >/dev/null 2>/dev/null
selfserv with PID 18313 found at Wed Nov 28 11:16:49 EST 2012
ssl.sh: #7798: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18313 >/dev/null 2>/dev/null
selfserv with PID 18313 found at Wed Nov 28 11:16:49 EST 2012
ssl.sh: #7799: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18313 >/dev/null 2>/dev/null
selfserv with PID 18313 found at Wed Nov 28 11:16:49 EST 2012
ssl.sh: #7800: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18313 >/dev/null 2>/dev/null
selfserv with PID 18313 found at Wed Nov 28 11:16:49 EST 2012
ssl.sh: #7801: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18313 >/dev/null 2>/dev/null
selfserv with PID 18313 found at Wed Nov 28 11:16:49 EST 2012
ssl.sh: #7802: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18313 >/dev/null 2>/dev/null
selfserv with PID 18313 found at Wed Nov 28 11:16:50 EST 2012
ssl.sh: #7803: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18313 >/dev/null 2>/dev/null
selfserv with PID 18313 found at Wed Nov 28 11:16:50 EST 2012
ssl.sh: #7804: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18313 >/dev/null 2>/dev/null
selfserv with PID 18313 found at Wed Nov 28 11:16:50 EST 2012
ssl.sh: #7805: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18313 >/dev/null 2>/dev/null
selfserv with PID 18313 found at Wed Nov 28 11:16:50 EST 2012
ssl.sh: #7806: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18313 >/dev/null 2>/dev/null
selfserv with PID 18313 found at Wed Nov 28 11:16:51 EST 2012
ssl.sh: #7807: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/server/root.crl_43-48-ec

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 164 bytes
tstclnt: Writing 164 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18313 >/dev/null 2>/dev/null
selfserv with PID 18313 found at Wed Nov 28 11:16:51 EST 2012
================= CRL Reloaded =============
ssl.sh: #7808: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18313 >/dev/null 2>/dev/null
selfserv with PID 18313 found at Wed Nov 28 11:16:51 EST 2012
ssl.sh: #7809: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18313 >/dev/null 2>/dev/null
selfserv with PID 18313 found at Wed Nov 28 11:16:51 EST 2012
ssl.sh: #7810: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18313 >/dev/null 2>/dev/null
selfserv with PID 18313 found at Wed Nov 28 11:16:51 EST 2012
ssl.sh: #7811: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18313 >/dev/null 2>/dev/null
selfserv with PID 18313 found at Wed Nov 28 11:16:52 EST 2012
ssl.sh: #7812: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18313 >/dev/null 2>/dev/null
selfserv with PID 18313 found at Wed Nov 28 11:16:52 EST 2012
ssl.sh: #7813: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18313 >/dev/null 2>/dev/null
selfserv with PID 18313 found at Wed Nov 28 11:16:52 EST 2012
ssl.sh: #7814: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18313 >/dev/null 2>/dev/null
selfserv with PID 18313 found at Wed Nov 28 11:16:52 EST 2012
ssl.sh: #7815: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18313 >/dev/null 2>/dev/null
selfserv with PID 18313 found at Wed Nov 28 11:16:52 EST 2012
ssl.sh: #7816: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18313 >/dev/null 2>/dev/null
selfserv with PID 18313 found at Wed Nov 28 11:16:53 EST 2012
ssl.sh: #7817: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18313 >/dev/null 2>/dev/null
selfserv with PID 18313 found at Wed Nov 28 11:16:53 EST 2012
ssl.sh: #7818: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18313 >/dev/null 2>/dev/null
selfserv with PID 18313 found at Wed Nov 28 11:16:53 EST 2012
ssl.sh: #7819: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18313 >/dev/null 2>/dev/null
selfserv with PID 18313 found at Wed Nov 28 11:16:53 EST 2012
ssl.sh: #7820: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18313 >/dev/null 2>/dev/null
selfserv with PID 18313 found at Wed Nov 28 11:16:53 EST 2012
ssl.sh: #7821: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/server/root.crl_49-52-ec

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 164 bytes
tstclnt: Writing 164 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18313 >/dev/null 2>/dev/null
selfserv with PID 18313 found at Wed Nov 28 11:16:54 EST 2012
================= CRL Reloaded =============
ssl.sh: #7822: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18313 >/dev/null 2>/dev/null
selfserv with PID 18313 found at Wed Nov 28 11:16:54 EST 2012
ssl.sh: #7823: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18313 >/dev/null 2>/dev/null
selfserv with PID 18313 found at Wed Nov 28 11:16:54 EST 2012
ssl.sh: #7824: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18313 >/dev/null 2>/dev/null
selfserv with PID 18313 found at Wed Nov 28 11:16:54 EST 2012
ssl.sh: #7825: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18313 >/dev/null 2>/dev/null
selfserv with PID 18313 found at Wed Nov 28 11:16:54 EST 2012
ssl.sh: #7826: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18313 >/dev/null 2>/dev/null
selfserv with PID 18313 found at Wed Nov 28 11:16:55 EST 2012
ssl.sh: #7827: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18313 >/dev/null 2>/dev/null
selfserv with PID 18313 found at Wed Nov 28 11:16:55 EST 2012
ssl.sh: #7828: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18313 >/dev/null 2>/dev/null
selfserv with PID 18313 found at Wed Nov 28 11:16:55 EST 2012
ssl.sh: #7829: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18313 >/dev/null 2>/dev/null
selfserv with PID 18313 found at Wed Nov 28 11:16:55 EST 2012
ssl.sh: #7830: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18313 >/dev/null 2>/dev/null
selfserv with PID 18313 found at Wed Nov 28 11:16:55 EST 2012
ssl.sh: #7831: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18313 >/dev/null 2>/dev/null
selfserv with PID 18313 found at Wed Nov 28 11:16:56 EST 2012
ssl.sh: #7832: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18313 >/dev/null 2>/dev/null
selfserv with PID 18313 found at Wed Nov 28 11:16:56 EST 2012
ssl.sh: #7833: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18313 >/dev/null 2>/dev/null
selfserv with PID 18313 found at Wed Nov 28 11:16:56 EST 2012
ssl.sh: #7834: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18313 >/dev/null 2>/dev/null
selfserv with PID 18313 found at Wed Nov 28 11:16:56 EST 2012
ssl.sh: #7835: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 18313 at Wed Nov 28 11:16:56 EST 2012
kill -USR1 18313
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 18313 killed at Wed Nov 28 11:16:56 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:16:56 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:16:56 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 19777 >/dev/null 2>/dev/null
selfserv with PID 19777 found at Wed Nov 28 11:16:56 EST 2012
selfserv with PID 19777 started at Wed Nov 28 11:16:56 EST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19777 >/dev/null 2>/dev/null
selfserv with PID 19777 found at Wed Nov 28 11:16:57 EST 2012
ssl.sh: #7836: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19777 >/dev/null 2>/dev/null
selfserv with PID 19777 found at Wed Nov 28 11:16:57 EST 2012
ssl.sh: #7837: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19777 >/dev/null 2>/dev/null
selfserv with PID 19777 found at Wed Nov 28 11:16:57 EST 2012
ssl.sh: #7838: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19777 >/dev/null 2>/dev/null
selfserv with PID 19777 found at Wed Nov 28 11:16:57 EST 2012
ssl.sh: #7839: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19777 >/dev/null 2>/dev/null
selfserv with PID 19777 found at Wed Nov 28 11:16:58 EST 2012
ssl.sh: #7840: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19777 >/dev/null 2>/dev/null
selfserv with PID 19777 found at Wed Nov 28 11:16:58 EST 2012
ssl.sh: #7841: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19777 >/dev/null 2>/dev/null
selfserv with PID 19777 found at Wed Nov 28 11:16:58 EST 2012
ssl.sh: #7842: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19777 >/dev/null 2>/dev/null
selfserv with PID 19777 found at Wed Nov 28 11:16:58 EST 2012
ssl.sh: #7843: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19777 >/dev/null 2>/dev/null
selfserv with PID 19777 found at Wed Nov 28 11:16:58 EST 2012
ssl.sh: #7844: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19777 >/dev/null 2>/dev/null
selfserv with PID 19777 found at Wed Nov 28 11:16:59 EST 2012
ssl.sh: #7845: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19777 >/dev/null 2>/dev/null
selfserv with PID 19777 found at Wed Nov 28 11:16:59 EST 2012
ssl.sh: #7846: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19777 >/dev/null 2>/dev/null
selfserv with PID 19777 found at Wed Nov 28 11:16:59 EST 2012
ssl.sh: #7847: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19777 >/dev/null 2>/dev/null
selfserv with PID 19777 found at Wed Nov 28 11:16:59 EST 2012
ssl.sh: #7848: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/server/root.crl_43-48-ec

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 164 bytes
tstclnt: Writing 164 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19777 >/dev/null 2>/dev/null
selfserv with PID 19777 found at Wed Nov 28 11:16:59 EST 2012
================= CRL Reloaded =============
ssl.sh: #7849: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19777 >/dev/null 2>/dev/null
selfserv with PID 19777 found at Wed Nov 28 11:17:00 EST 2012
ssl.sh: #7850: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19777 >/dev/null 2>/dev/null
selfserv with PID 19777 found at Wed Nov 28 11:17:00 EST 2012
ssl.sh: #7851: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19777 >/dev/null 2>/dev/null
selfserv with PID 19777 found at Wed Nov 28 11:17:00 EST 2012
ssl.sh: #7852: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19777 >/dev/null 2>/dev/null
selfserv with PID 19777 found at Wed Nov 28 11:17:00 EST 2012
ssl.sh: #7853: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19777 >/dev/null 2>/dev/null
selfserv with PID 19777 found at Wed Nov 28 11:17:00 EST 2012
ssl.sh: #7854: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19777 >/dev/null 2>/dev/null
selfserv with PID 19777 found at Wed Nov 28 11:17:01 EST 2012
ssl.sh: #7855: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19777 >/dev/null 2>/dev/null
selfserv with PID 19777 found at Wed Nov 28 11:17:01 EST 2012
ssl.sh: #7856: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19777 >/dev/null 2>/dev/null
selfserv with PID 19777 found at Wed Nov 28 11:17:01 EST 2012
ssl.sh: #7857: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19777 >/dev/null 2>/dev/null
selfserv with PID 19777 found at Wed Nov 28 11:17:01 EST 2012
ssl.sh: #7858: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19777 >/dev/null 2>/dev/null
selfserv with PID 19777 found at Wed Nov 28 11:17:01 EST 2012
ssl.sh: #7859: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19777 >/dev/null 2>/dev/null
selfserv with PID 19777 found at Wed Nov 28 11:17:02 EST 2012
ssl.sh: #7860: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19777 >/dev/null 2>/dev/null
selfserv with PID 19777 found at Wed Nov 28 11:17:02 EST 2012
ssl.sh: #7861: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19777 >/dev/null 2>/dev/null
selfserv with PID 19777 found at Wed Nov 28 11:17:02 EST 2012
ssl.sh: #7862: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/server/root.crl_49-52-ec

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 164 bytes
tstclnt: Writing 164 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19777 >/dev/null 2>/dev/null
selfserv with PID 19777 found at Wed Nov 28 11:17:02 EST 2012
================= CRL Reloaded =============
ssl.sh: #7863: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19777 >/dev/null 2>/dev/null
selfserv with PID 19777 found at Wed Nov 28 11:17:02 EST 2012
ssl.sh: #7864: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19777 >/dev/null 2>/dev/null
selfserv with PID 19777 found at Wed Nov 28 11:17:03 EST 2012
ssl.sh: #7865: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19777 >/dev/null 2>/dev/null
selfserv with PID 19777 found at Wed Nov 28 11:17:03 EST 2012
ssl.sh: #7866: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x09 for socket out_flags.
tstclnt: PR_Poll returned 0x09 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19777 >/dev/null 2>/dev/null
selfserv with PID 19777 found at Wed Nov 28 11:17:03 EST 2012
ssl.sh: #7867: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19777 >/dev/null 2>/dev/null
selfserv with PID 19777 found at Wed Nov 28 11:17:03 EST 2012
ssl.sh: #7868: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19777 >/dev/null 2>/dev/null
selfserv with PID 19777 found at Wed Nov 28 11:17:03 EST 2012
ssl.sh: #7869: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19777 >/dev/null 2>/dev/null
selfserv with PID 19777 found at Wed Nov 28 11:17:04 EST 2012
ssl.sh: #7870: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19777 >/dev/null 2>/dev/null
selfserv with PID 19777 found at Wed Nov 28 11:17:04 EST 2012
ssl.sh: #7871: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19777 >/dev/null 2>/dev/null
selfserv with PID 19777 found at Wed Nov 28 11:17:04 EST 2012
ssl.sh: #7872: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19777 >/dev/null 2>/dev/null
selfserv with PID 19777 found at Wed Nov 28 11:17:04 EST 2012
ssl.sh: #7873: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19777 >/dev/null 2>/dev/null
selfserv with PID 19777 found at Wed Nov 28 11:17:04 EST 2012
ssl.sh: #7874: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19777 >/dev/null 2>/dev/null
selfserv with PID 19777 found at Wed Nov 28 11:17:05 EST 2012
ssl.sh: #7875: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19777 >/dev/null 2>/dev/null
selfserv with PID 19777 found at Wed Nov 28 11:17:05 EST 2012
ssl.sh: #7876: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 19777 at Wed Nov 28 11:17:05 EST 2012
kill -USR1 19777
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 19777 killed at Wed Nov 28 11:17:05 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:17:05 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:17:05 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 21242 >/dev/null 2>/dev/null
selfserv with PID 21242 found at Wed Nov 28 11:17:05 EST 2012
selfserv with PID 21242 started at Wed Nov 28 11:17:05 EST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21242 >/dev/null 2>/dev/null
selfserv with PID 21242 found at Wed Nov 28 11:17:05 EST 2012
ssl.sh: #7877: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21242 >/dev/null 2>/dev/null
selfserv with PID 21242 found at Wed Nov 28 11:17:05 EST 2012
ssl.sh: #7878: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21242 >/dev/null 2>/dev/null
selfserv with PID 21242 found at Wed Nov 28 11:17:06 EST 2012
ssl.sh: #7879: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21242 >/dev/null 2>/dev/null
selfserv with PID 21242 found at Wed Nov 28 11:17:06 EST 2012
ssl.sh: #7880: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21242 >/dev/null 2>/dev/null
selfserv with PID 21242 found at Wed Nov 28 11:17:06 EST 2012
ssl.sh: #7881: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21242 >/dev/null 2>/dev/null
selfserv with PID 21242 found at Wed Nov 28 11:17:06 EST 2012
ssl.sh: #7882: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21242 >/dev/null 2>/dev/null
selfserv with PID 21242 found at Wed Nov 28 11:17:06 EST 2012
ssl.sh: #7883: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21242 >/dev/null 2>/dev/null
selfserv with PID 21242 found at Wed Nov 28 11:17:07 EST 2012
ssl.sh: #7884: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21242 >/dev/null 2>/dev/null
selfserv with PID 21242 found at Wed Nov 28 11:17:07 EST 2012
ssl.sh: #7885: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21242 >/dev/null 2>/dev/null
selfserv with PID 21242 found at Wed Nov 28 11:17:07 EST 2012
ssl.sh: #7886: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21242 >/dev/null 2>/dev/null
selfserv with PID 21242 found at Wed Nov 28 11:17:07 EST 2012
ssl.sh: #7887: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21242 >/dev/null 2>/dev/null
selfserv with PID 21242 found at Wed Nov 28 11:17:08 EST 2012
ssl.sh: #7888: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21242 >/dev/null 2>/dev/null
selfserv with PID 21242 found at Wed Nov 28 11:17:08 EST 2012
ssl.sh: #7889: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/server/root.crl_43-48-ec

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 164 bytes
tstclnt: Writing 164 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21242 >/dev/null 2>/dev/null
selfserv with PID 21242 found at Wed Nov 28 11:17:08 EST 2012
================= CRL Reloaded =============
ssl.sh: #7890: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21242 >/dev/null 2>/dev/null
selfserv with PID 21242 found at Wed Nov 28 11:17:08 EST 2012
ssl.sh: #7891: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21242 >/dev/null 2>/dev/null
selfserv with PID 21242 found at Wed Nov 28 11:17:08 EST 2012
ssl.sh: #7892: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21242 >/dev/null 2>/dev/null
selfserv with PID 21242 found at Wed Nov 28 11:17:09 EST 2012
ssl.sh: #7893: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21242 >/dev/null 2>/dev/null
selfserv with PID 21242 found at Wed Nov 28 11:17:09 EST 2012
ssl.sh: #7894: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21242 >/dev/null 2>/dev/null
selfserv with PID 21242 found at Wed Nov 28 11:17:09 EST 2012
ssl.sh: #7895: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21242 >/dev/null 2>/dev/null
selfserv with PID 21242 found at Wed Nov 28 11:17:09 EST 2012
ssl.sh: #7896: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21242 >/dev/null 2>/dev/null
selfserv with PID 21242 found at Wed Nov 28 11:17:09 EST 2012
ssl.sh: #7897: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21242 >/dev/null 2>/dev/null
selfserv with PID 21242 found at Wed Nov 28 11:17:10 EST 2012
ssl.sh: #7898: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21242 >/dev/null 2>/dev/null
selfserv with PID 21242 found at Wed Nov 28 11:17:10 EST 2012
ssl.sh: #7899: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21242 >/dev/null 2>/dev/null
selfserv with PID 21242 found at Wed Nov 28 11:17:10 EST 2012
ssl.sh: #7900: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21242 >/dev/null 2>/dev/null
selfserv with PID 21242 found at Wed Nov 28 11:17:10 EST 2012
ssl.sh: #7901: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21242 >/dev/null 2>/dev/null
selfserv with PID 21242 found at Wed Nov 28 11:17:10 EST 2012
ssl.sh: #7902: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21242 >/dev/null 2>/dev/null
selfserv with PID 21242 found at Wed Nov 28 11:17:11 EST 2012
ssl.sh: #7903: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/server/root.crl_49-52-ec

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 164 bytes
tstclnt: Writing 164 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21242 >/dev/null 2>/dev/null
selfserv with PID 21242 found at Wed Nov 28 11:17:11 EST 2012
================= CRL Reloaded =============
ssl.sh: #7904: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21242 >/dev/null 2>/dev/null
selfserv with PID 21242 found at Wed Nov 28 11:17:11 EST 2012
ssl.sh: #7905: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21242 >/dev/null 2>/dev/null
selfserv with PID 21242 found at Wed Nov 28 11:17:11 EST 2012
ssl.sh: #7906: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21242 >/dev/null 2>/dev/null
selfserv with PID 21242 found at Wed Nov 28 11:17:12 EST 2012
ssl.sh: #7907: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21242 >/dev/null 2>/dev/null
selfserv with PID 21242 found at Wed Nov 28 11:17:12 EST 2012
ssl.sh: #7908: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21242 >/dev/null 2>/dev/null
selfserv with PID 21242 found at Wed Nov 28 11:17:12 EST 2012
ssl.sh: #7909: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21242 >/dev/null 2>/dev/null
selfserv with PID 21242 found at Wed Nov 28 11:17:12 EST 2012
ssl.sh: #7910: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21242 >/dev/null 2>/dev/null
selfserv with PID 21242 found at Wed Nov 28 11:17:12 EST 2012
ssl.sh: #7911: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21242 >/dev/null 2>/dev/null
selfserv with PID 21242 found at Wed Nov 28 11:17:13 EST 2012
ssl.sh: #7912: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21242 >/dev/null 2>/dev/null
selfserv with PID 21242 found at Wed Nov 28 11:17:13 EST 2012
ssl.sh: #7913: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21242 >/dev/null 2>/dev/null
selfserv with PID 21242 found at Wed Nov 28 11:17:13 EST 2012
ssl.sh: #7914: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21242 >/dev/null 2>/dev/null
selfserv with PID 21242 found at Wed Nov 28 11:17:13 EST 2012
ssl.sh: #7915: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21242 >/dev/null 2>/dev/null
selfserv with PID 21242 found at Wed Nov 28 11:17:13 EST 2012
ssl.sh: #7916: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21242 >/dev/null 2>/dev/null
selfserv with PID 21242 found at Wed Nov 28 11:17:14 EST 2012
ssl.sh: #7917: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 21242 at Wed Nov 28 11:17:14 EST 2012
kill -USR1 21242
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 21242 killed at Wed Nov 28 11:17:14 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:17:14 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:17:14 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 22706 >/dev/null 2>/dev/null
selfserv with PID 22706 found at Wed Nov 28 11:17:14 EST 2012
selfserv with PID 22706 started at Wed Nov 28 11:17:14 EST 2012
trying to kill selfserv with PID 22706 at Wed Nov 28 11:17:14 EST 2012
kill -USR1 22706
./ssl.sh: line 173: 22706 User defined signal 1   ${PROFTOOL} ${BINDIR}/selfserv -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 22706 killed at Wed Nov 28 11:17:14 EST 2012
ssl.sh: SSL Stress Test  - server bypass/client bypass  - with ECC ===============================
ssl.sh: Stress SSL2 RC4 128 with MD5 ----
selfserv starting at Wed Nov 28 11:17:14 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:17:14 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 22829 >/dev/null 2>/dev/null
selfserv with PID 22829 found at Wed Nov 28 11:17:16 EST 2012
selfserv with PID 22829 started at Wed Nov 28 11:17:16 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 1000 -C A \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:17:16 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: SSL2 - 1 server certificates tested.
strsclnt completed at Wed Nov 28 11:17:16 EST 2012
ssl.sh: #7918: Stress SSL2 RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 22829 at Wed Nov 28 11:17:16 EST 2012
kill -USR1 22829
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 22829 killed at Wed Nov 28 11:17:16 EST 2012
ssl.sh: Stress SSL3 RC4 128 with MD5 ----
selfserv starting at Wed Nov 28 11:17:16 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:17:16 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 22907 >/dev/null 2>/dev/null
selfserv with PID 22907 found at Wed Nov 28 11:17:16 EST 2012
selfserv with PID 22907 started at Wed Nov 28 11:17:16 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 1000 -C c -V :ssl3 \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:17:16 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:17:17 EST 2012
ssl.sh: #7919: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 22907 at Wed Nov 28 11:17:17 EST 2012
kill -USR1 22907
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 22907 killed at Wed Nov 28 11:17:17 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 ----
selfserv starting at Wed Nov 28 11:17:17 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:17:17 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 22985 >/dev/null 2>/dev/null
selfserv with PID 22985 found at Wed Nov 28 11:17:17 EST 2012
selfserv with PID 22985 started at Wed Nov 28 11:17:17 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 1000 -C c \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:17:17 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:17:17 EST 2012
ssl.sh: #7920: Stress TLS  RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 22985 at Wed Nov 28 11:17:17 EST 2012
kill -USR1 22985
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 22985 killed at Wed Nov 28 11:17:17 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (false start) ----
selfserv starting at Wed Nov 28 11:17:17 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:17:17 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23063 >/dev/null 2>/dev/null
selfserv with PID 23063 found at Wed Nov 28 11:17:17 EST 2012
selfserv with PID 23063 started at Wed Nov 28 11:17:17 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 1000 -C c -g \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:17:17 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:17:18 EST 2012
ssl.sh: #7921: Stress TLS  RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 23063 at Wed Nov 28 11:17:18 EST 2012
kill -USR1 23063
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23063 killed at Wed Nov 28 11:17:18 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket) ----
selfserv starting at Wed Nov 28 11:17:18 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:17:18 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23141 >/dev/null 2>/dev/null
selfserv with PID 23141 found at Wed Nov 28 11:17:18 EST 2012
selfserv with PID 23141 started at Wed Nov 28 11:17:18 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:17:18 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Wed Nov 28 11:17:18 EST 2012
ssl.sh: #7922: Stress TLS  RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 23141 at Wed Nov 28 11:17:18 EST 2012
kill -USR1 23141
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23141 killed at Wed Nov 28 11:17:18 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (compression) ----
selfserv starting at Wed Nov 28 11:17:18 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:17:18 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23219 >/dev/null 2>/dev/null
selfserv with PID 23219 found at Wed Nov 28 11:17:18 EST 2012
selfserv with PID 23219 started at Wed Nov 28 11:17:18 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -z \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:17:18 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:17:19 EST 2012
ssl.sh: #7923: Stress TLS  RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 23219 at Wed Nov 28 11:17:19 EST 2012
kill -USR1 23219
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23219 killed at Wed Nov 28 11:17:19 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression) ----
selfserv starting at Wed Nov 28 11:17:19 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:17:19 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23297 >/dev/null 2>/dev/null
selfserv with PID 23297 found at Wed Nov 28 11:17:19 EST 2012
selfserv with PID 23297 started at Wed Nov 28 11:17:19 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u -z \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:17:19 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Wed Nov 28 11:17:19 EST 2012
ssl.sh: #7924: Stress TLS  RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 23297 at Wed Nov 28 11:17:19 EST 2012
kill -USR1 23297
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23297 killed at Wed Nov 28 11:17:19 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) ----
selfserv starting at Wed Nov 28 11:17:19 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:17:19 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23375 >/dev/null 2>/dev/null
selfserv with PID 23375 found at Wed Nov 28 11:17:19 EST 2012
selfserv with PID 23375 started at Wed Nov 28 11:17:19 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:17:19 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Wed Nov 28 11:17:20 EST 2012
ssl.sh: #7925: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 23375 at Wed Nov 28 11:17:20 EST 2012
kill -USR1 23375
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23375 killed at Wed Nov 28 11:17:20 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI) ----
selfserv starting at Wed Nov 28 11:17:20 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:17:20 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23459 >/dev/null 2>/dev/null
selfserv with PID 23459 found at Wed Nov 28 11:17:20 EST 2012
selfserv with PID 23459 started at Wed Nov 28 11:17:20 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:17:20 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Wed Nov 28 11:17:20 EST 2012
ssl.sh: #7926: Stress TLS RC4 128 with MD5 (session ticket, SNI) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 23459 at Wed Nov 28 11:17:20 EST 2012
kill -USR1 23459
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23459 killed at Wed Nov 28 11:17:20 EST 2012
ssl.sh: Stress SSL2 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Wed Nov 28 11:17:20 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:17:20 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23558 >/dev/null 2>/dev/null
selfserv with PID 23558 found at Wed Nov 28 11:17:20 EST 2012
selfserv with PID 23558 started at Wed Nov 28 11:17:20 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 100 -C A -N -n TestUser \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:17:20 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: SSL2 - 100 server certificates tested.
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed Nov 28 11:17:21 EST 2012
ssl.sh: #7927: Stress SSL2 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 23558 at Wed Nov 28 11:17:21 EST 2012
kill -USR1 23558
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23558 killed at Wed Nov 28 11:17:21 EST 2012
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Wed Nov 28 11:17:21 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:17:21 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23635 >/dev/null 2>/dev/null
selfserv with PID 23635 found at Wed Nov 28 11:17:21 EST 2012
selfserv with PID 23635 started at Wed Nov 28 11:17:21 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 100 -C c -V :ssl3 -N -n TestUser \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:17:21 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed Nov 28 11:17:22 EST 2012
ssl.sh: #7928: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 23635 at Wed Nov 28 11:17:22 EST 2012
kill -USR1 23635
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23635 killed at Wed Nov 28 11:17:22 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Wed Nov 28 11:17:22 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:17:22 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23712 >/dev/null 2>/dev/null
selfserv with PID 23712 found at Wed Nov 28 11:17:22 EST 2012
selfserv with PID 23712 started at Wed Nov 28 11:17:22 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 100 -C c -N -n TestUser \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:17:22 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed Nov 28 11:17:23 EST 2012
ssl.sh: #7929: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 23712 at Wed Nov 28 11:17:23 EST 2012
kill -USR1 23712
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23712 killed at Wed Nov 28 11:17:23 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Wed Nov 28 11:17:23 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:17:23 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23789 >/dev/null 2>/dev/null
selfserv with PID 23789 found at Wed Nov 28 11:17:23 EST 2012
selfserv with PID 23789 started at Wed Nov 28 11:17:23 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:17:23 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Wed Nov 28 11:17:23 EST 2012
ssl.sh: #7930: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 23789 at Wed Nov 28 11:17:23 EST 2012
kill -USR1 23789
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23789 killed at Wed Nov 28 11:17:23 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Wed Nov 28 11:17:23 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:17:23 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23867 >/dev/null 2>/dev/null
selfserv with PID 23867 found at Wed Nov 28 11:17:23 EST 2012
selfserv with PID 23867 started at Wed Nov 28 11:17:23 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -z \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:17:23 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:17:24 EST 2012
ssl.sh: #7931: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 23867 at Wed Nov 28 11:17:24 EST 2012
kill -USR1 23867
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23867 killed at Wed Nov 28 11:17:24 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Wed Nov 28 11:17:24 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:17:24 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 23945 >/dev/null 2>/dev/null
selfserv with PID 23945 found at Wed Nov 28 11:17:24 EST 2012
selfserv with PID 23945 started at Wed Nov 28 11:17:24 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:17:24 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:17:24 EST 2012
ssl.sh: #7932: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 23945 at Wed Nov 28 11:17:24 EST 2012
kill -USR1 23945
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 23945 killed at Wed Nov 28 11:17:24 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Wed Nov 28 11:17:24 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:17:24 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24023 >/dev/null 2>/dev/null
selfserv with PID 24023 found at Wed Nov 28 11:17:24 EST 2012
selfserv with PID 24023 started at Wed Nov 28 11:17:24 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u -z \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:17:24 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Wed Nov 28 11:17:24 EST 2012
ssl.sh: #7933: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 24023 at Wed Nov 28 11:17:24 EST 2012
kill -USR1 24023
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24023 killed at Wed Nov 28 11:17:24 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Wed Nov 28 11:17:24 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:17:24 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24101 >/dev/null 2>/dev/null
selfserv with PID 24101 found at Wed Nov 28 11:17:24 EST 2012
selfserv with PID 24101 started at Wed Nov 28 11:17:24 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:17:24 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Wed Nov 28 11:17:25 EST 2012
ssl.sh: #7934: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 24101 at Wed Nov 28 11:17:25 EST 2012
kill -USR1 24101
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24101 killed at Wed Nov 28 11:17:25 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ----
selfserv starting at Wed Nov 28 11:17:25 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:17:25 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24185 >/dev/null 2>/dev/null
selfserv with PID 24185 found at Wed Nov 28 11:17:25 EST 2012
selfserv with PID 24185 started at Wed Nov 28 11:17:25 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:17:25 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Wed Nov 28 11:17:25 EST 2012
ssl.sh: #7935: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 24185 at Wed Nov 28 11:17:26 EST 2012
kill -USR1 24185
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24185 killed at Wed Nov 28 11:17:26 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ----
selfserv starting at Wed Nov 28 11:17:26 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -a buildnss02-sni.usersys.redhat.com -k buildnss02-sni.usersys.redhat.com -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:17:26 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24269 >/dev/null 2>/dev/null
selfserv with PID 24269 found at Wed Nov 28 11:17:26 EST 2012
selfserv with PID 24269 started at Wed Nov 28 11:17:26 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u -a buildnss02-sni.usersys.redhat.com \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:17:26 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Wed Nov 28 11:17:26 EST 2012
ssl.sh: #7936: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 24269 at Wed Nov 28 11:17:26 EST 2012
kill -USR1 24269
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24269 killed at Wed Nov 28 11:17:26 EST 2012
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Wed Nov 28 11:17:26 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C009 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:17:26 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24368 >/dev/null 2>/dev/null
selfserv with PID 24368 found at Wed Nov 28 11:17:26 EST 2012
selfserv with PID 24368 started at Wed Nov 28 11:17:26 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 100 -C :C009 -N -V :ssl3 \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:17:26 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed Nov 28 11:17:27 EST 2012
ssl.sh: #7937: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 24368 at Wed Nov 28 11:17:27 EST 2012
kill -USR1 24368
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24368 killed at Wed Nov 28 11:17:27 EST 2012
ssl.sh: Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Wed Nov 28 11:17:27 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C013 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:17:27 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24445 >/dev/null 2>/dev/null
selfserv with PID 24445 found at Wed Nov 28 11:17:27 EST 2012
selfserv with PID 24445 started at Wed Nov 28 11:17:27 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 1000 -C :C013 -V :ssl3 \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:17:27 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:17:28 EST 2012
ssl.sh: #7938: Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 24445 at Wed Nov 28 11:17:28 EST 2012
kill -USR1 24445
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24445 killed at Wed Nov 28 11:17:28 EST 2012
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) ----
selfserv starting at Wed Nov 28 11:17:28 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C004 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:17:28 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24523 >/dev/null 2>/dev/null
selfserv with PID 24523 found at Wed Nov 28 11:17:28 EST 2012
selfserv with PID 24523 started at Wed Nov 28 11:17:28 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C004 -N \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:17:28 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed Nov 28 11:17:29 EST 2012
ssl.sh: #7939: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 24523 at Wed Nov 28 11:17:29 EST 2012
kill -USR1 24523
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24523 killed at Wed Nov 28 11:17:29 EST 2012
ssl.sh: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) ----
selfserv starting at Wed Nov 28 11:17:29 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c :C00E -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:17:29 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24600 >/dev/null 2>/dev/null
selfserv with PID 24600 found at Wed Nov 28 11:17:29 EST 2012
selfserv with PID 24600 started at Wed Nov 28 11:17:29 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C00E -N \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:17:29 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed Nov 28 11:17:30 EST 2012
ssl.sh: #7940: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 24600 at Wed Nov 28 11:17:30 EST 2012
kill -USR1 24600
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24600 killed at Wed Nov 28 11:17:30 EST 2012
ssl.sh: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Wed Nov 28 11:17:30 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C013 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:17:30 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24677 >/dev/null 2>/dev/null
selfserv with PID 24677 found at Wed Nov 28 11:17:30 EST 2012
selfserv with PID 24677 started at Wed Nov 28 11:17:30 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :C013 \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:17:30 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:17:31 EST 2012
ssl.sh: #7941: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 24677 at Wed Nov 28 11:17:31 EST 2012
kill -USR1 24677
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24677 killed at Wed Nov 28 11:17:31 EST 2012
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) ----
selfserv starting at Wed Nov 28 11:17:31 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C004 -u -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:17:31 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24755 >/dev/null 2>/dev/null
selfserv with PID 24755 found at Wed Nov 28 11:17:31 EST 2012
selfserv with PID 24755 started at Wed Nov 28 11:17:31 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :C004 -u \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:17:31 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Wed Nov 28 11:17:31 EST 2012
ssl.sh: #7942: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 24755 at Wed Nov 28 11:17:31 EST 2012
kill -USR1 24755
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24755 killed at Wed Nov 28 11:17:31 EST 2012
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Wed Nov 28 11:17:31 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C009 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:17:31 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24854 >/dev/null 2>/dev/null
selfserv with PID 24854 found at Wed Nov 28 11:17:31 EST 2012
selfserv with PID 24854 started at Wed Nov 28 11:17:31 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 10 -C :C009 -N -V :ssl3 -n TestUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:17:31 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Wed Nov 28 11:17:32 EST 2012
ssl.sh: #7943: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 24854 at Wed Nov 28 11:17:32 EST 2012
kill -USR1 24854
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24854 killed at Wed Nov 28 11:17:32 EST 2012
ssl.sh: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) ----
selfserv starting at Wed Nov 28 11:17:32 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:17:32 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24931 >/dev/null 2>/dev/null
selfserv with PID 24931 found at Wed Nov 28 11:17:32 EST 2012
selfserv with PID 24931 started at Wed Nov 28 11:17:32 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 100 -C :C013 -V :ssl3 -n TestUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:17:32 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:17:32 EST 2012
ssl.sh: #7944: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 24931 at Wed Nov 28 11:17:32 EST 2012
kill -USR1 24931
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24931 killed at Wed Nov 28 11:17:32 EST 2012
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Wed Nov 28 11:17:32 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C004 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:17:32 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25009 >/dev/null 2>/dev/null
selfserv with PID 25009 found at Wed Nov 28 11:17:32 EST 2012
selfserv with PID 25009 started at Wed Nov 28 11:17:32 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 10 -C :C004 -N -n TestUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:17:32 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Wed Nov 28 11:17:33 EST 2012
ssl.sh: #7945: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 25009 at Wed Nov 28 11:17:33 EST 2012
kill -USR1 25009
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25009 killed at Wed Nov 28 11:17:33 EST 2012
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Wed Nov 28 11:17:33 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -r -r -c :C00E -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:17:33 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25086 >/dev/null 2>/dev/null
selfserv with PID 25086 found at Wed Nov 28 11:17:33 EST 2012
selfserv with PID 25086 started at Wed Nov 28 11:17:33 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 10 -C :C00E -N -n TestUser-ecmixed \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:17:33 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Wed Nov 28 11:17:33 EST 2012
ssl.sh: #7946: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 25086 at Wed Nov 28 11:17:33 EST 2012
kill -USR1 25086
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25086 killed at Wed Nov 28 11:17:33 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ----
selfserv starting at Wed Nov 28 11:17:33 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:17:33 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25163 >/dev/null 2>/dev/null
selfserv with PID 25163 found at Wed Nov 28 11:17:33 EST 2012
selfserv with PID 25163 started at Wed Nov 28 11:17:33 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 100 -C :C013 -n TestUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:17:33 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:17:34 EST 2012
ssl.sh: #7947: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 25163 at Wed Nov 28 11:17:34 EST 2012
kill -USR1 25163
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25163 killed at Wed Nov 28 11:17:34 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ----
selfserv starting at Wed Nov 28 11:17:34 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -u -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:17:34 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25241 >/dev/null 2>/dev/null
selfserv with PID 25241 found at Wed Nov 28 11:17:34 EST 2012
selfserv with PID 25241 started at Wed Nov 28 11:17:34 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec -u \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:17:34 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Wed Nov 28 11:17:34 EST 2012
ssl.sh: #7948: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 25241 at Wed Nov 28 11:17:34 EST 2012
kill -USR1 25241
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25241 killed at Wed Nov 28 11:17:34 EST 2012
ssl.sh: SSL Stress Test Extended Test - server bypass/client bypass  - with ECC ===============================
ssl.sh: skipping  Stress SSL2 RC4 128 with MD5 for Extended Test
ssl.sh: Stress SSL3 RC4 128 with MD5 ----
selfserv starting at Wed Nov 28 11:17:34 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:17:34 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25393 >/dev/null 2>/dev/null
selfserv with PID 25393 found at Wed Nov 28 11:17:34 EST 2012
selfserv with PID 25393 started at Wed Nov 28 11:17:34 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 1000 -C c -V :ssl3 \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:17:34 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:17:35 EST 2012
ssl.sh: #7949: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 25393 at Wed Nov 28 11:17:35 EST 2012
kill -USR1 25393
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25393 killed at Wed Nov 28 11:17:35 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 ----
selfserv starting at Wed Nov 28 11:17:35 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:17:35 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25471 >/dev/null 2>/dev/null
selfserv with PID 25471 found at Wed Nov 28 11:17:35 EST 2012
selfserv with PID 25471 started at Wed Nov 28 11:17:35 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 1000 -C c \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:17:35 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:17:35 EST 2012
ssl.sh: #7950: Stress TLS  RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 25471 at Wed Nov 28 11:17:35 EST 2012
kill -USR1 25471
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25471 killed at Wed Nov 28 11:17:35 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (false start) ----
selfserv starting at Wed Nov 28 11:17:35 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:17:35 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25549 >/dev/null 2>/dev/null
selfserv with PID 25549 found at Wed Nov 28 11:17:35 EST 2012
selfserv with PID 25549 started at Wed Nov 28 11:17:35 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 1000 -C c -g \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:17:35 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:17:36 EST 2012
ssl.sh: #7951: Stress TLS  RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 25549 at Wed Nov 28 11:17:36 EST 2012
kill -USR1 25549
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25549 killed at Wed Nov 28 11:17:36 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket) ----
selfserv starting at Wed Nov 28 11:17:36 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:17:36 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25627 >/dev/null 2>/dev/null
selfserv with PID 25627 found at Wed Nov 28 11:17:36 EST 2012
selfserv with PID 25627 started at Wed Nov 28 11:17:36 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:17:36 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Wed Nov 28 11:17:36 EST 2012
ssl.sh: #7952: Stress TLS  RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 25627 at Wed Nov 28 11:17:36 EST 2012
kill -USR1 25627
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25627 killed at Wed Nov 28 11:17:36 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (compression) ----
selfserv starting at Wed Nov 28 11:17:36 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:17:36 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25705 >/dev/null 2>/dev/null
selfserv with PID 25705 found at Wed Nov 28 11:17:36 EST 2012
selfserv with PID 25705 started at Wed Nov 28 11:17:36 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -z \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:17:36 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:17:37 EST 2012
ssl.sh: #7953: Stress TLS  RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 25705 at Wed Nov 28 11:17:37 EST 2012
kill -USR1 25705
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25705 killed at Wed Nov 28 11:17:37 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression) ----
selfserv starting at Wed Nov 28 11:17:37 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:17:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25783 >/dev/null 2>/dev/null
selfserv with PID 25783 found at Wed Nov 28 11:17:37 EST 2012
selfserv with PID 25783 started at Wed Nov 28 11:17:37 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u -z \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:17:37 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Wed Nov 28 11:17:37 EST 2012
ssl.sh: #7954: Stress TLS  RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 25783 at Wed Nov 28 11:17:37 EST 2012
kill -USR1 25783
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25783 killed at Wed Nov 28 11:17:37 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) ----
selfserv starting at Wed Nov 28 11:17:38 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:17:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25861 >/dev/null 2>/dev/null
selfserv with PID 25861 found at Wed Nov 28 11:17:38 EST 2012
selfserv with PID 25861 started at Wed Nov 28 11:17:38 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:17:38 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Wed Nov 28 11:17:38 EST 2012
ssl.sh: #7955: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 25861 at Wed Nov 28 11:17:38 EST 2012
kill -USR1 25861
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25861 killed at Wed Nov 28 11:17:38 EST 2012
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test
ssl.sh: skipping  Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Wed Nov 28 11:17:38 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:17:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25968 >/dev/null 2>/dev/null
selfserv with PID 25968 found at Wed Nov 28 11:17:38 EST 2012
selfserv with PID 25968 started at Wed Nov 28 11:17:38 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 100 -C c -V :ssl3 -N -n ExtendedSSLUser \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:17:38 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed Nov 28 11:17:39 EST 2012
ssl.sh: #7956: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 25968 at Wed Nov 28 11:17:39 EST 2012
kill -USR1 25968
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25968 killed at Wed Nov 28 11:17:39 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Wed Nov 28 11:17:39 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:17:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 26045 >/dev/null 2>/dev/null
selfserv with PID 26045 found at Wed Nov 28 11:17:39 EST 2012
selfserv with PID 26045 started at Wed Nov 28 11:17:39 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 100 -C c -N -n ExtendedSSLUser \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:17:39 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed Nov 28 11:17:41 EST 2012
ssl.sh: #7957: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26045 at Wed Nov 28 11:17:41 EST 2012
kill -USR1 26045
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 26045 killed at Wed Nov 28 11:17:41 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Wed Nov 28 11:17:41 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:17:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 26122 >/dev/null 2>/dev/null
selfserv with PID 26122 found at Wed Nov 28 11:17:41 EST 2012
selfserv with PID 26122 started at Wed Nov 28 11:17:41 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:17:41 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Wed Nov 28 11:17:41 EST 2012
ssl.sh: #7958: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26122 at Wed Nov 28 11:17:41 EST 2012
kill -USR1 26122
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 26122 killed at Wed Nov 28 11:17:41 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Wed Nov 28 11:17:41 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:17:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 26200 >/dev/null 2>/dev/null
selfserv with PID 26200 found at Wed Nov 28 11:17:41 EST 2012
selfserv with PID 26200 started at Wed Nov 28 11:17:41 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:17:41 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:17:42 EST 2012
ssl.sh: #7959: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26200 at Wed Nov 28 11:17:42 EST 2012
kill -USR1 26200
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 26200 killed at Wed Nov 28 11:17:42 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Wed Nov 28 11:17:42 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:17:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 26278 >/dev/null 2>/dev/null
selfserv with PID 26278 found at Wed Nov 28 11:17:42 EST 2012
selfserv with PID 26278 started at Wed Nov 28 11:17:42 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:17:42 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:17:42 EST 2012
ssl.sh: #7960: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26278 at Wed Nov 28 11:17:42 EST 2012
kill -USR1 26278
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 26278 killed at Wed Nov 28 11:17:42 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Wed Nov 28 11:17:42 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:17:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 26356 >/dev/null 2>/dev/null
selfserv with PID 26356 found at Wed Nov 28 11:17:42 EST 2012
selfserv with PID 26356 started at Wed Nov 28 11:17:42 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:17:42 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Wed Nov 28 11:17:43 EST 2012
ssl.sh: #7961: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26356 at Wed Nov 28 11:17:43 EST 2012
kill -USR1 26356
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 26356 killed at Wed Nov 28 11:17:43 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Wed Nov 28 11:17:43 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:17:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 26434 >/dev/null 2>/dev/null
selfserv with PID 26434 found at Wed Nov 28 11:17:43 EST 2012
selfserv with PID 26434 started at Wed Nov 28 11:17:43 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:17:43 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Wed Nov 28 11:17:43 EST 2012
ssl.sh: #7962: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26434 at Wed Nov 28 11:17:43 EST 2012
kill -USR1 26434
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 26434 killed at Wed Nov 28 11:17:43 EST 2012
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Wed Nov 28 11:17:43 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C009 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:17:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 26542 >/dev/null 2>/dev/null
selfserv with PID 26542 found at Wed Nov 28 11:17:43 EST 2012
selfserv with PID 26542 started at Wed Nov 28 11:17:43 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 100 -C :C009 -N -V :ssl3 \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:17:43 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed Nov 28 11:17:44 EST 2012
ssl.sh: #7963: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26542 at Wed Nov 28 11:17:44 EST 2012
kill -USR1 26542
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 26542 killed at Wed Nov 28 11:17:44 EST 2012
ssl.sh: Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Wed Nov 28 11:17:44 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C013 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:17:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 26619 >/dev/null 2>/dev/null
selfserv with PID 26619 found at Wed Nov 28 11:17:44 EST 2012
selfserv with PID 26619 started at Wed Nov 28 11:17:44 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 1000 -C :C013 -V :ssl3 \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:17:44 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:17:45 EST 2012
ssl.sh: #7964: Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26619 at Wed Nov 28 11:17:45 EST 2012
kill -USR1 26619
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 26619 killed at Wed Nov 28 11:17:45 EST 2012
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) ----
selfserv starting at Wed Nov 28 11:17:45 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C004 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:17:45 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 26697 >/dev/null 2>/dev/null
selfserv with PID 26697 found at Wed Nov 28 11:17:45 EST 2012
selfserv with PID 26697 started at Wed Nov 28 11:17:45 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C004 -N \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:17:45 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed Nov 28 11:17:46 EST 2012
ssl.sh: #7965: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26697 at Wed Nov 28 11:17:46 EST 2012
kill -USR1 26697
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 26697 killed at Wed Nov 28 11:17:46 EST 2012
ssl.sh: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) ----
selfserv starting at Wed Nov 28 11:17:46 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c :C00E -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:17:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 26774 >/dev/null 2>/dev/null
selfserv with PID 26774 found at Wed Nov 28 11:17:46 EST 2012
selfserv with PID 26774 started at Wed Nov 28 11:17:46 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C00E -N \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:17:46 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed Nov 28 11:17:47 EST 2012
ssl.sh: #7966: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26774 at Wed Nov 28 11:17:47 EST 2012
kill -USR1 26774
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 26774 killed at Wed Nov 28 11:17:47 EST 2012
ssl.sh: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Wed Nov 28 11:17:47 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C013 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:17:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 26851 >/dev/null 2>/dev/null
selfserv with PID 26851 found at Wed Nov 28 11:17:47 EST 2012
selfserv with PID 26851 started at Wed Nov 28 11:17:47 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :C013 \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:17:47 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:17:47 EST 2012
ssl.sh: #7967: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26851 at Wed Nov 28 11:17:48 EST 2012
kill -USR1 26851
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 26851 killed at Wed Nov 28 11:17:48 EST 2012
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) ----
selfserv starting at Wed Nov 28 11:17:48 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C004 -u -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:17:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 26929 >/dev/null 2>/dev/null
selfserv with PID 26929 found at Wed Nov 28 11:17:48 EST 2012
selfserv with PID 26929 started at Wed Nov 28 11:17:48 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :C004 -u \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:17:48 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Wed Nov 28 11:17:48 EST 2012
ssl.sh: #7968: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26929 at Wed Nov 28 11:17:48 EST 2012
kill -USR1 26929
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 26929 killed at Wed Nov 28 11:17:48 EST 2012
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Wed Nov 28 11:17:48 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C009 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:17:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 27028 >/dev/null 2>/dev/null
selfserv with PID 27028 found at Wed Nov 28 11:17:48 EST 2012
selfserv with PID 27028 started at Wed Nov 28 11:17:48 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 10 -C :C009 -N -V :ssl3 -n ExtendedSSLUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:17:48 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Wed Nov 28 11:17:49 EST 2012
ssl.sh: #7969: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27028 at Wed Nov 28 11:17:49 EST 2012
kill -USR1 27028
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 27028 killed at Wed Nov 28 11:17:49 EST 2012
ssl.sh: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) ----
selfserv starting at Wed Nov 28 11:17:49 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:17:49 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 27105 >/dev/null 2>/dev/null
selfserv with PID 27105 found at Wed Nov 28 11:17:49 EST 2012
selfserv with PID 27105 started at Wed Nov 28 11:17:49 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 100 -C :C013 -V :ssl3 -n ExtendedSSLUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:17:49 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:17:49 EST 2012
ssl.sh: #7970: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27105 at Wed Nov 28 11:17:49 EST 2012
kill -USR1 27105
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 27105 killed at Wed Nov 28 11:17:49 EST 2012
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Wed Nov 28 11:17:49 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C004 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:17:49 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 27183 >/dev/null 2>/dev/null
selfserv with PID 27183 found at Wed Nov 28 11:17:49 EST 2012
selfserv with PID 27183 started at Wed Nov 28 11:17:49 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 10 -C :C004 -N -n ExtendedSSLUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:17:49 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Wed Nov 28 11:17:50 EST 2012
ssl.sh: #7971: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27183 at Wed Nov 28 11:17:50 EST 2012
kill -USR1 27183
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 27183 killed at Wed Nov 28 11:17:50 EST 2012
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Wed Nov 28 11:17:50 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -r -r -c :C00E -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:17:50 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 27260 >/dev/null 2>/dev/null
selfserv with PID 27260 found at Wed Nov 28 11:17:50 EST 2012
selfserv with PID 27260 started at Wed Nov 28 11:17:50 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 10 -C :C00E -N -n ExtendedSSLUser-ecmixed \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:17:50 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Wed Nov 28 11:17:50 EST 2012
ssl.sh: #7972: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27260 at Wed Nov 28 11:17:50 EST 2012
kill -USR1 27260
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 27260 killed at Wed Nov 28 11:17:50 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ----
selfserv starting at Wed Nov 28 11:17:50 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:17:50 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 27337 >/dev/null 2>/dev/null
selfserv with PID 27337 found at Wed Nov 28 11:17:50 EST 2012
selfserv with PID 27337 started at Wed Nov 28 11:17:50 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 100 -C :C013 -n ExtendedSSLUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:17:51 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:17:51 EST 2012
ssl.sh: #7973: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27337 at Wed Nov 28 11:17:51 EST 2012
kill -USR1 27337
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 27337 killed at Wed Nov 28 11:17:51 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ----
selfserv starting at Wed Nov 28 11:17:51 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -u -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:17:51 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 27415 >/dev/null 2>/dev/null
selfserv with PID 27415 found at Wed Nov 28 11:17:51 EST 2012
selfserv with PID 27415 started at Wed Nov 28 11:17:51 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec -u \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:17:51 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Wed Nov 28 11:17:51 EST 2012
ssl.sh: #7974: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27415 at Wed Nov 28 11:17:51 EST 2012
kill -USR1 27415
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 27415 killed at Wed Nov 28 11:17:51 EST 2012
TIMESTAMP ssl END: Wed Nov 28 11:17:51 EST 2012
Running tests for merge
TIMESTAMP merge BEGIN: Wed Nov 28 11:17:51 EST 2012
merge.sh: Merge Tests ===============================
merge.sh: Creating an SDR key & Encrypt
sdrtest -d . -o /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/tests.v3.10869 -t Test2 -f ../tests.pw
merge.sh: #7975: Creating SDR Key  - PASSED
merge.sh: Merging in Key for Existing user
certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id dave --source-dir ../dave -d . -f ../tests.pw -@ ../tests.pw
upgrade complete!
merge.sh: #7976: Merging Dave  - PASSED
merge.sh: Merging in new user 
certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id server --source-dir ../server -d . -f ../tests.pw -@ ../tests.pw
upgrade complete!
merge.sh: #7977: Merging server  - PASSED
merge.sh: Merging in new chain 
certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id ext_client --source-dir ../ext_client -d . -f ../tests.pw -@ ../tests.pw
upgrade complete!
merge.sh: #7978: Merging ext_client  - PASSED
merge.sh: Merging in conflicting nicknames 1
certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id conflict1 --source-dir conflict1 -d . -f ../tests.pw -@ ../tests.pw
upgrade complete!
merge.sh: #7979: Merging conflicting nicknames 1  - PASSED
merge.sh: Merging in conflicting nicknames 1
certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id conflict2 --source-dir conflict2 -d . -f ../tests.pw -@ ../tests.pw
upgrade complete!
merge.sh: #7980: Merging conflicting nicknames 2  - PASSED
merge.sh: Verify nicknames were deconflicted (Alice #4)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 45 (0x2d)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:57:20 2012
            Not After : Tue Nov 28 15:57:20 2017
        Subject: "CN=TestUser45,E=TestUser45@bogus.com,O=BOGUS NSS,L=Mountain
             View,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e4:a1:0d:a7:60:8e:33:91:99:f7:ed:ef:79:50:d0:08:
                    38:51:d4:36:1c:5e:25:1e:52:87:2c:24:d9:00:bc:3a:
                    30:9b:1d:8b:98:34:65:a7:a9:84:51:3b:d0:e1:86:7d:
                    f6:fe:44:e1:ea:89:e4:77:3a:1f:82:1e:26:8f:8c:c7:
                    18:66:6f:3f:d6:c3:74:81:7c:7c:ba:0a:51:97:61:78:
                    02:cc:1f:ba:16:21:86:aa:e5:dd:ec:05:12:5d:58:4b:
                    0a:20:93:42:b1:e2:6a:b0:58:3d:34:05:36:7b:ae:bd:
                    3a:62:ba:dd:3c:30:7b:b0:43:2e:97:a9:a6:25:b5:97
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3d:de:27:5a:bb:4b:d8:40:65:db:96:56:3f:4b:78:6d:
        2c:8e:59:44:5b:e9:70:d9:62:b2:78:12:3d:6f:a9:46:
        e7:96:47:07:57:42:09:4e:8e:1c:82:ef:0a:30:ae:7b:
        96:ab:61:da:37:f0:46:83:88:d3:90:ee:cf:17:95:cd:
        7a:d5:f1:c8:07:9a:78:07:53:28:a5:70:25:ed:cb:ba:
        f9:52:55:c6:a7:b2:f7:20:18:4f:46:2f:c1:e7:9d:4e:
        05:28:fe:fe:bd:07:af:bd:b0:35:11:6d:fd:e9:43:5c:
        55:5b:b3:9a:b5:7b:bb:ca:d0:16:3f:71:00:1d:00:03
    Fingerprint (MD5):
        33:03:D8:29:9F:43:53:B5:58:C5:44:0D:78:96:CA:11
    Fingerprint (SHA1):
        08:4A:89:C3:6D:70:CC:58:33:97:84:C5:74:C5:C9:04:81:1F:3C:38

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

merge.sh: #7981: Verify nicknames were deconflicted (Alice #4)  - PASSED
merge.sh: Verify nicknames were deconflicted (Alice #100)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 46 (0x2e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 15:57:21 2012
            Not After : Tue Nov 28 15:57:21 2017
        Subject: "CN=TestUser46,E=TestUser46@bogus.com,O=BOGUS NSS,L=Mountain
             View,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e2:1a:f6:95:4c:70:84:ce:56:19:13:b7:1a:f8:e0:43:
                    00:94:07:a7:98:e5:07:bc:74:f7:fb:50:92:88:42:e6:
                    fb:ec:34:bb:e4:19:35:78:f1:3d:02:a2:4c:f7:36:26:
                    21:d9:8f:7f:fc:b4:84:af:73:7d:32:ce:54:a6:c2:c6:
                    b7:44:63:04:94:2d:63:42:25:cb:d9:30:86:eb:01:ec:
                    d9:7f:d0:52:ba:91:f0:1b:95:72:3a:fc:df:dd:c6:89:
                    c5:2b:97:30:02:34:23:e4:fe:6e:97:5d:90:36:d9:27:
                    08:4b:d6:49:52:89:5a:11:98:73:21:42:2b:f0:16:b7
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        c1:d5:71:d0:58:7b:f3:d0:c8:e1:97:9f:c9:ce:67:81:
        cf:d4:ac:b3:4c:2b:e0:48:bf:5b:2b:25:0e:68:6b:0e:
        4b:44:4c:a9:e2:31:10:1a:47:34:f6:9a:f3:ae:ee:3c:
        e9:d1:52:1d:4a:e4:f4:67:1e:1f:e2:e6:4a:17:17:d6:
        40:c2:59:9e:96:3d:30:88:bd:24:f3:16:fa:8a:eb:5d:
        a2:2d:26:3c:eb:b9:05:f3:13:b1:49:d9:c0:ab:c6:b5:
        fc:08:e6:6b:58:8b:cf:83:a7:d6:f3:58:93:d3:70:f9:
        0f:ec:b9:ca:89:f2:1e:ee:62:d1:60:29:e8:6c:07:4f
    Fingerprint (MD5):
        AC:0A:37:00:7E:F3:32:19:6A:0C:0E:F2:C3:A1:97:0B
    Fingerprint (SHA1):
        41:FF:0D:A0:C6:D3:13:8D:52:C6:1F:C6:65:22:5E:92:F5:67:20:EF

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

merge.sh: #7982: Verify nicknames were deconflicted (Alice #100)  - PASSED
merge.sh: Merging in SDR 
certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id sdr --source-dir ../SDR -d . -f ../tests.pw -@ ../tests.pw
upgrade complete!
merge.sh: #7983: Merging SDR  - PASSED

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

Alice                                                        u,u,u
Alice-ec                                                     u,u,u
bob@bogus.com                                                ,,   
Dave                                                         u,u,u
eve@bogus.com                                                ,,   
bob-ec@bogus.com                                             ,,   
Dave-ec                                                      u,u,u
TestCA                                                       CT,C,C
TestCA-ec                                                    CT,C,C
Alice-ecmixed                                                u,u,u
Dave-ecmixed                                                 u,u,u
buildnss02.usersys.redhat.com                                u,u,u
buildnss02.usersys.redhat.com-ec                             u,u,u
buildnss02-sni.usersys.redhat.com-ecmixed                    u,u,u
buildnss02.usersys.redhat.com-ecmixed                        u,u,u
buildnss02-sni.usersys.redhat.com                            u,u,u
buildnss02-sni.usersys.redhat.com-ec                         u,u,u
ExtendedSSLUser-ecmixed                                      u,u,u
chain-2-clientCA-ec                                          ,,   
clientCA                                                     T,C,C
chain-2-clientCA                                             ,,   
clientCA-ec                                                  T,C,C
ExtendedSSLUser                                              u,u,u
serverCA                                                     C,C,C
ExtendedSSLUser-ec                                           u,u,u
serverCA-ec                                                  C,C,C
chain-1-clientCA-ec                                          ,,   
chain-1-clientCA                                             ,,   
Alice #1                                                     ,,   
Alice #2                                                     ,,   
Alice #99                                                    ,,   
Alice #3                                                     ,,   
Alice #100                                                   ,,   
Alice #4                                                     ,,   


CRL names                                CRL Type

TestCA                                   CRL  
TestCA-ec                                CRL  
merge.sh: Decrypt - With Original SDR Key
sdrtest -d . -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/tests.v3.10869 -t Test2 -f ../tests.pw
merge.sh: #7984: Decrypt - Value 3  - PASSED
merge.sh: Decrypt - With Merged SDR Key
sdrtest -d . -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/upgradedb/tests.v1.10869 -t Test1 -f ../tests.pw
merge.sh: #7985: Decrypt - Value 1  - PASSED
merge.sh: Signing with merged key  ------------------
cmsutil -S -T -N Dave -H SHA1 -i alice.txt -d . -p nss -o dave.dsig
merge.sh: #7986: Create Detached Signature Dave . - PASSED
cmsutil -D -i dave.dsig -c alice.txt -d . 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
merge.sh: #7987: Verifying Dave's Detached Signature  - PASSED
merge.sh: verifying  merged cert  ------------------
certutil -V -n ExtendedSSLUser -u C -d .
certutil: certificate is valid
merge.sh: #7988: Verifying ExtendedSSL User Cert  - PASSED
merge.sh: verifying  merged crl  ------------------
crlutil -L -n TestCA -d .
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US"
    This Update: Wed Nov 28 15:57:29 2012
    Entry 1 (0x1):
        Serial Number: 40 (0x28)
        Revocation Date: Wed Nov 28 15:56:49 2012
        Entry Extensions:
            Name: CRL reason code

    Entry 2 (0x2):
        Serial Number: 42 (0x2a)
        Revocation Date: Wed Nov 28 15:57:27 2012
    CRL Extensions:
        Name: Certificate Issuer Alt Name
        RFC822 Name: "caemail@ca.com"
        DNS name: "ca.com"
        Directory Name: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=Califo
            rnia,C=US"
        URI: "http://ca.com"
        IP Address:
            87:0b:31:39:32:2e:31:36:38:2e:30:2e:31

merge.sh: #7989: Verifying TestCA CRL  - PASSED
TIMESTAMP merge END: Wed Nov 28 11:18:00 EST 2012
merge.sh: Testing with shared library ===============================
Running tests for lowhash
TIMESTAMP lowhash BEGIN: Wed Nov 28 11:18:00 EST 2012
lowhash.sh: Lowhash Tests ===============================
lowhashtest with fips mode=
lowhashtest MD5
lowhash.sh: #7990: lowhashtest with fips mode= for MD5  - PASSED
lowhashtest SHA1
lowhash.sh: #7991: lowhashtest with fips mode= for SHA1  - PASSED
lowhashtest SHA224
lowhash.sh: #7992: lowhashtest with fips mode= for SHA224  - PASSED
lowhashtest SHA256
lowhash.sh: #7993: lowhashtest with fips mode= for SHA256  - PASSED
lowhashtest SHA384
lowhash.sh: #7994: lowhashtest with fips mode= for SHA384  - PASSED
lowhashtest SHA512
lowhash.sh: #7995: lowhashtest with fips mode= for SHA512  - PASSED
lowhashtest with fips mode=
lowhashtest MD5
lowhash.sh: #7996: lowhashtest with fips mode= for MD5  - PASSED
lowhashtest SHA1
lowhash.sh: #7997: lowhashtest with fips mode= for SHA1  - PASSED
lowhashtest SHA224
lowhash.sh: #7998: lowhashtest with fips mode= for SHA224  - PASSED
lowhashtest SHA256
lowhash.sh: #7999: lowhashtest with fips mode= for SHA256  - PASSED
lowhashtest SHA384
lowhash.sh: #8000: lowhashtest with fips mode= for SHA384  - PASSED
lowhashtest SHA512
lowhash.sh: #8001: lowhashtest with fips mode= for SHA512  - PASSED
lowhash.sh done
TIMESTAMP lowhash END: Wed Nov 28 11:18:01 EST 2012
Running tests for cert
TIMESTAMP cert BEGIN: Wed Nov 28 11:18:01 EST 2012
cert.sh: Certutil and Crlutil Tests with ECC ===============================
cert.sh: #8002: Looking for root certs module. - PASSED
cert.sh: Creating a CA Certificate TestCA ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/CA
cert.sh: Creating CA Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/CA -f ../tests.pw
cert.sh: #8003: Creating CA Cert DB - PASSED
cert.sh: Loading root cert module to CA Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/CA

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #8004: Loading root cert module to CA Cert DB - PASSED
cert.sh: Certificate initialized ----------
cert.sh: Creating CA Cert TestCA  --------------------------
certutil -s "CN=NSS Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA -t CTu,CTu,CTu -v 600 -x -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #8005: Creating CA Cert TestCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n TestCA -r -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/CA -o root.cert
cert.sh: #8006: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate serverCA ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/serverCA
cert.sh: Creating CA Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/serverCA -f ../tests.pw
cert.sh: #8007: Creating CA Cert DB - PASSED
cert.sh: Loading root cert module to CA Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/serverCA

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #8008: Loading root cert module to CA Cert DB - PASSED
cert.sh: Certificate initialized ----------
cert.sh: Creating CA Cert serverCA  --------------------------
certutil -s "CN=NSS Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA -t Cu,Cu,Cu -v 600 -x -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #8009: Creating CA Cert serverCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n serverCA -r -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/serverCA -o root.cert
cert.sh: #8010: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate chain-1-serverCA ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/serverCA
cert.sh: Creating CA Cert chain-1-serverCA  --------------------------
certutil -s "CN=NSS Chain1 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA -t u,u,u -v 600 -c serverCA -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #8011: Creating CA Cert chain-1-serverCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n chain-1-serverCA -r -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/serverCA -o root.cert
cert.sh: #8012: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate chain-2-serverCA ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/serverCA
cert.sh: Creating CA Cert chain-2-serverCA  --------------------------
certutil -s "CN=NSS Chain2 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA -t u,u,u -v 600 -c chain-1-serverCA -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #8013: Creating CA Cert chain-2-serverCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n chain-2-serverCA -r -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/serverCA -o root.cert
cert.sh: #8014: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate clientCA ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/clientCA
cert.sh: Creating CA Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/clientCA -f ../tests.pw
cert.sh: #8015: Creating CA Cert DB - PASSED
cert.sh: Loading root cert module to CA Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/clientCA

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #8016: Loading root cert module to CA Cert DB - PASSED
cert.sh: Certificate initialized ----------
cert.sh: Creating CA Cert clientCA  --------------------------
certutil -s "CN=NSS Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA -t Tu,Cu,Cu -v 600 -x -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #8017: Creating CA Cert clientCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n clientCA -r -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/clientCA -o root.cert
cert.sh: #8018: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate chain-1-clientCA ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/clientCA
cert.sh: Creating CA Cert chain-1-clientCA  --------------------------
certutil -s "CN=NSS Chain1 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA -t u,u,u -v 600 -c clientCA -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #8019: Creating CA Cert chain-1-clientCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n chain-1-clientCA -r -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/clientCA -o root.cert
cert.sh: #8020: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate chain-2-clientCA ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/clientCA
cert.sh: Creating CA Cert chain-2-clientCA  --------------------------
certutil -s "CN=NSS Chain2 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA -t u,u,u -v 600 -c chain-1-clientCA -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #8021: Creating CA Cert chain-2-clientCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n chain-2-clientCA -r -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/clientCA -o root.cert
cert.sh: #8022: Exporting Root Cert - PASSED
cert.sh: Creating an EC CA Certificate TestCA-ec ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/CA
cert.sh: Creating EC CA Cert TestCA-ec  --------------------------
certutil -s "CN=NSS Test CA (ECC), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-ec -k ec -q secp521r1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #8023: Creating EC CA Cert TestCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n TestCA-ec -r -d . -o ecroot.cert
cert.sh: #8024: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate serverCA-ec ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/serverCA
cert.sh: Creating EC CA Cert serverCA-ec  --------------------------
certutil -s "CN=NSS Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-ec -k ec -q secp521r1 -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #8025: Creating EC CA Cert serverCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n serverCA-ec -r -d . -o ecroot.cert
cert.sh: #8026: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate chain-1-serverCA-ec ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/serverCA
cert.sh: Creating EC CA Cert chain-1-serverCA-ec  --------------------------
certutil -s "CN=NSS Chain1 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #8027: Creating EC CA Cert chain-1-serverCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n chain-1-serverCA-ec -r -d . -o ecroot.cert
cert.sh: #8028: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate chain-2-serverCA-ec ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/serverCA
cert.sh: Creating EC CA Cert chain-2-serverCA-ec  --------------------------
certutil -s "CN=NSS Chain2 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #8029: Creating EC CA Cert chain-2-serverCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n chain-2-serverCA-ec -r -d . -o ecroot.cert
cert.sh: #8030: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate clientCA-ec ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/clientCA
cert.sh: Creating EC CA Cert clientCA-ec  --------------------------
certutil -s "CN=NSS Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-ec -k ec -q secp521r1 -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #8031: Creating EC CA Cert clientCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n clientCA-ec -r -d . -o ecroot.cert
cert.sh: #8032: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate chain-1-clientCA-ec ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/clientCA
cert.sh: Creating EC CA Cert chain-1-clientCA-ec  --------------------------
certutil -s "CN=NSS Chain1 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #8033: Creating EC CA Cert chain-1-clientCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n chain-1-clientCA-ec -r -d . -o ecroot.cert
cert.sh: #8034: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate chain-2-clientCA-ec ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/clientCA
cert.sh: Creating EC CA Cert chain-2-clientCA-ec  --------------------------
certutil -s "CN=NSS Chain2 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #8035: Creating EC CA Cert chain-2-clientCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n chain-2-clientCA-ec -r -d . -o ecroot.cert
cert.sh: #8036: Exporting EC Root Cert - PASSED
cert.sh: Creating Certificates, issued by the last ===============
     of a chain of CA's which are not in the same database============
Server Cert
cert.sh: Initializing buildnss02.usersys.redhat.com's Cert DB (ext.) --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/ext_server -f ../tests.pw
cert.sh: #8037: Initializing buildnss02.usersys.redhat.com's Cert DB (ext.) - PASSED
cert.sh: Loading root cert module to buildnss02.usersys.redhat.com's Cert DB (ext.) --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/ext_server

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #8038: Loading root cert module to buildnss02.usersys.redhat.com's Cert DB (ext.) - PASSED
cert.sh: Generate Cert Request for buildnss02.usersys.redhat.com (ext) --------------------------
certutil -s "CN=buildnss02.usersys.redhat.com, E=buildnss02.usersys.redhat.com@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/ext_server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8039: Generate Cert Request for buildnss02.usersys.redhat.com (ext) - PASSED
cert.sh: Sign buildnss02.usersys.redhat.com's Request (ext) --------------------------
certutil -C -c chain-2-serverCA -m 200 -v 60 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/serverCA -i req -o buildnss02.usersys.redhat.com.cert -f ../tests.pw
cert.sh: #8040: Sign buildnss02.usersys.redhat.com's Request (ext) - PASSED
cert.sh: Import buildnss02.usersys.redhat.com's Cert  -t u,u,u (ext) --------------------------
certutil -A -n buildnss02.usersys.redhat.com -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/ext_server -f ../tests.pw -i buildnss02.usersys.redhat.com.cert
cert.sh: #8041: Import buildnss02.usersys.redhat.com's Cert  -t u,u,u (ext) - PASSED
cert.sh: Import Client Root CA -t T,, for buildnss02.usersys.redhat.com (ext.) --------------------------
certutil -A -n clientCA -t T,, -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/ext_server -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/clientCA/clientCA.ca.cert
cert.sh: #8042: Import Client Root CA -t T,, for buildnss02.usersys.redhat.com (ext.) - PASSED
cert.sh: Generate EC Cert Request for buildnss02.usersys.redhat.com (ext) --------------------------
certutil -s "CN=buildnss02.usersys.redhat.com, E=buildnss02.usersys.redhat.com-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8043: Generate EC Cert Request for buildnss02.usersys.redhat.com (ext) - PASSED
cert.sh: Sign buildnss02.usersys.redhat.com's EC Request (ext) --------------------------
certutil -C -c chain-2-serverCA-ec -m 200 -v 60 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/serverCA -i req -o buildnss02.usersys.redhat.com-ec.cert -f ../tests.pw
cert.sh: #8044: Sign buildnss02.usersys.redhat.com's EC Request (ext) - PASSED
cert.sh: Import buildnss02.usersys.redhat.com's EC Cert  -t u,u,u (ext) --------------------------
certutil -A -n buildnss02.usersys.redhat.com-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/ext_server -f ../tests.pw -i buildnss02.usersys.redhat.com-ec.cert
cert.sh: #8045: Import buildnss02.usersys.redhat.com's EC Cert  -t u,u,u (ext) - PASSED
cert.sh: Import Client EC Root CA -t T,, for buildnss02.usersys.redhat.com (ext.) --------------------------
certutil -A -n clientCA-ec -t T,, -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/ext_server -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/clientCA/clientCA-ec.ca.cert
cert.sh: #8046: Import Client EC Root CA -t T,, for buildnss02.usersys.redhat.com (ext.) - PASSED
cert.sh: Generate mixed EC Cert Request for buildnss02.usersys.redhat.com (ext) --------------------------
certutil -s "CN=buildnss02.usersys.redhat.com, E=buildnss02.usersys.redhat.com-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8047: Generate mixed EC Cert Request for buildnss02.usersys.redhat.com (ext) - PASSED
cert.sh: Sign buildnss02.usersys.redhat.com's mixed EC Request (ext) --------------------------
certutil -C -c chain-2-serverCA -m 201 -v 60 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/serverCA -i req -o buildnss02.usersys.redhat.com-ecmixed.cert -f ../tests.pw
cert.sh: #8048: Sign buildnss02.usersys.redhat.com's mixed EC Request (ext) - PASSED
cert.sh: Import buildnss02.usersys.redhat.com's mixed EC Cert  -t u,u,u (ext) --------------------------
certutil -A -n buildnss02.usersys.redhat.com-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/ext_server -f ../tests.pw -i buildnss02.usersys.redhat.com-ecmixed.cert
cert.sh: #8049: Import buildnss02.usersys.redhat.com's mixed EC Cert  -t u,u,u (ext) - PASSED
Importing all the server's own CA chain into the servers DB
cert.sh: Import chain-2-serverCA-ec CA -t u,u,u for buildnss02.usersys.redhat.com (ext.)  --------------------------
certutil -A -n chain-2-serverCA-ec -t u,u,u -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/ext_server -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/serverCA/chain-2-serverCA-ec.ca.cert
cert.sh: #8050: Import chain-2-serverCA-ec CA -t u,u,u for buildnss02.usersys.redhat.com (ext.)  - PASSED
cert.sh: Import chain-1-serverCA CA -t u,u,u for buildnss02.usersys.redhat.com (ext.)  --------------------------
certutil -A -n chain-1-serverCA -t u,u,u -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/ext_server -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/serverCA/chain-1-serverCA.ca.cert
cert.sh: #8051: Import chain-1-serverCA CA -t u,u,u for buildnss02.usersys.redhat.com (ext.)  - PASSED
cert.sh: Import serverCA CA -t C,C,C for buildnss02.usersys.redhat.com (ext.)  --------------------------
certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/ext_server -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/serverCA/serverCA.ca.cert
cert.sh: #8052: Import serverCA CA -t C,C,C for buildnss02.usersys.redhat.com (ext.)  - PASSED
cert.sh: Import chain-2-serverCA CA -t u,u,u for buildnss02.usersys.redhat.com (ext.)  --------------------------
certutil -A -n chain-2-serverCA -t u,u,u -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/ext_server -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/serverCA/chain-2-serverCA.ca.cert
cert.sh: #8053: Import chain-2-serverCA CA -t u,u,u for buildnss02.usersys.redhat.com (ext.)  - PASSED
cert.sh: Import serverCA-ec CA -t C,C,C for buildnss02.usersys.redhat.com (ext.)  --------------------------
certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/ext_server -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/serverCA/serverCA-ec.ca.cert
cert.sh: #8054: Import serverCA-ec CA -t C,C,C for buildnss02.usersys.redhat.com (ext.)  - PASSED
cert.sh: Import chain-1-serverCA-ec CA -t u,u,u for buildnss02.usersys.redhat.com (ext.)  --------------------------
certutil -A -n chain-1-serverCA-ec -t u,u,u -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/ext_server -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/serverCA/chain-1-serverCA-ec.ca.cert
cert.sh: #8055: Import chain-1-serverCA-ec CA -t u,u,u for buildnss02.usersys.redhat.com (ext.)  - PASSED
Client Cert
cert.sh: Initializing ExtendedSSLUser's Cert DB (ext.) --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/ext_client -f ../tests.pw
cert.sh: #8056: Initializing ExtendedSSLUser's Cert DB (ext.) - PASSED
cert.sh: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/ext_client

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #8057: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) - PASSED
cert.sh: Generate Cert Request for ExtendedSSLUser (ext) --------------------------
certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/ext_client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8058: Generate Cert Request for ExtendedSSLUser (ext) - PASSED
cert.sh: Sign ExtendedSSLUser's Request (ext) --------------------------
certutil -C -c chain-2-clientCA -m 300 -v 60 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/clientCA -i req -o ExtendedSSLUser.cert -f ../tests.pw
cert.sh: #8059: Sign ExtendedSSLUser's Request (ext) - PASSED
cert.sh: Import ExtendedSSLUser's Cert -t u,u,u (ext) --------------------------
certutil -A -n ExtendedSSLUser -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/ext_client -f ../tests.pw -i ExtendedSSLUser.cert
cert.sh: #8060: Import ExtendedSSLUser's Cert -t u,u,u (ext) - PASSED
cert.sh: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) --------------------------
certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/ext_client -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/serverCA/serverCA.ca.cert
cert.sh: #8061: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED
cert.sh: Generate EC Cert Request for ExtendedSSLUser (ext) --------------------------
certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8062: Generate EC Cert Request for ExtendedSSLUser (ext) - PASSED
cert.sh: Sign ExtendedSSLUser's EC Request (ext) --------------------------
certutil -C -c chain-2-clientCA-ec -m 300 -v 60 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/clientCA -i req -o ExtendedSSLUser-ec.cert -f ../tests.pw
cert.sh: #8063: Sign ExtendedSSLUser's EC Request (ext) - PASSED
cert.sh: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) --------------------------
certutil -A -n ExtendedSSLUser-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/ext_client -f ../tests.pw -i ExtendedSSLUser-ec.cert
cert.sh: #8064: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) - PASSED
cert.sh: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) --------------------------
certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/ext_client -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/serverCA/serverCA-ec.ca.cert
cert.sh: #8065: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED
cert.sh: Generate mixed EC Cert Request for ExtendedSSLUser (ext) --------------------------
certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8066: Generate mixed EC Cert Request for ExtendedSSLUser (ext) - PASSED
cert.sh: Sign ExtendedSSLUser's mixed EC Request (ext) --------------------------
certutil -C -c chain-2-clientCA -m 301 -v 60 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/clientCA -i req -o ExtendedSSLUser-ecmixed.cert -f ../tests.pw
cert.sh: #8067: Sign ExtendedSSLUser's mixed EC Request (ext) - PASSED
cert.sh: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) --------------------------
certutil -A -n ExtendedSSLUser-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/ext_client -f ../tests.pw -i ExtendedSSLUser-ecmixed.cert
cert.sh: #8068: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) - PASSED
Importing all the client's own CA chain into the servers DB
cert.sh: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) --------------------------
certutil -A -n chain-2-clientCA-ec -t u,u,u -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/ext_client -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/clientCA/chain-2-clientCA-ec.ca.cert
cert.sh: #8069: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) --------------------------
certutil -A -n clientCA -t T,C,C -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/ext_client -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/clientCA/clientCA.ca.cert
cert.sh: #8070: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) --------------------------
certutil -A -n chain-2-clientCA -t u,u,u -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/ext_client -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/clientCA/chain-2-clientCA.ca.cert
cert.sh: #8071: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) --------------------------
certutil -A -n clientCA-ec -t T,C,C -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/ext_client -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/clientCA/clientCA-ec.ca.cert
cert.sh: #8072: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) --------------------------
certutil -A -n chain-1-clientCA-ec -t u,u,u -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/ext_client -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/clientCA/chain-1-clientCA-ec.ca.cert
cert.sh: #8073: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) --------------------------
certutil -A -n chain-1-clientCA -t u,u,u -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/ext_client -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/clientCA/chain-1-clientCA.ca.cert
cert.sh: #8074: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED
cert.sh SUCCESS: EXT passed
cert.sh: Creating Client CA Issued Certificates ===============
cert.sh: Initializing TestUser's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw
cert.sh: #8075: Initializing TestUser's Cert DB - PASSED
cert.sh: Loading root cert module to TestUser's Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #8076: Loading root cert module to TestUser's Cert DB - PASSED
cert.sh: Import Root CA for TestUser --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -i ../CA/TestCA.ca.cert
cert.sh: #8077: Import Root CA for TestUser - PASSED
cert.sh: Import EC Root CA for TestUser --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -i ../CA/TestCA-ec.ca.cert
cert.sh: #8078: Import EC Root CA for TestUser - PASSED
cert.sh: Generate Cert Request for TestUser --------------------------
certutil -s "CN=TestUser, E=TestUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8079: Generate Cert Request for TestUser - PASSED
cert.sh: Sign TestUser's Request --------------------------
certutil -C -c TestCA -m 70 -v 60 -d ../CA -i req -o TestUser.cert -f ../tests.pw 
cert.sh: #8080: Sign TestUser's Request - PASSED
cert.sh: Import TestUser's Cert --------------------------
certutil -A -n TestUser -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser.cert
cert.sh: #8081: Import TestUser's Cert - PASSED
cert.sh SUCCESS: TestUser's Cert Created
cert.sh: Generate EC Cert Request for TestUser --------------------------
certutil -s "CN=TestUser, E=TestUser-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8082: Generate EC Cert Request for TestUser - PASSED
cert.sh: Sign TestUser's EC Request --------------------------
certutil -C -c TestCA-ec -m 70 -v 60 -d ../CA -i req -o TestUser-ec.cert -f ../tests.pw 
cert.sh: #8083: Sign TestUser's EC Request - PASSED
cert.sh: Import TestUser's EC Cert --------------------------
certutil -A -n TestUser-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser-ec.cert
cert.sh: #8084: Import TestUser's EC Cert - PASSED
cert.sh SUCCESS: TestUser's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser --------------------------
certutil -s "CN=TestUser, E=TestUser-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8085: Generate mixed EC Cert Request for TestUser - PASSED
cert.sh: Sign TestUser's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10070 -v 60 -d ../CA -i req -o TestUser-ecmixed.cert -f ../tests.pw 
cert.sh: #8086: Sign TestUser's EC Request with RSA - PASSED
cert.sh: Import TestUser's mixed EC Cert --------------------------
certutil -A -n TestUser-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser-ecmixed.cert
cert.sh: #8087: Import TestUser's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser's mixed EC Cert Created
cert.sh: Creating Server CA Issued Certificate for \
             buildnss02.usersys.redhat.com ------------------------------------
cert.sh: Initializing buildnss02.usersys.redhat.com's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/server -f ../tests.pw
cert.sh: #8088: Initializing buildnss02.usersys.redhat.com's Cert DB - PASSED
cert.sh: Loading root cert module to buildnss02.usersys.redhat.com's Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/server

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #8089: Loading root cert module to buildnss02.usersys.redhat.com's Cert DB - PASSED
cert.sh: Import Root CA for buildnss02.usersys.redhat.com --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/server -i ../CA/TestCA.ca.cert
cert.sh: #8090: Import Root CA for buildnss02.usersys.redhat.com - PASSED
cert.sh: Import EC Root CA for buildnss02.usersys.redhat.com --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/server -i ../CA/TestCA-ec.ca.cert
cert.sh: #8091: Import EC Root CA for buildnss02.usersys.redhat.com - PASSED
cert.sh: Generate Cert Request for buildnss02.usersys.redhat.com --------------------------
certutil -s "CN=buildnss02.usersys.redhat.com, E=buildnss02.usersys.redhat.com@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8092: Generate Cert Request for buildnss02.usersys.redhat.com - PASSED
cert.sh: Sign buildnss02.usersys.redhat.com's Request --------------------------
certutil -C -c TestCA -m 100 -v 60 -d ../CA -i req -o buildnss02.usersys.redhat.com.cert -f ../tests.pw 
cert.sh: #8093: Sign buildnss02.usersys.redhat.com's Request - PASSED
cert.sh: Import buildnss02.usersys.redhat.com's Cert --------------------------
certutil -A -n buildnss02.usersys.redhat.com -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/server -f ../tests.pw -i buildnss02.usersys.redhat.com.cert
cert.sh: #8094: Import buildnss02.usersys.redhat.com's Cert - PASSED
cert.sh SUCCESS: buildnss02.usersys.redhat.com's Cert Created
cert.sh: Generate EC Cert Request for buildnss02.usersys.redhat.com --------------------------
certutil -s "CN=buildnss02.usersys.redhat.com, E=buildnss02.usersys.redhat.com-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8095: Generate EC Cert Request for buildnss02.usersys.redhat.com - PASSED
cert.sh: Sign buildnss02.usersys.redhat.com's EC Request --------------------------
certutil -C -c TestCA-ec -m 100 -v 60 -d ../CA -i req -o buildnss02.usersys.redhat.com-ec.cert -f ../tests.pw 
cert.sh: #8096: Sign buildnss02.usersys.redhat.com's EC Request - PASSED
cert.sh: Import buildnss02.usersys.redhat.com's EC Cert --------------------------
certutil -A -n buildnss02.usersys.redhat.com-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/server -f ../tests.pw -i buildnss02.usersys.redhat.com-ec.cert
cert.sh: #8097: Import buildnss02.usersys.redhat.com's EC Cert - PASSED
cert.sh SUCCESS: buildnss02.usersys.redhat.com's EC Cert Created
cert.sh: Generate mixed EC Cert Request for buildnss02.usersys.redhat.com --------------------------
certutil -s "CN=buildnss02.usersys.redhat.com, E=buildnss02.usersys.redhat.com-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8098: Generate mixed EC Cert Request for buildnss02.usersys.redhat.com - PASSED
cert.sh: Sign buildnss02.usersys.redhat.com's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10100 -v 60 -d ../CA -i req -o buildnss02.usersys.redhat.com-ecmixed.cert -f ../tests.pw 
cert.sh: #8099: Sign buildnss02.usersys.redhat.com's EC Request with RSA - PASSED
cert.sh: Import buildnss02.usersys.redhat.com's mixed EC Cert --------------------------
certutil -A -n buildnss02.usersys.redhat.com-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/server -f ../tests.pw -i buildnss02.usersys.redhat.com-ecmixed.cert
cert.sh: #8100: Import buildnss02.usersys.redhat.com's mixed EC Cert - PASSED
cert.sh SUCCESS: buildnss02.usersys.redhat.com's mixed EC Cert Created
cert.sh: Creating Server CA Issued Certificate for \
             buildnss02.usersys.redhat.com-sni --------------------------------
cert.sh: Generate Cert Request for buildnss02-sni.usersys.redhat.com --------------------------
certutil -s "CN=buildnss02-sni.usersys.redhat.com, E=buildnss02-sni.usersys.redhat.com@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8101: Generate Cert Request for buildnss02-sni.usersys.redhat.com - PASSED
cert.sh: Sign buildnss02-sni.usersys.redhat.com's Request --------------------------
certutil -C -c TestCA -m 101 -v 60 -d ../CA -i req -o buildnss02-sni.usersys.redhat.com.cert -f ../tests.pw 
cert.sh: #8102: Sign buildnss02-sni.usersys.redhat.com's Request - PASSED
cert.sh: Import buildnss02-sni.usersys.redhat.com's Cert --------------------------
certutil -A -n buildnss02-sni.usersys.redhat.com -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/server -f ../tests.pw -i buildnss02-sni.usersys.redhat.com.cert
cert.sh: #8103: Import buildnss02-sni.usersys.redhat.com's Cert - PASSED
cert.sh SUCCESS: buildnss02-sni.usersys.redhat.com's Cert Created
cert.sh: Generate EC Cert Request for buildnss02-sni.usersys.redhat.com --------------------------
certutil -s "CN=buildnss02-sni.usersys.redhat.com, E=buildnss02-sni.usersys.redhat.com-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8104: Generate EC Cert Request for buildnss02-sni.usersys.redhat.com - PASSED
cert.sh: Sign buildnss02-sni.usersys.redhat.com's EC Request --------------------------
certutil -C -c TestCA-ec -m 101 -v 60 -d ../CA -i req -o buildnss02-sni.usersys.redhat.com-ec.cert -f ../tests.pw 
cert.sh: #8105: Sign buildnss02-sni.usersys.redhat.com's EC Request - PASSED
cert.sh: Import buildnss02-sni.usersys.redhat.com's EC Cert --------------------------
certutil -A -n buildnss02-sni.usersys.redhat.com-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/server -f ../tests.pw -i buildnss02-sni.usersys.redhat.com-ec.cert
cert.sh: #8106: Import buildnss02-sni.usersys.redhat.com's EC Cert - PASSED
cert.sh SUCCESS: buildnss02-sni.usersys.redhat.com's EC Cert Created
cert.sh: Generate mixed EC Cert Request for buildnss02-sni.usersys.redhat.com --------------------------
certutil -s "CN=buildnss02-sni.usersys.redhat.com, E=buildnss02-sni.usersys.redhat.com-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8107: Generate mixed EC Cert Request for buildnss02-sni.usersys.redhat.com - PASSED
cert.sh: Sign buildnss02-sni.usersys.redhat.com's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10101 -v 60 -d ../CA -i req -o buildnss02-sni.usersys.redhat.com-ecmixed.cert -f ../tests.pw 
cert.sh: #8108: Sign buildnss02-sni.usersys.redhat.com's EC Request with RSA - PASSED
cert.sh: Import buildnss02-sni.usersys.redhat.com's mixed EC Cert --------------------------
certutil -A -n buildnss02-sni.usersys.redhat.com-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/server -f ../tests.pw -i buildnss02-sni.usersys.redhat.com-ecmixed.cert
cert.sh: #8109: Import buildnss02-sni.usersys.redhat.com's mixed EC Cert - PASSED
cert.sh SUCCESS: buildnss02-sni.usersys.redhat.com's mixed EC Cert Created
cert.sh: Modify trust attributes of Root CA -t TC,TC,TC --------------------------
certutil -M -n TestCA -t TC,TC,TC -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/server -f ../tests.pw
cert.sh: #8110: Modify trust attributes of Root CA -t TC,TC,TC - PASSED
cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC --------------------------
certutil -M -n TestCA-ec -t TC,TC,TC -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/server -f ../tests.pw
cert.sh: #8111: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED
cert.sh SUCCESS: SSL passed
cert.sh: Creating Client CA Issued Certificates ==============
cert.sh: Initializing Alice's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/alicedir -f ../tests.pw
cert.sh: #8112: Initializing Alice's Cert DB - PASSED
cert.sh: Loading root cert module to Alice's Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/alicedir

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #8113: Loading root cert module to Alice's Cert DB - PASSED
cert.sh: Import Root CA for Alice --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/alicedir -i ../CA/TestCA.ca.cert
cert.sh: #8114: Import Root CA for Alice - PASSED
cert.sh: Import EC Root CA for Alice --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/alicedir -i ../CA/TestCA-ec.ca.cert
cert.sh: #8115: Import EC Root CA for Alice - PASSED
cert.sh: Generate Cert Request for Alice --------------------------
certutil -s "CN=Alice, E=Alice@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/alicedir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8116: Generate Cert Request for Alice - PASSED
cert.sh: Sign Alice's Request --------------------------
certutil -C -c TestCA -m 30 -v 60 -d ../CA -i req -o Alice.cert -f ../tests.pw 
cert.sh: #8117: Sign Alice's Request - PASSED
cert.sh: Import Alice's Cert --------------------------
certutil -A -n Alice -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/alicedir -f ../tests.pw -i Alice.cert
cert.sh: #8118: Import Alice's Cert - PASSED
cert.sh SUCCESS: Alice's Cert Created
cert.sh: Generate EC Cert Request for Alice --------------------------
certutil -s "CN=Alice, E=Alice-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/alicedir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8119: Generate EC Cert Request for Alice - PASSED
cert.sh: Sign Alice's EC Request --------------------------
certutil -C -c TestCA-ec -m 30 -v 60 -d ../CA -i req -o Alice-ec.cert -f ../tests.pw 
cert.sh: #8120: Sign Alice's EC Request - PASSED
cert.sh: Import Alice's EC Cert --------------------------
certutil -A -n Alice-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/alicedir -f ../tests.pw -i Alice-ec.cert
cert.sh: #8121: Import Alice's EC Cert - PASSED
cert.sh SUCCESS: Alice's EC Cert Created
cert.sh: Generate mixed EC Cert Request for Alice --------------------------
certutil -s "CN=Alice, E=Alice-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/alicedir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8122: Generate mixed EC Cert Request for Alice - PASSED
cert.sh: Sign Alice's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10030 -v 60 -d ../CA -i req -o Alice-ecmixed.cert -f ../tests.pw 
cert.sh: #8123: Sign Alice's EC Request with RSA - PASSED
cert.sh: Import Alice's mixed EC Cert --------------------------
certutil -A -n Alice-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/alicedir -f ../tests.pw -i Alice-ecmixed.cert
cert.sh: #8124: Import Alice's mixed EC Cert - PASSED
cert.sh SUCCESS: Alice's mixed EC Cert Created
cert.sh: Initializing Bob's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/bobdir -f ../tests.pw
cert.sh: #8125: Initializing Bob's Cert DB - PASSED
cert.sh: Loading root cert module to Bob's Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/bobdir

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #8126: Loading root cert module to Bob's Cert DB - PASSED
cert.sh: Import Root CA for Bob --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/bobdir -i ../CA/TestCA.ca.cert
cert.sh: #8127: Import Root CA for Bob - PASSED
cert.sh: Import EC Root CA for Bob --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/bobdir -i ../CA/TestCA-ec.ca.cert
cert.sh: #8128: Import EC Root CA for Bob - PASSED
cert.sh: Generate Cert Request for Bob --------------------------
certutil -s "CN=Bob, E=Bob@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/bobdir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8129: Generate Cert Request for Bob - PASSED
cert.sh: Sign Bob's Request --------------------------
certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o Bob.cert -f ../tests.pw 
cert.sh: #8130: Sign Bob's Request - PASSED
cert.sh: Import Bob's Cert --------------------------
certutil -A -n Bob -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/bobdir -f ../tests.pw -i Bob.cert
cert.sh: #8131: Import Bob's Cert - PASSED
cert.sh SUCCESS: Bob's Cert Created
cert.sh: Generate EC Cert Request for Bob --------------------------
certutil -s "CN=Bob, E=Bob-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/bobdir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8132: Generate EC Cert Request for Bob - PASSED
cert.sh: Sign Bob's EC Request --------------------------
certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o Bob-ec.cert -f ../tests.pw 
cert.sh: #8133: Sign Bob's EC Request - PASSED
cert.sh: Import Bob's EC Cert --------------------------
certutil -A -n Bob-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/bobdir -f ../tests.pw -i Bob-ec.cert
cert.sh: #8134: Import Bob's EC Cert - PASSED
cert.sh SUCCESS: Bob's EC Cert Created
cert.sh: Generate mixed EC Cert Request for Bob --------------------------
certutil -s "CN=Bob, E=Bob-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/bobdir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8135: Generate mixed EC Cert Request for Bob - PASSED
cert.sh: Sign Bob's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o Bob-ecmixed.cert -f ../tests.pw 
cert.sh: #8136: Sign Bob's EC Request with RSA - PASSED
cert.sh: Import Bob's mixed EC Cert --------------------------
certutil -A -n Bob-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/bobdir -f ../tests.pw -i Bob-ecmixed.cert
cert.sh: #8137: Import Bob's mixed EC Cert - PASSED
cert.sh SUCCESS: Bob's mixed EC Cert Created
cert.sh: Creating Dave's Certificate -------------------------
cert.sh: Initializing Dave's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/dave -f ../tests.pw
cert.sh: #8138: Initializing Dave's Cert DB - PASSED
cert.sh: Loading root cert module to Dave's Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/dave

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #8139: Loading root cert module to Dave's Cert DB - PASSED
cert.sh: Import Root CA for Dave --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/dave -i ../CA/TestCA.ca.cert
cert.sh: #8140: Import Root CA for Dave - PASSED
cert.sh: Import EC Root CA for Dave --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/dave -i ../CA/TestCA-ec.ca.cert
cert.sh: #8141: Import EC Root CA for Dave - PASSED
cert.sh: Generate Cert Request for Dave --------------------------
certutil -s "CN=Dave, E=Dave@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/dave -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8142: Generate Cert Request for Dave - PASSED
cert.sh: Sign Dave's Request --------------------------
certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o Dave.cert -f ../tests.pw 
cert.sh: #8143: Sign Dave's Request - PASSED
cert.sh: Import Dave's Cert --------------------------
certutil -A -n Dave -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/dave -f ../tests.pw -i Dave.cert
cert.sh: #8144: Import Dave's Cert - PASSED
cert.sh SUCCESS: Dave's Cert Created
cert.sh: Generate EC Cert Request for Dave --------------------------
certutil -s "CN=Dave, E=Dave-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/dave -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8145: Generate EC Cert Request for Dave - PASSED
cert.sh: Sign Dave's EC Request --------------------------
certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o Dave-ec.cert -f ../tests.pw 
cert.sh: #8146: Sign Dave's EC Request - PASSED
cert.sh: Import Dave's EC Cert --------------------------
certutil -A -n Dave-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/dave -f ../tests.pw -i Dave-ec.cert
cert.sh: #8147: Import Dave's EC Cert - PASSED
cert.sh SUCCESS: Dave's EC Cert Created
cert.sh: Generate mixed EC Cert Request for Dave --------------------------
certutil -s "CN=Dave, E=Dave-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/dave -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8148: Generate mixed EC Cert Request for Dave - PASSED
cert.sh: Sign Dave's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o Dave-ecmixed.cert -f ../tests.pw 
cert.sh: #8149: Sign Dave's EC Request with RSA - PASSED
cert.sh: Import Dave's mixed EC Cert --------------------------
certutil -A -n Dave-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/dave -f ../tests.pw -i Dave-ecmixed.cert
cert.sh: #8150: Import Dave's mixed EC Cert - PASSED
cert.sh SUCCESS: Dave's mixed EC Cert Created
cert.sh: Creating multiEmail's Certificate --------------------
cert.sh: Initializing Eve's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eve -f ../tests.pw
cert.sh: #8151: Initializing Eve's Cert DB - PASSED
cert.sh: Loading root cert module to Eve's Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eve

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #8152: Loading root cert module to Eve's Cert DB - PASSED
cert.sh: Import Root CA for Eve --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eve -i ../CA/TestCA.ca.cert
cert.sh: #8153: Import Root CA for Eve - PASSED
cert.sh: Import EC Root CA for Eve --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eve -i ../CA/TestCA-ec.ca.cert
cert.sh: #8154: Import EC Root CA for Eve - PASSED
cert.sh: Generate Cert Request for Eve --------------------------
certutil -s "CN=Eve, E=Eve@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eve -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8155: Generate Cert Request for Eve - PASSED
cert.sh: Sign Eve's Request --------------------------
certutil -C -c TestCA -m 60 -v 60 -d ../CA -i req -o Eve.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com
cert.sh: #8156: Sign Eve's Request - PASSED
cert.sh: Import Eve's Cert --------------------------
certutil -A -n Eve -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eve -f ../tests.pw -i Eve.cert
cert.sh: #8157: Import Eve's Cert - PASSED
cert.sh SUCCESS: Eve's Cert Created
cert.sh: Generate EC Cert Request for Eve --------------------------
certutil -s "CN=Eve, E=Eve-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eve -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8158: Generate EC Cert Request for Eve - PASSED
cert.sh: Sign Eve's EC Request --------------------------
certutil -C -c TestCA-ec -m 60 -v 60 -d ../CA -i req -o Eve-ec.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com
cert.sh: #8159: Sign Eve's EC Request - PASSED
cert.sh: Import Eve's EC Cert --------------------------
certutil -A -n Eve-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eve -f ../tests.pw -i Eve-ec.cert
cert.sh: #8160: Import Eve's EC Cert - PASSED
cert.sh SUCCESS: Eve's EC Cert Created
cert.sh: Generate mixed EC Cert Request for Eve --------------------------
certutil -s "CN=Eve, E=Eve-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eve -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8161: Generate mixed EC Cert Request for Eve - PASSED
cert.sh: Sign Eve's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10060 -v 60 -d ../CA -i req -o Eve-ecmixed.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com
cert.sh: #8162: Sign Eve's EC Request with RSA - PASSED
cert.sh: Import Eve's mixed EC Cert --------------------------
certutil -A -n Eve-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eve -f ../tests.pw -i Eve-ecmixed.cert
cert.sh: #8163: Import Eve's mixed EC Cert - PASSED
cert.sh SUCCESS: Eve's mixed EC Cert Created
cert.sh: Importing Certificates ==============================
cert.sh: Import Bob's cert into Alice's db --------------------------
certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob.cert
cert.sh: #8164: Import Bob's cert into Alice's db - PASSED
cert.sh: Import Dave's cert into Alice's DB --------------------------
certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave.cert
cert.sh: #8165: Import Dave's cert into Alice's DB - PASSED
cert.sh: Import Dave's cert into Bob's DB --------------------------
certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave.cert
cert.sh: #8166: Import Dave's cert into Bob's DB - PASSED
cert.sh: Import Eve's cert into Alice's DB --------------------------
certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../eve/Eve.cert
cert.sh: #8167: Import Eve's cert into Alice's DB - PASSED
cert.sh: Import Eve's cert into Bob's DB --------------------------
certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../eve/Eve.cert
cert.sh: #8168: Import Eve's cert into Bob's DB - PASSED
cert.sh: Importing EC Certificates ==============================
cert.sh: Import Bob's EC cert into Alice's db --------------------------
certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob-ec.cert
cert.sh: #8169: Import Bob's EC cert into Alice's db - PASSED
cert.sh: Import Dave's EC cert into Alice's DB --------------------------
certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave-ec.cert
cert.sh: #8170: Import Dave's EC cert into Alice's DB - PASSED
cert.sh: Import Dave's EC cert into Bob's DB --------------------------
certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave-ec.cert
cert.sh: #8171: Import Dave's EC cert into Bob's DB - PASSED
cert.sh SUCCESS: SMIME passed
cert.sh: Creating FIPS 140 DSA Certificates ==============
cert.sh: Initializing FIPS PUB 140 Test Certificate's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/fips -f ../tests.fipspw
cert.sh: #8172: Initializing FIPS PUB 140 Test Certificate's Cert DB - PASSED
cert.sh: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/fips

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #8173: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) - PASSED
cert.sh: Enable FIPS mode on database -----------------------
modutil -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/fips -fips true 

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
FIPS mode enabled.
cert.sh: #8174: Enable FIPS mode on database for FIPS PUB 140 Test Certificate - PASSED
cert.sh: Generate Certificate for FIPS PUB 140 Test Certificate --------------------------
certutil -s "CN=FIPS PUB 140 Test Certificate, E=fips@bogus.com, O=BOGUS NSS, OU=FIPS PUB 140, L=Mountain View, ST=California, C=US" -S -n FIPS_PUB_140_Test_Certificate -x -t Cu,Cu,Cu -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/fips -f ../tests.fipspw -k dsa -v 600 -m 500 -z ../tests_noise


Generating key.  This may take a few moments...

cert.sh: #8175: Generate Certificate for FIPS PUB 140 Test Certificate - PASSED
cert.sh SUCCESS: FIPS passed
cert.sh: Creating Server CA Issued Certificate for 
             EC Curves Test Certificates ------------------------------------
cert.sh: Initializing EC Curve's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw
cert.sh: #8176: Initializing EC Curve's Cert DB - PASSED
cert.sh: Loading root cert module to EC Curve's Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #8177: Loading root cert module to EC Curve's Cert DB - PASSED
cert.sh: Import EC Root CA for EC Curves Test Certificates --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -i ../CA/TestCA-ec.ca.cert
cert.sh: #8178: Import EC Root CA for EC Curves Test Certificates - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb163v1 --------------------------
certutil -s "CN=Curve-c2pnb163v1, E=Curve-c2pnb163v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb163v1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8179: Generate EC Cert Request for Curve-c2pnb163v1 - PASSED
cert.sh: Sign Curve-c2pnb163v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2001 -v 60 -d ../CA -i req -o Curve-c2pnb163v1-ec.cert -f ../tests.pw 
cert.sh: #8180: Sign Curve-c2pnb163v1's EC Request - PASSED
cert.sh: Import Curve-c2pnb163v1's EC Cert --------------------------
certutil -A -n Curve-c2pnb163v1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-c2pnb163v1-ec.cert
cert.sh: #8181: Import Curve-c2pnb163v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb163v2 --------------------------
certutil -s "CN=Curve-c2pnb163v2, E=Curve-c2pnb163v2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb163v2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8182: Generate EC Cert Request for Curve-c2pnb163v2 - PASSED
cert.sh: Sign Curve-c2pnb163v2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2002 -v 60 -d ../CA -i req -o Curve-c2pnb163v2-ec.cert -f ../tests.pw 
cert.sh: #8183: Sign Curve-c2pnb163v2's EC Request - PASSED
cert.sh: Import Curve-c2pnb163v2's EC Cert --------------------------
certutil -A -n Curve-c2pnb163v2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-c2pnb163v2-ec.cert
cert.sh: #8184: Import Curve-c2pnb163v2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb163v3 --------------------------
certutil -s "CN=Curve-c2pnb163v3, E=Curve-c2pnb163v3-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb163v3 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8185: Generate EC Cert Request for Curve-c2pnb163v3 - PASSED
cert.sh: Sign Curve-c2pnb163v3's EC Request --------------------------
certutil -C -c TestCA-ec -m 2003 -v 60 -d ../CA -i req -o Curve-c2pnb163v3-ec.cert -f ../tests.pw 
cert.sh: #8186: Sign Curve-c2pnb163v3's EC Request - PASSED
cert.sh: Import Curve-c2pnb163v3's EC Cert --------------------------
certutil -A -n Curve-c2pnb163v3-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-c2pnb163v3-ec.cert
cert.sh: #8187: Import Curve-c2pnb163v3's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb176v1 --------------------------
certutil -s "CN=Curve-c2pnb176v1, E=Curve-c2pnb176v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb176v1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8188: Generate EC Cert Request for Curve-c2pnb176v1 - PASSED
cert.sh: Sign Curve-c2pnb176v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2004 -v 60 -d ../CA -i req -o Curve-c2pnb176v1-ec.cert -f ../tests.pw 
cert.sh: #8189: Sign Curve-c2pnb176v1's EC Request - PASSED
cert.sh: Import Curve-c2pnb176v1's EC Cert --------------------------
certutil -A -n Curve-c2pnb176v1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-c2pnb176v1-ec.cert
cert.sh: #8190: Import Curve-c2pnb176v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb208w1 --------------------------
certutil -s "CN=Curve-c2pnb208w1, E=Curve-c2pnb208w1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb208w1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8191: Generate EC Cert Request for Curve-c2pnb208w1 - PASSED
cert.sh: Sign Curve-c2pnb208w1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2005 -v 60 -d ../CA -i req -o Curve-c2pnb208w1-ec.cert -f ../tests.pw 
cert.sh: #8192: Sign Curve-c2pnb208w1's EC Request - PASSED
cert.sh: Import Curve-c2pnb208w1's EC Cert --------------------------
certutil -A -n Curve-c2pnb208w1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-c2pnb208w1-ec.cert
cert.sh: #8193: Import Curve-c2pnb208w1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb272w1 --------------------------
certutil -s "CN=Curve-c2pnb272w1, E=Curve-c2pnb272w1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb272w1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8194: Generate EC Cert Request for Curve-c2pnb272w1 - PASSED
cert.sh: Sign Curve-c2pnb272w1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2006 -v 60 -d ../CA -i req -o Curve-c2pnb272w1-ec.cert -f ../tests.pw 
cert.sh: #8195: Sign Curve-c2pnb272w1's EC Request - PASSED
cert.sh: Import Curve-c2pnb272w1's EC Cert --------------------------
certutil -A -n Curve-c2pnb272w1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-c2pnb272w1-ec.cert
cert.sh: #8196: Import Curve-c2pnb272w1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb304w1 --------------------------
certutil -s "CN=Curve-c2pnb304w1, E=Curve-c2pnb304w1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb304w1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8197: Generate EC Cert Request for Curve-c2pnb304w1 - PASSED
cert.sh: Sign Curve-c2pnb304w1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2007 -v 60 -d ../CA -i req -o Curve-c2pnb304w1-ec.cert -f ../tests.pw 
cert.sh: #8198: Sign Curve-c2pnb304w1's EC Request - PASSED
cert.sh: Import Curve-c2pnb304w1's EC Cert --------------------------
certutil -A -n Curve-c2pnb304w1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-c2pnb304w1-ec.cert
cert.sh: #8199: Import Curve-c2pnb304w1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb368w1 --------------------------
certutil -s "CN=Curve-c2pnb368w1, E=Curve-c2pnb368w1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb368w1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8200: Generate EC Cert Request for Curve-c2pnb368w1 - PASSED
cert.sh: Sign Curve-c2pnb368w1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2008 -v 60 -d ../CA -i req -o Curve-c2pnb368w1-ec.cert -f ../tests.pw 
cert.sh: #8201: Sign Curve-c2pnb368w1's EC Request - PASSED
cert.sh: Import Curve-c2pnb368w1's EC Cert --------------------------
certutil -A -n Curve-c2pnb368w1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-c2pnb368w1-ec.cert
cert.sh: #8202: Import Curve-c2pnb368w1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb191v1 --------------------------
certutil -s "CN=Curve-c2tnb191v1, E=Curve-c2tnb191v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb191v1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8203: Generate EC Cert Request for Curve-c2tnb191v1 - PASSED
cert.sh: Sign Curve-c2tnb191v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2009 -v 60 -d ../CA -i req -o Curve-c2tnb191v1-ec.cert -f ../tests.pw 
cert.sh: #8204: Sign Curve-c2tnb191v1's EC Request - PASSED
cert.sh: Import Curve-c2tnb191v1's EC Cert --------------------------
certutil -A -n Curve-c2tnb191v1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-c2tnb191v1-ec.cert
cert.sh: #8205: Import Curve-c2tnb191v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb191v2 --------------------------
certutil -s "CN=Curve-c2tnb191v2, E=Curve-c2tnb191v2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb191v2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8206: Generate EC Cert Request for Curve-c2tnb191v2 - PASSED
cert.sh: Sign Curve-c2tnb191v2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2010 -v 60 -d ../CA -i req -o Curve-c2tnb191v2-ec.cert -f ../tests.pw 
cert.sh: #8207: Sign Curve-c2tnb191v2's EC Request - PASSED
cert.sh: Import Curve-c2tnb191v2's EC Cert --------------------------
certutil -A -n Curve-c2tnb191v2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-c2tnb191v2-ec.cert
cert.sh: #8208: Import Curve-c2tnb191v2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb191v3 --------------------------
certutil -s "CN=Curve-c2tnb191v3, E=Curve-c2tnb191v3-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb191v3 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8209: Generate EC Cert Request for Curve-c2tnb191v3 - PASSED
cert.sh: Sign Curve-c2tnb191v3's EC Request --------------------------
certutil -C -c TestCA-ec -m 2011 -v 60 -d ../CA -i req -o Curve-c2tnb191v3-ec.cert -f ../tests.pw 
cert.sh: #8210: Sign Curve-c2tnb191v3's EC Request - PASSED
cert.sh: Import Curve-c2tnb191v3's EC Cert --------------------------
certutil -A -n Curve-c2tnb191v3-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-c2tnb191v3-ec.cert
cert.sh: #8211: Import Curve-c2tnb191v3's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb239v1 --------------------------
certutil -s "CN=Curve-c2tnb239v1, E=Curve-c2tnb239v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb239v1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8212: Generate EC Cert Request for Curve-c2tnb239v1 - PASSED
cert.sh: Sign Curve-c2tnb239v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2012 -v 60 -d ../CA -i req -o Curve-c2tnb239v1-ec.cert -f ../tests.pw 
cert.sh: #8213: Sign Curve-c2tnb239v1's EC Request - PASSED
cert.sh: Import Curve-c2tnb239v1's EC Cert --------------------------
certutil -A -n Curve-c2tnb239v1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-c2tnb239v1-ec.cert
cert.sh: #8214: Import Curve-c2tnb239v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb239v2 --------------------------
certutil -s "CN=Curve-c2tnb239v2, E=Curve-c2tnb239v2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb239v2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8215: Generate EC Cert Request for Curve-c2tnb239v2 - PASSED
cert.sh: Sign Curve-c2tnb239v2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2013 -v 60 -d ../CA -i req -o Curve-c2tnb239v2-ec.cert -f ../tests.pw 
cert.sh: #8216: Sign Curve-c2tnb239v2's EC Request - PASSED
cert.sh: Import Curve-c2tnb239v2's EC Cert --------------------------
certutil -A -n Curve-c2tnb239v2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-c2tnb239v2-ec.cert
cert.sh: #8217: Import Curve-c2tnb239v2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb239v3 --------------------------
certutil -s "CN=Curve-c2tnb239v3, E=Curve-c2tnb239v3-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb239v3 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8218: Generate EC Cert Request for Curve-c2tnb239v3 - PASSED
cert.sh: Sign Curve-c2tnb239v3's EC Request --------------------------
certutil -C -c TestCA-ec -m 2014 -v 60 -d ../CA -i req -o Curve-c2tnb239v3-ec.cert -f ../tests.pw 
cert.sh: #8219: Sign Curve-c2tnb239v3's EC Request - PASSED
cert.sh: Import Curve-c2tnb239v3's EC Cert --------------------------
certutil -A -n Curve-c2tnb239v3-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-c2tnb239v3-ec.cert
cert.sh: #8220: Import Curve-c2tnb239v3's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb359v1 --------------------------
certutil -s "CN=Curve-c2tnb359v1, E=Curve-c2tnb359v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb359v1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8221: Generate EC Cert Request for Curve-c2tnb359v1 - PASSED
cert.sh: Sign Curve-c2tnb359v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2015 -v 60 -d ../CA -i req -o Curve-c2tnb359v1-ec.cert -f ../tests.pw 
cert.sh: #8222: Sign Curve-c2tnb359v1's EC Request - PASSED
cert.sh: Import Curve-c2tnb359v1's EC Cert --------------------------
certutil -A -n Curve-c2tnb359v1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-c2tnb359v1-ec.cert
cert.sh: #8223: Import Curve-c2tnb359v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb431r1 --------------------------
certutil -s "CN=Curve-c2tnb431r1, E=Curve-c2tnb431r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb431r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8224: Generate EC Cert Request for Curve-c2tnb431r1 - PASSED
cert.sh: Sign Curve-c2tnb431r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2016 -v 60 -d ../CA -i req -o Curve-c2tnb431r1-ec.cert -f ../tests.pw 
cert.sh: #8225: Sign Curve-c2tnb431r1's EC Request - PASSED
cert.sh: Import Curve-c2tnb431r1's EC Cert --------------------------
certutil -A -n Curve-c2tnb431r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-c2tnb431r1-ec.cert
cert.sh: #8226: Import Curve-c2tnb431r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistb163 --------------------------
certutil -s "CN=Curve-nistb163, E=Curve-nistb163-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistb163 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8227: Generate EC Cert Request for Curve-nistb163 - PASSED
cert.sh: Sign Curve-nistb163's EC Request --------------------------
certutil -C -c TestCA-ec -m 2017 -v 60 -d ../CA -i req -o Curve-nistb163-ec.cert -f ../tests.pw 
cert.sh: #8228: Sign Curve-nistb163's EC Request - PASSED
cert.sh: Import Curve-nistb163's EC Cert --------------------------
certutil -A -n Curve-nistb163-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-nistb163-ec.cert
cert.sh: #8229: Import Curve-nistb163's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistb233 --------------------------
certutil -s "CN=Curve-nistb233, E=Curve-nistb233-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistb233 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8230: Generate EC Cert Request for Curve-nistb233 - PASSED
cert.sh: Sign Curve-nistb233's EC Request --------------------------
certutil -C -c TestCA-ec -m 2018 -v 60 -d ../CA -i req -o Curve-nistb233-ec.cert -f ../tests.pw 
cert.sh: #8231: Sign Curve-nistb233's EC Request - PASSED
cert.sh: Import Curve-nistb233's EC Cert --------------------------
certutil -A -n Curve-nistb233-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-nistb233-ec.cert
cert.sh: #8232: Import Curve-nistb233's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistb283 --------------------------
certutil -s "CN=Curve-nistb283, E=Curve-nistb283-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistb283 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8233: Generate EC Cert Request for Curve-nistb283 - PASSED
cert.sh: Sign Curve-nistb283's EC Request --------------------------
certutil -C -c TestCA-ec -m 2019 -v 60 -d ../CA -i req -o Curve-nistb283-ec.cert -f ../tests.pw 
cert.sh: #8234: Sign Curve-nistb283's EC Request - PASSED
cert.sh: Import Curve-nistb283's EC Cert --------------------------
certutil -A -n Curve-nistb283-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-nistb283-ec.cert
cert.sh: #8235: Import Curve-nistb283's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistb409 --------------------------
certutil -s "CN=Curve-nistb409, E=Curve-nistb409-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistb409 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8236: Generate EC Cert Request for Curve-nistb409 - PASSED
cert.sh: Sign Curve-nistb409's EC Request --------------------------
certutil -C -c TestCA-ec -m 2020 -v 60 -d ../CA -i req -o Curve-nistb409-ec.cert -f ../tests.pw 
cert.sh: #8237: Sign Curve-nistb409's EC Request - PASSED
cert.sh: Import Curve-nistb409's EC Cert --------------------------
certutil -A -n Curve-nistb409-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-nistb409-ec.cert
cert.sh: #8238: Import Curve-nistb409's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistb571 --------------------------
certutil -s "CN=Curve-nistb571, E=Curve-nistb571-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistb571 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8239: Generate EC Cert Request for Curve-nistb571 - PASSED
cert.sh: Sign Curve-nistb571's EC Request --------------------------
certutil -C -c TestCA-ec -m 2021 -v 60 -d ../CA -i req -o Curve-nistb571-ec.cert -f ../tests.pw 
cert.sh: #8240: Sign Curve-nistb571's EC Request - PASSED
cert.sh: Import Curve-nistb571's EC Cert --------------------------
certutil -A -n Curve-nistb571-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-nistb571-ec.cert
cert.sh: #8241: Import Curve-nistb571's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistk163 --------------------------
certutil -s "CN=Curve-nistk163, E=Curve-nistk163-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistk163 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8242: Generate EC Cert Request for Curve-nistk163 - PASSED
cert.sh: Sign Curve-nistk163's EC Request --------------------------
certutil -C -c TestCA-ec -m 2022 -v 60 -d ../CA -i req -o Curve-nistk163-ec.cert -f ../tests.pw 
cert.sh: #8243: Sign Curve-nistk163's EC Request - PASSED
cert.sh: Import Curve-nistk163's EC Cert --------------------------
certutil -A -n Curve-nistk163-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-nistk163-ec.cert
cert.sh: #8244: Import Curve-nistk163's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistk233 --------------------------
certutil -s "CN=Curve-nistk233, E=Curve-nistk233-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistk233 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8245: Generate EC Cert Request for Curve-nistk233 - PASSED
cert.sh: Sign Curve-nistk233's EC Request --------------------------
certutil -C -c TestCA-ec -m 2023 -v 60 -d ../CA -i req -o Curve-nistk233-ec.cert -f ../tests.pw 
cert.sh: #8246: Sign Curve-nistk233's EC Request - PASSED
cert.sh: Import Curve-nistk233's EC Cert --------------------------
certutil -A -n Curve-nistk233-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-nistk233-ec.cert
cert.sh: #8247: Import Curve-nistk233's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistk283 --------------------------
certutil -s "CN=Curve-nistk283, E=Curve-nistk283-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistk283 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8248: Generate EC Cert Request for Curve-nistk283 - PASSED
cert.sh: Sign Curve-nistk283's EC Request --------------------------
certutil -C -c TestCA-ec -m 2024 -v 60 -d ../CA -i req -o Curve-nistk283-ec.cert -f ../tests.pw 
cert.sh: #8249: Sign Curve-nistk283's EC Request - PASSED
cert.sh: Import Curve-nistk283's EC Cert --------------------------
certutil -A -n Curve-nistk283-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-nistk283-ec.cert
cert.sh: #8250: Import Curve-nistk283's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistk409 --------------------------
certutil -s "CN=Curve-nistk409, E=Curve-nistk409-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistk409 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8251: Generate EC Cert Request for Curve-nistk409 - PASSED
cert.sh: Sign Curve-nistk409's EC Request --------------------------
certutil -C -c TestCA-ec -m 2025 -v 60 -d ../CA -i req -o Curve-nistk409-ec.cert -f ../tests.pw 
cert.sh: #8252: Sign Curve-nistk409's EC Request - PASSED
cert.sh: Import Curve-nistk409's EC Cert --------------------------
certutil -A -n Curve-nistk409-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-nistk409-ec.cert
cert.sh: #8253: Import Curve-nistk409's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistk571 --------------------------
certutil -s "CN=Curve-nistk571, E=Curve-nistk571-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistk571 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8254: Generate EC Cert Request for Curve-nistk571 - PASSED
cert.sh: Sign Curve-nistk571's EC Request --------------------------
certutil -C -c TestCA-ec -m 2026 -v 60 -d ../CA -i req -o Curve-nistk571-ec.cert -f ../tests.pw 
cert.sh: #8255: Sign Curve-nistk571's EC Request - PASSED
cert.sh: Import Curve-nistk571's EC Cert --------------------------
certutil -A -n Curve-nistk571-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-nistk571-ec.cert
cert.sh: #8256: Import Curve-nistk571's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistp192 --------------------------
certutil -s "CN=Curve-nistp192, E=Curve-nistp192-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp192 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8257: Generate EC Cert Request for Curve-nistp192 - PASSED
cert.sh: Sign Curve-nistp192's EC Request --------------------------
certutil -C -c TestCA-ec -m 2027 -v 60 -d ../CA -i req -o Curve-nistp192-ec.cert -f ../tests.pw 
cert.sh: #8258: Sign Curve-nistp192's EC Request - PASSED
cert.sh: Import Curve-nistp192's EC Cert --------------------------
certutil -A -n Curve-nistp192-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-nistp192-ec.cert
cert.sh: #8259: Import Curve-nistp192's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistp224 --------------------------
certutil -s "CN=Curve-nistp224, E=Curve-nistp224-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp224 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8260: Generate EC Cert Request for Curve-nistp224 - PASSED
cert.sh: Sign Curve-nistp224's EC Request --------------------------
certutil -C -c TestCA-ec -m 2028 -v 60 -d ../CA -i req -o Curve-nistp224-ec.cert -f ../tests.pw 
cert.sh: #8261: Sign Curve-nistp224's EC Request - PASSED
cert.sh: Import Curve-nistp224's EC Cert --------------------------
certutil -A -n Curve-nistp224-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-nistp224-ec.cert
cert.sh: #8262: Import Curve-nistp224's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistp256 --------------------------
certutil -s "CN=Curve-nistp256, E=Curve-nistp256-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp256 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8263: Generate EC Cert Request for Curve-nistp256 - PASSED
cert.sh: Sign Curve-nistp256's EC Request --------------------------
certutil -C -c TestCA-ec -m 2029 -v 60 -d ../CA -i req -o Curve-nistp256-ec.cert -f ../tests.pw 
cert.sh: #8264: Sign Curve-nistp256's EC Request - PASSED
cert.sh: Import Curve-nistp256's EC Cert --------------------------
certutil -A -n Curve-nistp256-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-nistp256-ec.cert
cert.sh: #8265: Import Curve-nistp256's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistp384 --------------------------
certutil -s "CN=Curve-nistp384, E=Curve-nistp384-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp384 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8266: Generate EC Cert Request for Curve-nistp384 - PASSED
cert.sh: Sign Curve-nistp384's EC Request --------------------------
certutil -C -c TestCA-ec -m 2030 -v 60 -d ../CA -i req -o Curve-nistp384-ec.cert -f ../tests.pw 
cert.sh: #8267: Sign Curve-nistp384's EC Request - PASSED
cert.sh: Import Curve-nistp384's EC Cert --------------------------
certutil -A -n Curve-nistp384-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-nistp384-ec.cert
cert.sh: #8268: Import Curve-nistp384's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistp521 --------------------------
certutil -s "CN=Curve-nistp521, E=Curve-nistp521-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp521 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8269: Generate EC Cert Request for Curve-nistp521 - PASSED
cert.sh: Sign Curve-nistp521's EC Request --------------------------
certutil -C -c TestCA-ec -m 2031 -v 60 -d ../CA -i req -o Curve-nistp521-ec.cert -f ../tests.pw 
cert.sh: #8270: Sign Curve-nistp521's EC Request - PASSED
cert.sh: Import Curve-nistp521's EC Cert --------------------------
certutil -A -n Curve-nistp521-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-nistp521-ec.cert
cert.sh: #8271: Import Curve-nistp521's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-prime192v1 --------------------------
certutil -s "CN=Curve-prime192v1, E=Curve-prime192v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime192v1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8272: Generate EC Cert Request for Curve-prime192v1 - PASSED
cert.sh: Sign Curve-prime192v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2032 -v 60 -d ../CA -i req -o Curve-prime192v1-ec.cert -f ../tests.pw 
cert.sh: #8273: Sign Curve-prime192v1's EC Request - PASSED
cert.sh: Import Curve-prime192v1's EC Cert --------------------------
certutil -A -n Curve-prime192v1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-prime192v1-ec.cert
cert.sh: #8274: Import Curve-prime192v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-prime192v2 --------------------------
certutil -s "CN=Curve-prime192v2, E=Curve-prime192v2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime192v2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8275: Generate EC Cert Request for Curve-prime192v2 - PASSED
cert.sh: Sign Curve-prime192v2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2033 -v 60 -d ../CA -i req -o Curve-prime192v2-ec.cert -f ../tests.pw 
cert.sh: #8276: Sign Curve-prime192v2's EC Request - PASSED
cert.sh: Import Curve-prime192v2's EC Cert --------------------------
certutil -A -n Curve-prime192v2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-prime192v2-ec.cert
cert.sh: #8277: Import Curve-prime192v2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-prime192v3 --------------------------
certutil -s "CN=Curve-prime192v3, E=Curve-prime192v3-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime192v3 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8278: Generate EC Cert Request for Curve-prime192v3 - PASSED
cert.sh: Sign Curve-prime192v3's EC Request --------------------------
certutil -C -c TestCA-ec -m 2034 -v 60 -d ../CA -i req -o Curve-prime192v3-ec.cert -f ../tests.pw 
cert.sh: #8279: Sign Curve-prime192v3's EC Request - PASSED
cert.sh: Import Curve-prime192v3's EC Cert --------------------------
certutil -A -n Curve-prime192v3-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-prime192v3-ec.cert
cert.sh: #8280: Import Curve-prime192v3's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-prime239v1 --------------------------
certutil -s "CN=Curve-prime239v1, E=Curve-prime239v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime239v1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8281: Generate EC Cert Request for Curve-prime239v1 - PASSED
cert.sh: Sign Curve-prime239v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2035 -v 60 -d ../CA -i req -o Curve-prime239v1-ec.cert -f ../tests.pw 
cert.sh: #8282: Sign Curve-prime239v1's EC Request - PASSED
cert.sh: Import Curve-prime239v1's EC Cert --------------------------
certutil -A -n Curve-prime239v1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-prime239v1-ec.cert
cert.sh: #8283: Import Curve-prime239v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-prime239v2 --------------------------
certutil -s "CN=Curve-prime239v2, E=Curve-prime239v2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime239v2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8284: Generate EC Cert Request for Curve-prime239v2 - PASSED
cert.sh: Sign Curve-prime239v2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2036 -v 60 -d ../CA -i req -o Curve-prime239v2-ec.cert -f ../tests.pw 
cert.sh: #8285: Sign Curve-prime239v2's EC Request - PASSED
cert.sh: Import Curve-prime239v2's EC Cert --------------------------
certutil -A -n Curve-prime239v2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-prime239v2-ec.cert
cert.sh: #8286: Import Curve-prime239v2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-prime239v3 --------------------------
certutil -s "CN=Curve-prime239v3, E=Curve-prime239v3-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime239v3 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8287: Generate EC Cert Request for Curve-prime239v3 - PASSED
cert.sh: Sign Curve-prime239v3's EC Request --------------------------
certutil -C -c TestCA-ec -m 2037 -v 60 -d ../CA -i req -o Curve-prime239v3-ec.cert -f ../tests.pw 
cert.sh: #8288: Sign Curve-prime239v3's EC Request - PASSED
cert.sh: Import Curve-prime239v3's EC Cert --------------------------
certutil -A -n Curve-prime239v3-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-prime239v3-ec.cert
cert.sh: #8289: Import Curve-prime239v3's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp112r1 --------------------------
certutil -s "CN=Curve-secp112r1, E=Curve-secp112r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp112r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8290: Generate EC Cert Request for Curve-secp112r1 - PASSED
cert.sh: Sign Curve-secp112r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2038 -v 60 -d ../CA -i req -o Curve-secp112r1-ec.cert -f ../tests.pw 
cert.sh: #8291: Sign Curve-secp112r1's EC Request - PASSED
cert.sh: Import Curve-secp112r1's EC Cert --------------------------
certutil -A -n Curve-secp112r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-secp112r1-ec.cert
cert.sh: #8292: Import Curve-secp112r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp112r2 --------------------------
certutil -s "CN=Curve-secp112r2, E=Curve-secp112r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp112r2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8293: Generate EC Cert Request for Curve-secp112r2 - PASSED
cert.sh: Sign Curve-secp112r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2039 -v 60 -d ../CA -i req -o Curve-secp112r2-ec.cert -f ../tests.pw 
cert.sh: #8294: Sign Curve-secp112r2's EC Request - PASSED
cert.sh: Import Curve-secp112r2's EC Cert --------------------------
certutil -A -n Curve-secp112r2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-secp112r2-ec.cert
cert.sh: #8295: Import Curve-secp112r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp128r1 --------------------------
certutil -s "CN=Curve-secp128r1, E=Curve-secp128r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp128r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8296: Generate EC Cert Request for Curve-secp128r1 - PASSED
cert.sh: Sign Curve-secp128r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2040 -v 60 -d ../CA -i req -o Curve-secp128r1-ec.cert -f ../tests.pw 
cert.sh: #8297: Sign Curve-secp128r1's EC Request - PASSED
cert.sh: Import Curve-secp128r1's EC Cert --------------------------
certutil -A -n Curve-secp128r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-secp128r1-ec.cert
cert.sh: #8298: Import Curve-secp128r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp128r2 --------------------------
certutil -s "CN=Curve-secp128r2, E=Curve-secp128r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp128r2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8299: Generate EC Cert Request for Curve-secp128r2 - PASSED
cert.sh: Sign Curve-secp128r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2041 -v 60 -d ../CA -i req -o Curve-secp128r2-ec.cert -f ../tests.pw 
cert.sh: #8300: Sign Curve-secp128r2's EC Request - PASSED
cert.sh: Import Curve-secp128r2's EC Cert --------------------------
certutil -A -n Curve-secp128r2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-secp128r2-ec.cert
cert.sh: #8301: Import Curve-secp128r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp160k1 --------------------------
certutil -s "CN=Curve-secp160k1, E=Curve-secp160k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp160k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8302: Generate EC Cert Request for Curve-secp160k1 - PASSED
cert.sh: Sign Curve-secp160k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2042 -v 60 -d ../CA -i req -o Curve-secp160k1-ec.cert -f ../tests.pw 
cert.sh: #8303: Sign Curve-secp160k1's EC Request - PASSED
cert.sh: Import Curve-secp160k1's EC Cert --------------------------
certutil -A -n Curve-secp160k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-secp160k1-ec.cert
cert.sh: #8304: Import Curve-secp160k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp160r1 --------------------------
certutil -s "CN=Curve-secp160r1, E=Curve-secp160r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp160r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8305: Generate EC Cert Request for Curve-secp160r1 - PASSED
cert.sh: Sign Curve-secp160r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2043 -v 60 -d ../CA -i req -o Curve-secp160r1-ec.cert -f ../tests.pw 
cert.sh: #8306: Sign Curve-secp160r1's EC Request - PASSED
cert.sh: Import Curve-secp160r1's EC Cert --------------------------
certutil -A -n Curve-secp160r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-secp160r1-ec.cert
cert.sh: #8307: Import Curve-secp160r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp160r2 --------------------------
certutil -s "CN=Curve-secp160r2, E=Curve-secp160r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp160r2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8308: Generate EC Cert Request for Curve-secp160r2 - PASSED
cert.sh: Sign Curve-secp160r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2044 -v 60 -d ../CA -i req -o Curve-secp160r2-ec.cert -f ../tests.pw 
cert.sh: #8309: Sign Curve-secp160r2's EC Request - PASSED
cert.sh: Import Curve-secp160r2's EC Cert --------------------------
certutil -A -n Curve-secp160r2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-secp160r2-ec.cert
cert.sh: #8310: Import Curve-secp160r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp192k1 --------------------------
certutil -s "CN=Curve-secp192k1, E=Curve-secp192k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp192k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8311: Generate EC Cert Request for Curve-secp192k1 - PASSED
cert.sh: Sign Curve-secp192k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2045 -v 60 -d ../CA -i req -o Curve-secp192k1-ec.cert -f ../tests.pw 
cert.sh: #8312: Sign Curve-secp192k1's EC Request - PASSED
cert.sh: Import Curve-secp192k1's EC Cert --------------------------
certutil -A -n Curve-secp192k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-secp192k1-ec.cert
cert.sh: #8313: Import Curve-secp192k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp192r1 --------------------------
certutil -s "CN=Curve-secp192r1, E=Curve-secp192r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp192r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8314: Generate EC Cert Request for Curve-secp192r1 - PASSED
cert.sh: Sign Curve-secp192r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2046 -v 60 -d ../CA -i req -o Curve-secp192r1-ec.cert -f ../tests.pw 
cert.sh: #8315: Sign Curve-secp192r1's EC Request - PASSED
cert.sh: Import Curve-secp192r1's EC Cert --------------------------
certutil -A -n Curve-secp192r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-secp192r1-ec.cert
cert.sh: #8316: Import Curve-secp192r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp224k1 --------------------------
certutil -s "CN=Curve-secp224k1, E=Curve-secp224k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp224k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8317: Generate EC Cert Request for Curve-secp224k1 - PASSED
cert.sh: Sign Curve-secp224k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2047 -v 60 -d ../CA -i req -o Curve-secp224k1-ec.cert -f ../tests.pw 
cert.sh: #8318: Sign Curve-secp224k1's EC Request - PASSED
cert.sh: Import Curve-secp224k1's EC Cert --------------------------
certutil -A -n Curve-secp224k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-secp224k1-ec.cert
cert.sh: #8319: Import Curve-secp224k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp224r1 --------------------------
certutil -s "CN=Curve-secp224r1, E=Curve-secp224r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp224r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8320: Generate EC Cert Request for Curve-secp224r1 - PASSED
cert.sh: Sign Curve-secp224r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2048 -v 60 -d ../CA -i req -o Curve-secp224r1-ec.cert -f ../tests.pw 
cert.sh: #8321: Sign Curve-secp224r1's EC Request - PASSED
cert.sh: Import Curve-secp224r1's EC Cert --------------------------
certutil -A -n Curve-secp224r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-secp224r1-ec.cert
cert.sh: #8322: Import Curve-secp224r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp256k1 --------------------------
certutil -s "CN=Curve-secp256k1, E=Curve-secp256k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp256k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8323: Generate EC Cert Request for Curve-secp256k1 - PASSED
cert.sh: Sign Curve-secp256k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2049 -v 60 -d ../CA -i req -o Curve-secp256k1-ec.cert -f ../tests.pw 
cert.sh: #8324: Sign Curve-secp256k1's EC Request - PASSED
cert.sh: Import Curve-secp256k1's EC Cert --------------------------
certutil -A -n Curve-secp256k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-secp256k1-ec.cert
cert.sh: #8325: Import Curve-secp256k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp256r1 --------------------------
certutil -s "CN=Curve-secp256r1, E=Curve-secp256r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp256r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8326: Generate EC Cert Request for Curve-secp256r1 - PASSED
cert.sh: Sign Curve-secp256r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2050 -v 60 -d ../CA -i req -o Curve-secp256r1-ec.cert -f ../tests.pw 
cert.sh: #8327: Sign Curve-secp256r1's EC Request - PASSED
cert.sh: Import Curve-secp256r1's EC Cert --------------------------
certutil -A -n Curve-secp256r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-secp256r1-ec.cert
cert.sh: #8328: Import Curve-secp256r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp384r1 --------------------------
certutil -s "CN=Curve-secp384r1, E=Curve-secp384r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8329: Generate EC Cert Request for Curve-secp384r1 - PASSED
cert.sh: Sign Curve-secp384r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2051 -v 60 -d ../CA -i req -o Curve-secp384r1-ec.cert -f ../tests.pw 
cert.sh: #8330: Sign Curve-secp384r1's EC Request - PASSED
cert.sh: Import Curve-secp384r1's EC Cert --------------------------
certutil -A -n Curve-secp384r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-secp384r1-ec.cert
cert.sh: #8331: Import Curve-secp384r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp521r1 --------------------------
certutil -s "CN=Curve-secp521r1, E=Curve-secp521r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp521r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8332: Generate EC Cert Request for Curve-secp521r1 - PASSED
cert.sh: Sign Curve-secp521r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2052 -v 60 -d ../CA -i req -o Curve-secp521r1-ec.cert -f ../tests.pw 
cert.sh: #8333: Sign Curve-secp521r1's EC Request - PASSED
cert.sh: Import Curve-secp521r1's EC Cert --------------------------
certutil -A -n Curve-secp521r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-secp521r1-ec.cert
cert.sh: #8334: Import Curve-secp521r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect113r1 --------------------------
certutil -s "CN=Curve-sect113r1, E=Curve-sect113r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect113r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8335: Generate EC Cert Request for Curve-sect113r1 - PASSED
cert.sh: Sign Curve-sect113r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2053 -v 60 -d ../CA -i req -o Curve-sect113r1-ec.cert -f ../tests.pw 
cert.sh: #8336: Sign Curve-sect113r1's EC Request - PASSED
cert.sh: Import Curve-sect113r1's EC Cert --------------------------
certutil -A -n Curve-sect113r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-sect113r1-ec.cert
cert.sh: #8337: Import Curve-sect113r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect113r2 --------------------------
certutil -s "CN=Curve-sect113r2, E=Curve-sect113r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect113r2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8338: Generate EC Cert Request for Curve-sect113r2 - PASSED
cert.sh: Sign Curve-sect113r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2054 -v 60 -d ../CA -i req -o Curve-sect113r2-ec.cert -f ../tests.pw 
cert.sh: #8339: Sign Curve-sect113r2's EC Request - PASSED
cert.sh: Import Curve-sect113r2's EC Cert --------------------------
certutil -A -n Curve-sect113r2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-sect113r2-ec.cert
cert.sh: #8340: Import Curve-sect113r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect131r1 --------------------------
certutil -s "CN=Curve-sect131r1, E=Curve-sect131r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect131r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8341: Generate EC Cert Request for Curve-sect131r1 - PASSED
cert.sh: Sign Curve-sect131r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2055 -v 60 -d ../CA -i req -o Curve-sect131r1-ec.cert -f ../tests.pw 
cert.sh: #8342: Sign Curve-sect131r1's EC Request - PASSED
cert.sh: Import Curve-sect131r1's EC Cert --------------------------
certutil -A -n Curve-sect131r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-sect131r1-ec.cert
cert.sh: #8343: Import Curve-sect131r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect131r2 --------------------------
certutil -s "CN=Curve-sect131r2, E=Curve-sect131r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect131r2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8344: Generate EC Cert Request for Curve-sect131r2 - PASSED
cert.sh: Sign Curve-sect131r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2056 -v 60 -d ../CA -i req -o Curve-sect131r2-ec.cert -f ../tests.pw 
cert.sh: #8345: Sign Curve-sect131r2's EC Request - PASSED
cert.sh: Import Curve-sect131r2's EC Cert --------------------------
certutil -A -n Curve-sect131r2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-sect131r2-ec.cert
cert.sh: #8346: Import Curve-sect131r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect163k1 --------------------------
certutil -s "CN=Curve-sect163k1, E=Curve-sect163k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect163k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8347: Generate EC Cert Request for Curve-sect163k1 - PASSED
cert.sh: Sign Curve-sect163k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2057 -v 60 -d ../CA -i req -o Curve-sect163k1-ec.cert -f ../tests.pw 
cert.sh: #8348: Sign Curve-sect163k1's EC Request - PASSED
cert.sh: Import Curve-sect163k1's EC Cert --------------------------
certutil -A -n Curve-sect163k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-sect163k1-ec.cert
cert.sh: #8349: Import Curve-sect163k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect163r1 --------------------------
certutil -s "CN=Curve-sect163r1, E=Curve-sect163r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect163r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8350: Generate EC Cert Request for Curve-sect163r1 - PASSED
cert.sh: Sign Curve-sect163r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2058 -v 60 -d ../CA -i req -o Curve-sect163r1-ec.cert -f ../tests.pw 
cert.sh: #8351: Sign Curve-sect163r1's EC Request - PASSED
cert.sh: Import Curve-sect163r1's EC Cert --------------------------
certutil -A -n Curve-sect163r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-sect163r1-ec.cert
cert.sh: #8352: Import Curve-sect163r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect163r2 --------------------------
certutil -s "CN=Curve-sect163r2, E=Curve-sect163r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect163r2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8353: Generate EC Cert Request for Curve-sect163r2 - PASSED
cert.sh: Sign Curve-sect163r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2059 -v 60 -d ../CA -i req -o Curve-sect163r2-ec.cert -f ../tests.pw 
cert.sh: #8354: Sign Curve-sect163r2's EC Request - PASSED
cert.sh: Import Curve-sect163r2's EC Cert --------------------------
certutil -A -n Curve-sect163r2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-sect163r2-ec.cert
cert.sh: #8355: Import Curve-sect163r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect193r1 --------------------------
certutil -s "CN=Curve-sect193r1, E=Curve-sect193r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect193r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8356: Generate EC Cert Request for Curve-sect193r1 - PASSED
cert.sh: Sign Curve-sect193r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2060 -v 60 -d ../CA -i req -o Curve-sect193r1-ec.cert -f ../tests.pw 
cert.sh: #8357: Sign Curve-sect193r1's EC Request - PASSED
cert.sh: Import Curve-sect193r1's EC Cert --------------------------
certutil -A -n Curve-sect193r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-sect193r1-ec.cert
cert.sh: #8358: Import Curve-sect193r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect193r2 --------------------------
certutil -s "CN=Curve-sect193r2, E=Curve-sect193r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect193r2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8359: Generate EC Cert Request for Curve-sect193r2 - PASSED
cert.sh: Sign Curve-sect193r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2061 -v 60 -d ../CA -i req -o Curve-sect193r2-ec.cert -f ../tests.pw 
cert.sh: #8360: Sign Curve-sect193r2's EC Request - PASSED
cert.sh: Import Curve-sect193r2's EC Cert --------------------------
certutil -A -n Curve-sect193r2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-sect193r2-ec.cert
cert.sh: #8361: Import Curve-sect193r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect233k1 --------------------------
certutil -s "CN=Curve-sect233k1, E=Curve-sect233k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect233k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8362: Generate EC Cert Request for Curve-sect233k1 - PASSED
cert.sh: Sign Curve-sect233k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2062 -v 60 -d ../CA -i req -o Curve-sect233k1-ec.cert -f ../tests.pw 
cert.sh: #8363: Sign Curve-sect233k1's EC Request - PASSED
cert.sh: Import Curve-sect233k1's EC Cert --------------------------
certutil -A -n Curve-sect233k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-sect233k1-ec.cert
cert.sh: #8364: Import Curve-sect233k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect233r1 --------------------------
certutil -s "CN=Curve-sect233r1, E=Curve-sect233r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect233r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8365: Generate EC Cert Request for Curve-sect233r1 - PASSED
cert.sh: Sign Curve-sect233r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2063 -v 60 -d ../CA -i req -o Curve-sect233r1-ec.cert -f ../tests.pw 
cert.sh: #8366: Sign Curve-sect233r1's EC Request - PASSED
cert.sh: Import Curve-sect233r1's EC Cert --------------------------
certutil -A -n Curve-sect233r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-sect233r1-ec.cert
cert.sh: #8367: Import Curve-sect233r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect239k1 --------------------------
certutil -s "CN=Curve-sect239k1, E=Curve-sect239k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect239k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8368: Generate EC Cert Request for Curve-sect239k1 - PASSED
cert.sh: Sign Curve-sect239k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2064 -v 60 -d ../CA -i req -o Curve-sect239k1-ec.cert -f ../tests.pw 
cert.sh: #8369: Sign Curve-sect239k1's EC Request - PASSED
cert.sh: Import Curve-sect239k1's EC Cert --------------------------
certutil -A -n Curve-sect239k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-sect239k1-ec.cert
cert.sh: #8370: Import Curve-sect239k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect283k1 --------------------------
certutil -s "CN=Curve-sect283k1, E=Curve-sect283k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect283k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8371: Generate EC Cert Request for Curve-sect283k1 - PASSED
cert.sh: Sign Curve-sect283k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2065 -v 60 -d ../CA -i req -o Curve-sect283k1-ec.cert -f ../tests.pw 
cert.sh: #8372: Sign Curve-sect283k1's EC Request - PASSED
cert.sh: Import Curve-sect283k1's EC Cert --------------------------
certutil -A -n Curve-sect283k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-sect283k1-ec.cert
cert.sh: #8373: Import Curve-sect283k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect283r1 --------------------------
certutil -s "CN=Curve-sect283r1, E=Curve-sect283r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect283r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8374: Generate EC Cert Request for Curve-sect283r1 - PASSED
cert.sh: Sign Curve-sect283r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2066 -v 60 -d ../CA -i req -o Curve-sect283r1-ec.cert -f ../tests.pw 
cert.sh: #8375: Sign Curve-sect283r1's EC Request - PASSED
cert.sh: Import Curve-sect283r1's EC Cert --------------------------
certutil -A -n Curve-sect283r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-sect283r1-ec.cert
cert.sh: #8376: Import Curve-sect283r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect409k1 --------------------------
certutil -s "CN=Curve-sect409k1, E=Curve-sect409k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect409k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8377: Generate EC Cert Request for Curve-sect409k1 - PASSED
cert.sh: Sign Curve-sect409k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2067 -v 60 -d ../CA -i req -o Curve-sect409k1-ec.cert -f ../tests.pw 
cert.sh: #8378: Sign Curve-sect409k1's EC Request - PASSED
cert.sh: Import Curve-sect409k1's EC Cert --------------------------
certutil -A -n Curve-sect409k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-sect409k1-ec.cert
cert.sh: #8379: Import Curve-sect409k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect409r1 --------------------------
certutil -s "CN=Curve-sect409r1, E=Curve-sect409r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect409r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8380: Generate EC Cert Request for Curve-sect409r1 - PASSED
cert.sh: Sign Curve-sect409r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2068 -v 60 -d ../CA -i req -o Curve-sect409r1-ec.cert -f ../tests.pw 
cert.sh: #8381: Sign Curve-sect409r1's EC Request - PASSED
cert.sh: Import Curve-sect409r1's EC Cert --------------------------
certutil -A -n Curve-sect409r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-sect409r1-ec.cert
cert.sh: #8382: Import Curve-sect409r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect571k1 --------------------------
certutil -s "CN=Curve-sect571k1, E=Curve-sect571k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect571k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8383: Generate EC Cert Request for Curve-sect571k1 - PASSED
cert.sh: Sign Curve-sect571k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2069 -v 60 -d ../CA -i req -o Curve-sect571k1-ec.cert -f ../tests.pw 
cert.sh: #8384: Sign Curve-sect571k1's EC Request - PASSED
cert.sh: Import Curve-sect571k1's EC Cert --------------------------
certutil -A -n Curve-sect571k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-sect571k1-ec.cert
cert.sh: #8385: Import Curve-sect571k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect571r1 --------------------------
certutil -s "CN=Curve-sect571r1, E=Curve-sect571r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect571r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8386: Generate EC Cert Request for Curve-sect571r1 - PASSED
cert.sh: Sign Curve-sect571r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2070 -v 60 -d ../CA -i req -o Curve-sect571r1-ec.cert -f ../tests.pw 
cert.sh: #8387: Sign Curve-sect571r1's EC Request - PASSED
cert.sh: Import Curve-sect571r1's EC Cert --------------------------
certutil -A -n Curve-sect571r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-sect571r1-ec.cert
cert.sh: #8388: Import Curve-sect571r1's EC Cert - PASSED
cert.sh: Initializing TestExt's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions -f ../tests.pw
cert.sh: #8389: Initializing TestExt's Cert DB - PASSED
cert.sh: Loading root cert module to TestExt's Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #8390: Loading root cert module to TestExt's Cert DB - PASSED
cert.sh: Import Root CA for TestExt --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions -i ../CA/TestCA.ca.cert
cert.sh: #8391: Import Root CA for TestExt - PASSED
cert.sh: Import EC Root CA for TestExt --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions -i ../CA/TestCA-ec.ca.cert
cert.sh: #8392: Import EC Root CA for TestExt - PASSED
cert.sh: Generate Cert Request for TestExt --------------------------
certutil -s "CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8393: Generate Cert Request for TestExt - PASSED
cert.sh: Sign TestExt's Request --------------------------
certutil -C -c TestCA -m 90 -v 60 -d ../CA -i req -o TestExt.cert -f ../tests.pw 
cert.sh: #8394: Sign TestExt's Request - PASSED
cert.sh: Import TestExt's Cert --------------------------
certutil -A -n TestExt -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions -f ../tests.pw -i TestExt.cert
cert.sh: #8395: Import TestExt's Cert - PASSED
cert.sh SUCCESS: TestExt's Cert Created
cert.sh: Generate EC Cert Request for TestExt --------------------------
certutil -s "CN=TestExt, E=TestExt-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8396: Generate EC Cert Request for TestExt - PASSED
cert.sh: Sign TestExt's EC Request --------------------------
certutil -C -c TestCA-ec -m 90 -v 60 -d ../CA -i req -o TestExt-ec.cert -f ../tests.pw 
cert.sh: #8397: Sign TestExt's EC Request - PASSED
cert.sh: Import TestExt's EC Cert --------------------------
certutil -A -n TestExt-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions -f ../tests.pw -i TestExt-ec.cert
cert.sh: #8398: Import TestExt's EC Cert - PASSED
cert.sh SUCCESS: TestExt's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestExt --------------------------
certutil -s "CN=TestExt, E=TestExt-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8399: Generate mixed EC Cert Request for TestExt - PASSED
cert.sh: Sign TestExt's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10090 -v 60 -d ../CA -i req -o TestExt-ecmixed.cert -f ../tests.pw 
cert.sh: #8400: Sign TestExt's EC Request with RSA - PASSED
cert.sh: Import TestExt's mixed EC Cert --------------------------
certutil -A -n TestExt-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions -f ../tests.pw -i TestExt-ecmixed.cert
cert.sh: #8401: Import TestExt's mixed EC Cert - PASSED
cert.sh SUCCESS: TestExt's mixed EC Cert Created

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions -S -n TestExt1 -t u,u,u -o /tmp/cert -s CN=TestExt1, E=TestExt1@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions/test.args
certutil options:
0
1
2
3
4
5
6
10
n


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions -L -n TestExt1
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f2:11:bd
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 16:21:11 2012
            Not After : Thu Feb 28 16:21:11 2013
        Subject: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c0:e4:dd:77:eb:e4:b7:23:ae:73:a5:00:d8:c4:53:7a:
                    74:fb:05:4a:79:ef:c0:fd:24:c2:7e:73:25:32:c5:3c:
                    d7:e5:02:0c:ce:1d:3a:df:54:3b:1a:78:72:85:30:c8:
                    42:fe:d8:fa:94:0d:70:39:bc:45:2b:17:59:07:65:41:
                    28:26:ad:e4:01:2a:b9:2d:b6:44:cd:a4:bf:61:f7:1c:
                    0f:b3:99:92:df:bb:92:12:a0:2b:ed:02:64:bd:b4:12:
                    68:59:0d:a6:d4:07:c1:74:fa:23:0e:3b:1a:0e:97:c6:
                    30:c0:8c:7c:1a:cd:a9:c4:ba:6d:db:86:05:e2:62:75
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Key Usage
            Usages: Digital Signature
                    Non-Repudiation
                    Key Encipherment
                    Data Encipherment
                    Key Agreement
                    Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        49:70:c6:7a:16:f7:fc:8d:64:16:23:8c:2c:ce:5f:26:
        38:1c:ed:86:e9:91:6a:d9:f4:38:18:7f:d5:70:e9:5e:
        5f:0c:a4:68:f1:cd:3e:9d:ae:c8:9c:d0:e0:46:38:19:
        5e:64:4c:c8:7c:55:e6:79:c9:6c:62:a4:06:9f:81:fc:
        e6:59:91:41:fd:02:c0:aa:2b:04:8f:76:b5:87:2f:2b:
        df:fa:4c:ff:5c:9d:d9:b3:33:83:e8:9c:47:6d:c4:ad:
        5b:4f:26:72:52:f2:81:1f:24:db:80:a1:02:7e:87:37:
        f1:bf:a9:55:19:a8:3b:ef:fe:bd:25:00:b5:6f:ca:d2
    Fingerprint (MD5):
        31:9D:05:7B:CB:EC:2E:AB:07:DC:08:B7:55:C9:95:1D
    Fingerprint (SHA1):
        81:2C:55:E4:E4:32:B0:29:3F:9D:A9:86:E5:8B:BB:8D:E2:2A:69:39

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #8402: Certificate Key Usage Extension (1) - PASSED

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions -S -n TestExt2 -t u,u,u -o /tmp/cert -s CN=TestExt2, E=TestExt2@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions/test.args
certutil options:
0
1
2
3
4
5
6
10
y


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions -L -n TestExt2
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f2:11:bf
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 16:21:12 2012
            Not After : Thu Feb 28 16:21:12 2013
        Subject: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c0:93:31:10:6f:44:d9:c1:bd:5c:75:e4:09:0b:8a:ec:
                    4c:71:57:46:5c:e1:3d:86:7d:68:f3:66:00:8e:3b:b8:
                    7b:86:92:94:b6:01:e7:73:4a:89:61:13:d6:a0:cb:28:
                    98:ce:73:9e:76:4b:0f:03:de:09:ea:f2:12:53:88:a3:
                    f0:61:f9:a5:2c:d1:3a:87:b3:b5:46:d9:8e:5e:9e:a4:
                    d0:18:4d:11:e4:3f:00:43:3d:2e:62:27:bd:6c:c0:fd:
                    d2:da:1b:11:9e:ba:9b:1b:fa:2f:83:9a:4a:b8:ae:84:
                    f5:dd:0b:65:04:4e:cd:11:f2:3f:90:ad:d3:db:4c:3b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Key Usage
            Critical: True
            Usages: Digital Signature
                    Non-Repudiation
                    Key Encipherment
                    Data Encipherment
                    Key Agreement
                    Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        b5:e5:ac:54:0d:1f:46:1f:89:e5:57:83:17:3e:2f:c7:
        3d:96:4d:55:7b:0e:e7:0c:b6:61:9e:49:97:e4:d2:4b:
        5a:18:f2:2f:43:cb:d6:e4:31:27:cb:ee:08:28:ab:1c:
        51:46:00:d1:77:f1:ae:0f:5c:7e:87:09:e8:43:86:51:
        3a:13:b8:c5:8a:d0:6c:89:a9:73:78:5d:dd:73:43:2b:
        e6:1d:14:7a:a6:da:81:11:4b:29:66:1b:cb:1f:16:1a:
        94:5f:db:09:a6:ce:3d:ae:76:e1:4a:6a:3b:da:da:70:
        cb:e8:92:0c:3b:42:b2:35:d6:0a:ab:ff:20:f5:bb:84
    Fingerprint (MD5):
        55:54:FB:27:D0:6D:FC:82:C6:5E:7D:E6:57:CE:63:99
    Fingerprint (SHA1):
        98:9C:AA:DE:8C:40:C0:BA:AD:68:19:E1:16:C0:00:C1:E5:76:BA:13

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #8403: Certificate Key Usage Extension (2) - PASSED

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions -S -n TestExt3 -t u,u,u -o /tmp/cert -s CN=TestExt3, E=TestExt3@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions/test.args
certutil options:
y
-1
n


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions -L -n TestExt3
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f2:11:c2
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 16:21:13 2012
            Not After : Thu Feb 28 16:21:13 2013
        Subject: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:69:e2:9b:00:9f:c4:e5:2d:5b:81:77:26:62:a4:98:
                    f7:61:b6:eb:b0:54:44:a5:4c:0c:52:67:c8:e6:3f:7e:
                    8e:0e:8a:e4:e7:7d:03:c3:9b:77:1e:64:ea:5c:42:78:
                    ea:ef:71:57:0f:5c:c2:f0:75:54:54:6c:fe:d4:b0:5c:
                    9d:60:46:9a:3c:66:13:2f:9e:65:ff:08:1a:ac:99:fa:
                    5c:32:46:4a:d5:2e:c6:07:d2:7c:de:68:c1:a1:d0:df:
                    56:82:cf:37:cf:e3:65:19:0c:e8:50:39:f1:b0:bb:94:
                    10:5e:1d:8e:90:b8:49:f6:9e:f7:c7:1b:38:bc:47:bf
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        83:da:7a:35:90:43:f7:27:50:03:c1:c6:04:9d:e7:ac:
        69:88:51:b5:63:e9:61:5e:ea:52:2d:ae:0d:8d:e8:4a:
        96:97:f5:42:67:5b:7a:f9:49:a8:5a:5c:d6:37:cf:19:
        53:9b:b4:42:5a:de:64:2a:b3:69:c7:91:8f:80:de:59:
        7b:b4:95:2d:64:05:3b:ca:2d:2f:40:68:6f:86:10:ad:
        7c:9a:33:35:93:7a:de:e9:9f:3c:b5:30:0c:00:91:e8:
        ae:3a:07:4e:4c:c6:9c:5e:83:42:bd:f0:1e:a3:9a:ec:
        f9:15:76:72:06:d3:44:51:64:ec:db:11:3c:b5:98:61
    Fingerprint (MD5):
        25:E7:02:C6:ED:FF:03:F2:2E:7A:92:4F:6D:4E:83:15
    Fingerprint (SHA1):
        58:29:10:43:39:0B:CC:E7:AF:49:EF:7B:C2:98:D1:CB:08:55:70:4B

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #8404: Certificate Basic Constraints Extension (3) - PASSED

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions -S -n TestExt4 -t u,u,u -o /tmp/cert -s CN=TestExt4, E=TestExt4@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions/test.args
certutil options:
n
-1
y


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions -L -n TestExt4
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f2:11:c4
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 16:21:14 2012
            Not After : Thu Feb 28 16:21:14 2013
        Subject: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c1:12:e2:f5:1b:50:41:e9:69:0a:9a:3e:c8:3b:43:00:
                    2a:36:32:ba:f8:72:cb:76:fd:c4:32:86:88:b1:d7:ec:
                    ec:96:78:96:8b:f9:80:b0:67:49:25:17:01:13:51:e8:
                    e5:9d:b4:ce:9c:d2:a5:b2:b7:3f:3c:12:7e:dd:e8:64:
                    97:4a:3c:39:8e:4b:2f:5f:4a:56:4e:b5:0c:5f:09:73:
                    9f:b4:e6:b8:4a:2b:ac:2c:3e:52:4f:54:f4:13:0d:ae:
                    c1:c3:4c:2d:89:e4:d0:bf:53:dd:71:cc:b4:50:a4:e6:
                    fc:bf:78:d2:c6:73:46:5e:63:fa:90:d1:96:b9:42:7d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is not a CA.

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7f:6c:1c:61:48:de:90:51:01:65:32:97:e0:f8:e7:54:
        4e:90:2a:00:a5:91:ee:cf:c9:4d:ad:bb:93:34:9f:f0:
        85:0b:06:c7:73:7f:1c:b5:9c:58:d4:38:c1:97:d4:3c:
        e8:fa:fb:b5:e1:e5:e5:e2:b0:67:46:b8:24:f3:5e:64:
        d8:7d:9c:80:45:c6:9e:36:b2:d2:5f:a9:47:cd:39:35:
        c9:3d:ce:b0:2e:f0:e2:16:6d:9b:8b:db:b8:5b:7c:55:
        95:56:2b:4a:ff:af:dd:fb:d9:0d:80:e5:12:ba:aa:ee:
        60:77:0d:f9:16:09:07:55:ff:e2:9a:22:2b:4a:60:c8
    Fingerprint (MD5):
        83:F0:9D:82:C8:DF:76:DA:55:02:A3:E0:7D:E2:F3:6A
    Fingerprint (SHA1):
        54:87:95:65:40:19:B5:7F:7D:70:73:B7:3D:40:17:8C:D3:B6:9A:68

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #8405: Certificate Basic Constraints Extension (4) - PASSED

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions -S -n TestExt5 -t u,u,u -o /tmp/cert -s CN=TestExt5, E=TestExt5@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions/test.args
certutil options:
y
12341235123


y


Generating key.  This may take a few moments...

Enter value for the authKeyID extension [y/N]?
Enter value for the key identifier fields,enter to omit:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter value for the authCertSerial field, enter to omit:
Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions -L -n TestExt5
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f2:11:c7
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 16:21:16 2012
            Not After : Thu Feb 28 16:21:16 2013
        Subject: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b1:73:ff:8b:b3:0b:e6:0f:19:80:c6:b0:05:f5:b8:e2:
                    01:6a:d0:c3:d7:e9:31:bc:1a:2d:fe:6b:5e:71:cf:33:
                    75:0a:48:1b:e9:a8:17:a4:0d:a4:81:35:28:0d:60:93:
                    2c:46:2a:a0:1f:3f:98:a1:d2:13:65:e5:fa:3d:8d:d4:
                    75:67:ac:a3:b1:e0:17:99:01:92:a4:b1:b3:59:5c:51:
                    0c:69:6c:90:f1:c3:f8:6a:58:46:0c:d2:d9:95:77:cc:
                    58:f1:31:e7:68:9d:e7:cb:9e:7b:2c:75:15:80:30:3d:
                    37:64:ef:27:f8:76:6f:7e:f9:11:01:be:8c:ad:a0:b9
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Authority Key Identifier
            Critical: True
            Key ID:
                12341235123

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8e:97:22:3f:c6:8a:75:27:71:63:3a:fd:66:90:a8:76:
        56:70:e6:81:47:44:2f:07:5f:67:a7:b4:c2:db:73:ba:
        1a:df:fd:f4:8a:b3:42:9c:5c:ab:ce:87:6f:46:6e:b2:
        04:52:af:cb:e6:10:9f:0f:39:ae:03:52:be:e9:4b:7c:
        a0:b8:cc:a7:d3:09:f1:85:d1:f8:6c:71:6a:a7:d0:73:
        26:f7:a1:f6:61:03:81:f0:3e:9b:52:2c:a2:59:1e:b8:
        71:57:68:1a:27:39:c1:3e:f2:90:28:f4:96:d1:93:66:
        50:0a:de:03:56:3d:97:fc:8d:b0:ee:63:08:92:5a:2a
    Fingerprint (MD5):
        BC:47:45:17:9B:6E:C3:8E:6A:9C:5A:EC:78:0C:E6:E7
    Fingerprint (SHA1):
        93:E1:DE:D5:5C:5A:0D:FC:AF:E0:E8:EB:14:53:02:B4:0B:36:F0:B7

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #8406: Certificate Authority Key Identifier Extension (5) - PASSED

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions -S -n TestExt6 -t u,u,u -o /tmp/cert -s CN=TestExt6, E=TestExt6@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions/test.args
certutil options:
y

3
test.com

214123
y


Generating key.  This may take a few moments...

Enter value for the authKeyID extension [y/N]?
Enter value for the key identifier fields,enter to omit:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter value for the authCertSerial field, enter to omit:
Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions -L -n TestExt6
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f2:11:ca
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 16:21:17 2012
            Not After : Thu Feb 28 16:21:17 2013
        Subject: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    9c:ad:fb:64:b9:02:a6:9b:80:7a:87:60:a7:08:39:12:
                    36:cd:0b:a4:e3:53:c5:50:c2:5b:05:b7:1b:56:e0:2b:
                    e6:53:51:05:7c:8a:35:ba:29:b3:17:4e:90:a1:fc:37:
                    ae:aa:2b:02:54:83:70:01:43:21:f9:52:08:73:c7:45:
                    85:41:df:e2:05:a8:b1:b3:94:76:98:95:9f:16:44:49:
                    0f:29:f7:d3:80:4b:ae:6b:5a:67:83:46:b9:15:83:8b:
                    a3:61:f4:d3:17:d7:83:a4:dc:7d:93:41:22:35:29:18:
                    69:63:46:58:56:33:9b:f6:c2:b8:b9:8b:6b:77:39:13
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Authority Key Identifier
            Critical: True
            Issuer: 
                DNS name: "test.com"
            Serial Number:
                214123

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        63:92:23:c0:c2:54:e7:59:1d:19:6f:1f:dc:58:d7:a4:
        89:4b:3e:6a:3e:b7:54:21:64:9f:e9:d3:07:22:c7:5b:
        44:14:1e:f0:75:ad:eb:a9:47:72:45:5f:f2:df:d6:61:
        2f:1e:a0:1a:5c:6e:7b:90:d2:84:24:69:2b:e8:9c:39:
        9e:64:07:a4:ff:69:71:54:59:73:4c:0b:32:b6:0f:85:
        70:10:ba:8d:05:7f:95:30:da:e9:c0:59:e5:61:51:cb:
        2f:e1:f3:ec:21:eb:97:4e:2c:0c:b5:a7:8c:1d:6e:f2:
        16:b8:d5:12:e0:fa:12:fd:4d:04:db:46:2d:3e:4b:cd
    Fingerprint (MD5):
        B1:04:96:BE:86:99:8B:2C:8A:ED:95:37:84:80:B6:46
    Fingerprint (SHA1):
        55:FA:55:DF:02:B6:B3:6A:84:23:B1:27:1A:45:02:2D:17:F8:A0:4B

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #8407: Certificate Authority Key Identifier Extension (6) - PASSED

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions -S -n TestExt7 -t u,u,u -o /tmp/cert -s CN=TestExt7, E=TestExt7@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions/test.args
certutil options:
1
2
rfc822@name.tld
3
test.com
8
1.2.3.4
9
OID.0.2.213
10
0
10
n
n


Generating key.  This may take a few moments...

Enter the type of the distribution point name:
1 - Full Name
2 - Relative Name
Any other number to finish
Choice:  > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Select one of the following for the reason flags
0 - unused
1 - keyCompromise
2 - caCompromise
3 - affiliationChanged
4 - superseded
5 - cessationOfOperation
6 - certificateHold
Any other number to finishChoice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions -L -n TestExt7
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f2:11:cc
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 16:21:19 2012
            Not After : Thu Feb 28 16:21:19 2013
        Subject: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e9:4a:22:ec:5f:11:6c:14:dd:8c:e1:f9:f0:b5:41:5e:
                    35:41:d2:4b:65:06:ee:0e:fb:cc:5b:ff:91:95:ea:4d:
                    36:03:c9:e5:15:33:62:13:5b:61:7a:3e:0d:44:73:1f:
                    2d:41:e5:13:f6:bf:5e:1a:86:b7:c7:a6:21:f2:df:1c:
                    8f:c6:34:f7:be:3c:fe:13:40:2b:44:7b:83:56:0b:0b:
                    c8:71:23:b8:d6:b6:3d:2e:40:cf:e3:b4:54:27:2d:72:
                    90:4f:41:4f:f7:ab:f4:f6:0e:e7:8b:4c:37:e1:0f:4e:
                    7e:cc:c7:91:58:81:95:f3:38:15:2c:c8:ed:b1:1a:17
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: CRL Distribution Points
            Distribution point:
                RFC822 Name: "rfc822@name.tld"
                DNS name: "test.com"
                IP Address:
                    87:07:31:2e:32:2e:33:2e:34
                Registered ID: OID.2.955.79.73.68.46.48.46.50.46.50.49.51
                Reasons:
                    80
                    (7 least significant bits unused)

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        30:15:57:df:ca:64:09:99:64:f0:bb:24:64:02:39:46:
        6b:62:78:f4:ae:fc:eb:f1:02:fc:06:dc:97:63:35:59:
        cb:3d:2a:a1:8a:9d:de:98:8c:a9:13:09:e1:aa:00:05:
        09:65:5d:11:55:f0:7b:d2:5b:e4:72:da:86:91:81:b4:
        dd:cb:16:db:ff:dc:47:ac:15:9a:5b:83:6f:e5:60:5a:
        a5:78:24:4c:91:36:d6:a4:b2:42:8e:81:ed:40:e9:cb:
        a3:f6:05:c0:9e:ec:5f:bb:ab:d3:d7:21:18:29:a2:34:
        c2:5c:66:a8:d4:f8:90:43:61:e8:a1:7d:70:ae:52:fb
    Fingerprint (MD5):
        A3:3F:D0:A4:CF:B6:8E:1A:9D:41:2E:8C:FD:C2:D1:A9
    Fingerprint (SHA1):
        51:3A:70:A9:00:7A:4B:ED:E3:D5:B0:0D:18:1D:A2:4F:9A:6A:7C:FB

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #8408: CRL Distribution Points Extension (7) - PASSED

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions -S -n TestExt8 -t u,u,u -o /tmp/cert -s CN=TestExt8, E=TestExt8@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions/test.args
certutil options:
2
SN=asdfsdf
4
3
test.com
10
n
n


Generating key.  This may take a few moments...

Enter the type of the distribution point name:
1 - Full Name
2 - Relative Name
Any other number to finish
Choice:  > Enter the relative name: 

Select one of the following for the reason flags
0 - unused
1 - keyCompromise
2 - caCompromise
3 - affiliationChanged
4 - superseded
5 - cessationOfOperation
6 - certificateHold
Any other number to finishChoice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions -L -n TestExt8
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f2:11:d0
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 16:21:20 2012
            Not After : Thu Feb 28 16:21:20 2013
        Subject: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a9:0c:20:cf:73:ee:21:e2:82:3b:d4:5e:55:47:95:9b:
                    0e:48:e5:46:38:15:ca:8e:58:0c:29:35:a2:36:9c:e6:
                    60:2d:65:d5:f7:d3:09:83:4b:7d:22:b7:86:bc:0a:31:
                    a7:23:ea:a5:04:9f:8c:1b:8f:ac:ce:36:60:9b:1c:23:
                    c8:e3:e6:4d:d6:17:e6:3a:15:31:46:57:b8:cd:8d:96:
                    c1:53:5b:6c:a3:c0:8f:bf:d3:4b:e5:c1:a3:6e:a5:94:
                    7a:98:81:1b:d7:a6:6f:94:f8:61:76:37:5c:f9:11:8a:
                    7c:ec:ff:de:22:ab:7e:f1:65:55:a7:c8:93:77:17:af
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: CRL Distribution Points
            Distribution point:
                RDN: "SN=asdfsdf"
                Reasons:
                    08
                    (7 least significant bits unused)
                CRL issuer: 
                    DNS name: "test.com"

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        13:eb:d1:0a:cf:8a:12:3c:3e:e3:97:72:dd:f4:53:7a:
        ea:42:05:36:8b:12:84:c6:d9:01:32:4d:e8:2f:59:fd:
        7a:49:24:ff:23:d4:c8:37:3f:0c:34:c9:3b:ea:d8:e5:
        03:7c:67:44:95:a1:9b:17:69:d1:71:fa:1f:41:b5:c1:
        2b:0a:09:97:58:74:2e:dd:36:a5:56:66:7d:2f:74:b9:
        21:b1:82:0e:0c:74:2f:fd:a9:3e:9f:ab:87:3e:1b:07:
        ae:ab:cb:4c:dc:e6:42:47:24:26:51:87:80:c3:26:eb:
        36:bb:a4:2c:30:1a:a8:38:8a:37:7e:0a:85:21:1f:a9
    Fingerprint (MD5):
        4D:3C:62:CF:85:2D:4C:01:EC:0A:54:85:EB:29:12:BD
    Fingerprint (SHA1):
        4E:50:EE:E7:2B:92:83:9C:F4:B4:D6:46:0F:4C:6C:AB:65:1C:61:A1

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #8409: CRL Distribution Points Extension (8) - PASSED

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions -S -n TestExt9 -t u,u,u -o /tmp/cert -s CN=TestExt9, E=TestExt9@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -5 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions/test.args
certutil options:
0
1
2
10
n


Generating key.  This may take a few moments...

0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions -L -n TestExt9
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f2:11:d2
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 16:21:22 2012
            Not After : Thu Feb 28 16:21:22 2013
        Subject: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c0:d7:01:8f:1c:ca:71:a5:0b:75:b6:e3:af:38:06:0d:
                    d2:4e:14:31:b3:d9:12:81:48:11:0b:19:2c:65:b1:6a:
                    3f:3c:6c:79:ed:04:a1:34:7a:31:26:f2:cf:bd:ed:fb:
                    e4:d0:c5:1a:c6:5b:3c:39:10:d0:4e:d7:2b:cb:75:b0:
                    a7:79:fe:25:c9:59:65:37:28:91:26:59:32:67:58:98:
                    0f:9e:84:64:f9:cf:59:c7:a4:91:1f:8f:c8:99:f6:bf:
                    94:93:16:c5:c6:15:db:fb:48:0c:bd:9e:ae:30:ca:3e:
                    22:b5:24:a9:ca:b8:ba:09:35:55:2e:95:20:af:a7:2d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL Client,SSL Server,S/MIME>

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        23:07:c3:cd:7f:c9:1d:ac:36:9a:8e:78:f2:6d:b4:28:
        ee:52:47:10:d8:af:52:58:20:61:65:da:ad:82:e3:17:
        46:25:43:26:d2:65:92:11:08:8e:2e:1c:d4:f4:86:67:
        ba:4b:52:12:51:b8:5a:4b:c9:b7:7e:92:6d:71:d4:fb:
        9e:ec:52:47:95:6e:93:5a:1f:f5:54:77:b0:97:43:36:
        8a:2a:32:0a:59:1b:a8:19:ee:d3:4a:88:64:4b:b7:25:
        93:0a:d8:3c:b6:82:c4:7c:51:4f:21:04:af:6c:86:11:
        b5:5b:41:22:6c:ed:59:d4:c1:78:61:fc:3e:4c:8d:be
    Fingerprint (MD5):
        C9:BA:3C:4A:90:53:5D:1E:BE:F7:CC:7C:17:82:83:8B
    Fingerprint (SHA1):
        2A:AA:CB:75:7F:49:8F:B7:2D:C2:F5:4F:92:EC:46:D3:12:D4:76:19

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #8410: Certificate Type Extension (9) - PASSED

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions -S -n TestExt10 -t u,u,u -o /tmp/cert -s CN=TestExt10, E=TestExt10@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -6 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions/test.args
certutil options:
0
1
2
3
4
5
6
10
y


Generating key.  This may take a few moments...

0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
 > 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
 > 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
 > 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
 > 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
 > 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
 > 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
 > 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
 > Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions -L -n TestExt10
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f2:11:d4
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain Vi
            ew,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 16:21:23 2012
            Not After : Thu Feb 28 16:21:23 2013
        Subject: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain V
            iew,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c8:3a:e1:e7:6b:76:3c:c2:f7:7b:f4:36:8e:28:1b:0c:
                    71:7e:44:f3:2a:14:c5:20:10:c1:3b:f6:a7:15:1b:12:
                    14:d3:07:22:d9:05:e9:cb:0c:46:45:ca:d2:02:c1:11:
                    36:a8:08:b5:3e:55:84:f4:6d:5f:7a:67:97:68:22:bc:
                    36:12:e0:2c:f9:26:15:e4:b2:2d:db:47:0a:60:49:cc:
                    f6:43:58:45:9b:1a:a9:18:8e:5e:0b:c7:62:b6:ef:b4:
                    4d:5e:df:d6:7f:c1:71:05:9f:a2:fa:5f:9b:c9:35:18:
                    75:c5:ee:a4:1a:2b:70:42:a6:32:19:cb:2e:b9:df:a7
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Extended Key Usage
            Critical: True
                TLS Web Server Authentication Certificate
                TLS Web Client Authentication Certificate
                Code Signing Certificate
                E-Mail Protection Certificate
                Time Stamping Certifcate
                OCSP Responder Certificate
                Strong Crypto Export Approved

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        88:3e:ac:1e:bd:50:5c:0a:bc:87:5c:a9:85:94:e6:3c:
        c4:b5:66:84:79:c3:02:70:d0:86:99:f7:08:44:86:79:
        b5:ce:26:c0:72:56:5c:37:85:f6:ea:d8:ba:cf:67:f7:
        d6:38:96:d1:f9:18:6f:ad:ec:23:67:f1:41:47:4b:01:
        1e:5d:94:5e:aa:f7:e0:e2:69:c6:38:de:0b:3a:20:38:
        ee:9e:07:75:da:1d:bf:ad:ae:59:d0:7c:8a:05:24:cf:
        9d:e9:01:a1:b3:52:b0:a0:8c:f0:87:4f:64:d7:37:4f:
        55:42:30:35:5a:4c:3e:30:b8:ef:ca:7e:51:19:7f:eb
    Fingerprint (MD5):
        DC:AB:96:BC:36:23:48:D9:FE:76:C5:32:9C:8A:B1:62
    Fingerprint (SHA1):
        6D:90:E9:BC:F4:64:81:1E:79:80:26:7B:D5:66:AD:17:56:11:57:7C

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #8411: Extended Key Usage Extension (10) - PASSED

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions -S -n TestExt11 -t u,u,u -o /tmp/cert -s CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions/test.args
certutil options:

1
2
3
4
5
6
10
n


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions -L -n TestExt11
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f2:11:d7
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain Vi
            ew,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 16:21:24 2012
            Not After : Thu Feb 28 16:21:24 2013
        Subject: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain V
            iew,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    af:c1:14:59:27:11:fa:8e:9f:ce:c7:f2:a2:cf:bf:55:
                    15:fd:81:3b:ce:33:98:d1:ac:77:cf:20:95:a8:ff:52:
                    33:42:0a:a5:f3:cc:00:cc:73:d1:9b:70:e7:eb:a5:bc:
                    ff:17:7d:4d:f3:7d:fb:72:93:62:c7:9e:90:54:13:a6:
                    f3:e3:3c:b4:4f:cc:d0:86:83:f2:4a:cc:9e:ac:87:d9:
                    d1:8b:68:72:e0:5c:d5:5d:02:fd:a5:ee:a9:20:2f:7e:
                    2e:4b:56:07:97:64:53:bc:31:77:21:1b:4a:a8:e7:c8:
                    2d:bf:2b:37:1d:43:43:13:98:d0:42:09:76:37:6d:c3
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Key Usage
            Usages: Non-Repudiation
                    Key Encipherment
                    Data Encipherment
                    Key Agreement
                    Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3b:81:c4:a9:fd:3c:cb:f1:a5:d0:5f:bf:d0:25:80:fb:
        ee:8f:85:a2:4f:e0:c2:6b:ec:97:bd:83:12:50:f8:a2:
        23:63:4e:db:40:d6:a8:a6:bd:77:b6:68:4c:3f:05:bb:
        3a:6d:ef:cc:09:46:47:bd:6f:20:a9:7a:cc:d9:b9:d1:
        5b:a4:0c:46:47:50:0d:54:b8:c9:f7:4c:19:72:a4:07:
        88:4e:11:76:ee:c3:fe:a2:21:91:74:8c:ab:73:7b:ee:
        af:c3:45:e0:08:fe:cb:69:a3:fa:79:a6:d8:31:cd:5d:
        15:74:11:f6:d1:89:d6:c2:94:07:a9:d5:af:5d:66:01
    Fingerprint (MD5):
        8C:AD:0C:DA:20:50:48:C8:5A:48:47:84:82:35:AF:F6
    Fingerprint (SHA1):
        9D:D6:01:05:9A:8E:C7:9F:58:95:B2:A1:A3:7E:B0:7E:50:31:AB:66

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #8412: Certificate Key Usage Extension (11) - PASSED
cert.sh: Create A Password Test Cert  ==============
cert.sh: Create A Password Test Ca  --------
cert.sh: Creating a CA Certificate PasswordCA ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/dbpass
cert.sh: Creating CA Cert DB --------------------------
certutil -s "CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/dbpass -f ../tests.pw
cert.sh: #8413: Creating CA Cert DB - PASSED
cert.sh: Loading root cert module to CA Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/dbpass

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #8414: Loading root cert module to CA Cert DB - PASSED
cert.sh: Certificate initialized ----------
cert.sh: Creating CA Cert PasswordCA  --------------------------
certutil -s "CN=NSS Password Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCA -t CTu,CTu,CTu -v 600 -x -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/dbpass -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #8415: Creating CA Cert PasswordCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n PasswordCA -r -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/dbpass -o root.cert
cert.sh: #8416: Exporting Root Cert - PASSED
cert.sh: Changing password on Password Test Cert's Cert DB --------------------------
certutil -W -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/dbpass -f ../tests.pw -@ ../tests.fipspw
Password changed successfully.
cert.sh: #8417: Changing password on Password Test Cert's Cert DB - PASSED
cert.sh: Generate Certificate for Password Test Cert with new password --------------------------
certutil -s "CN=Password Test Cert, E=password@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCert -c PasswordCA -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/dbpass -f ../tests.fipspw -z ../tests_noise


Generating key.  This may take a few moments...

cert.sh: #8418: Generate Certificate for Password Test Cert with new password - PASSED
cert.sh SUCCESS: PASSWORD passed
cert.sh: Verify Certificate for Password Test Cert with new password --------------------------
certutil -V -n PasswordCert -u S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/dbpass -f ../tests.fipspw
certutil: certificate is valid
cert.sh: #8419: Verify Certificate for Password Test Cert with new password - PASSED
cert.sh: Creating Distrusted Certificate
cert.sh: Initializing Distrusted's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/distrust -f ../tests.pw
cert.sh: #8420: Initializing Distrusted's Cert DB - PASSED
cert.sh: Loading root cert module to Distrusted's Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/distrust

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #8421: Loading root cert module to Distrusted's Cert DB - PASSED
cert.sh: Import Root CA for Distrusted --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/distrust -i ../CA/TestCA.ca.cert
cert.sh: #8422: Import Root CA for Distrusted - PASSED
cert.sh: Import EC Root CA for Distrusted --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/distrust -i ../CA/TestCA-ec.ca.cert
cert.sh: #8423: Import EC Root CA for Distrusted - PASSED
cert.sh: Generate Cert Request for Distrusted --------------------------
certutil -s "CN=Distrusted, E=Distrusted@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/distrust -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8424: Generate Cert Request for Distrusted - PASSED
cert.sh: Sign Distrusted's Request --------------------------
certutil -C -c TestCA -m 2000 -v 60 -d ../CA -i req -o Distrusted.cert -f ../tests.pw 
cert.sh: #8425: Sign Distrusted's Request - PASSED
cert.sh: Import Distrusted's Cert --------------------------
certutil -A -n Distrusted -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/distrust -f ../tests.pw -i Distrusted.cert
cert.sh: #8426: Import Distrusted's Cert - PASSED
cert.sh SUCCESS: Distrusted's Cert Created
cert.sh: Generate EC Cert Request for Distrusted --------------------------
certutil -s "CN=Distrusted, E=Distrusted-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/distrust -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8427: Generate EC Cert Request for Distrusted - PASSED
cert.sh: Sign Distrusted's EC Request --------------------------
certutil -C -c TestCA-ec -m 2000 -v 60 -d ../CA -i req -o Distrusted-ec.cert -f ../tests.pw 
cert.sh: #8428: Sign Distrusted's EC Request - PASSED
cert.sh: Import Distrusted's EC Cert --------------------------
certutil -A -n Distrusted-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/distrust -f ../tests.pw -i Distrusted-ec.cert
cert.sh: #8429: Import Distrusted's EC Cert - PASSED
cert.sh SUCCESS: Distrusted's EC Cert Created
cert.sh: Generate mixed EC Cert Request for Distrusted --------------------------
certutil -s "CN=Distrusted, E=Distrusted-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/distrust -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8430: Generate mixed EC Cert Request for Distrusted - PASSED
cert.sh: Sign Distrusted's EC Request with RSA --------------------------
certutil -C -c TestCA -m 12000 -v 60 -d ../CA -i req -o Distrusted-ecmixed.cert -f ../tests.pw 
cert.sh: #8431: Sign Distrusted's EC Request with RSA - PASSED
cert.sh: Import Distrusted's mixed EC Cert --------------------------
certutil -A -n Distrusted-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/distrust -f ../tests.pw -i Distrusted-ecmixed.cert
cert.sh: #8432: Import Distrusted's mixed EC Cert - PASSED
cert.sh SUCCESS: Distrusted's mixed EC Cert Created
cert.sh: Mark CERT as unstrusted --------------------------
certutil -M -n Distrusted -t p,p,p -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/distrust -f ../tests.pw
cert.sh: #8433: Mark CERT as unstrusted - PASSED
cert.sh: Creating Distrusted Intermediate
cert.sh: Creating a CA Certificate DistrustedCA ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/CA
cert.sh: Creating CA Cert DistrustedCA  --------------------------
certutil -s "CN=DistrustedCA, E=DistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n DistrustedCA -t ,, -v 600 -c TestCA -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2010


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #8434: Creating CA Cert DistrustedCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n DistrustedCA -r -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/CA -o root.cert
cert.sh: #8435: Exporting Root Cert - PASSED
cert.sh: Import Distrusted Intermediate --------------------------
certutil -A -n DistrustedCA -t p,p,p -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/distrust -i ../CA/DistrustedCA.ca.cert
cert.sh: #8436: Import Distrusted Intermediate - PASSED
cert.sh: Generate Cert Request for Leaf Chained to Distrusted CA --------------------------
certutil -s "CN=LeafChainedToDistrustedCA, E=LeafChainedToDistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/distrust -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8437: Generate Cert Request for Leaf Chained to Distrusted CA - PASSED
cp: `./req' and `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/CA/req' are the same file
cert.sh: Sign LeafChainedToDistrustedCA's Request --------------------------
certutil -C -c DistrustedCA -m 100 -v 60 -d ../CA -i req -o LeafChainedToDistrustedCA.cert -f ../tests.pw
cert.sh: #8438: Sign LeafChainedToDistrustedCA's Request - PASSED
cert.sh: Import LeafChainedToDistrustedCA's Cert  -t u,u,u --------------------------
certutil -A -n LeafChainedToDistrustedCA -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/distrust -f ../tests.pw -i LeafChainedToDistrustedCA.cert
cert.sh: #8439: Import LeafChainedToDistrustedCA's Cert  -t u,u,u - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Server --------------------------
certutil -V -n LeafChainedToDistrustedCA -u V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user.
cert.sh: #8440: Verify LeafChainedToDistrustedCA Cert for SSL Server - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Client --------------------------
certutil -V -n LeafChainedToDistrustedCA -u C -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user.
cert.sh: #8441: Verify LeafChainedToDistrustedCA Cert for SSL Client - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for Email signer --------------------------
certutil -V -n LeafChainedToDistrustedCA -u S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user.
cert.sh: #8442: Verify LeafChainedToDistrustedCA Cert for Email signer - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for Email recipient --------------------------
certutil -V -n LeafChainedToDistrustedCA -u R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user.
cert.sh: #8443: Verify LeafChainedToDistrustedCA Cert for Email recipient - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for OCSP responder --------------------------
certutil -V -n LeafChainedToDistrustedCA -u O -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/distrust -f ../tests.pw
certutil: certificate is invalid: Certificate type not approved for application.
cert.sh: #8444: Verify LeafChainedToDistrustedCA Cert for OCSP responder - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for Object Signer --------------------------
certutil -V -n LeafChainedToDistrustedCA -u J -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/distrust -f ../tests.pw
certutil: certificate is invalid: Certificate type not approved for application.
cert.sh: #8445: Verify LeafChainedToDistrustedCA Cert for Object Signer - PASSED
cert.sh: Verify Distrusted Cert for SSL Server --------------------------
certutil -V -n Distrusted -u V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #8446: Verify Distrusted Cert for SSL Server - PASSED
cert.sh: Verify Distrusted Cert for SSL Client --------------------------
certutil -V -n Distrusted -u C -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #8447: Verify Distrusted Cert for SSL Client - PASSED
cert.sh: Verify Distrusted Cert for Email signer --------------------------
certutil -V -n Distrusted -u S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #8448: Verify Distrusted Cert for Email signer - PASSED
cert.sh: Verify Distrusted Cert for Email recipient --------------------------
certutil -V -n Distrusted -u R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #8449: Verify Distrusted Cert for Email recipient - PASSED
cert.sh: Verify Distrusted Cert for OCSP responder --------------------------
certutil -V -n Distrusted -u O -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/distrust -f ../tests.pw
certutil: certificate is invalid: Certificate type not approved for application.
cert.sh: #8450: Verify Distrusted Cert for OCSP responder - PASSED
cert.sh: Verify Distrusted Cert for Object Signer --------------------------
certutil -V -n Distrusted -u J -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #8451: Verify Distrusted Cert for Object Signer - PASSED
cert.sh: OCSP response creation selftest
cert.sh: perform selftest --------------------------
ocspresp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/serverCA serverCA chain-1-serverCA -f ../tests.pw
cert.sh: #8452: perform selftest - PASSED
cert.sh: Creating Client CA Issued Certificates Range 40 - 52 ===
cert.sh: Generate Cert Request for TestUser40 --------------------------
certutil -s "CN=TestUser40, E=TestUser40@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8453: Generate Cert Request for TestUser40 - PASSED
cert.sh: Sign TestUser40's Request --------------------------
certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o TestUser40.cert -f ../tests.pw 
cert.sh: #8454: Sign TestUser40's Request - PASSED
cert.sh: Import TestUser40's Cert --------------------------
certutil -A -n TestUser40 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser40.cert
cert.sh: #8455: Import TestUser40's Cert - PASSED
cert.sh SUCCESS: TestUser40's Cert Created
cert.sh: Generate EC Cert Request for TestUser40 --------------------------
certutil -s "CN=TestUser40, E=TestUser40-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8456: Generate EC Cert Request for TestUser40 - PASSED
cert.sh: Sign TestUser40's EC Request --------------------------
certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o TestUser40-ec.cert -f ../tests.pw 
cert.sh: #8457: Sign TestUser40's EC Request - PASSED
cert.sh: Import TestUser40's EC Cert --------------------------
certutil -A -n TestUser40-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser40-ec.cert
cert.sh: #8458: Import TestUser40's EC Cert - PASSED
cert.sh SUCCESS: TestUser40's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser40 --------------------------
certutil -s "CN=TestUser40, E=TestUser40-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8459: Generate mixed EC Cert Request for TestUser40 - PASSED
cert.sh: Sign TestUser40's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o TestUser40-ecmixed.cert -f ../tests.pw 
cert.sh: #8460: Sign TestUser40's EC Request with RSA - PASSED
cert.sh: Import TestUser40's mixed EC Cert --------------------------
certutil -A -n TestUser40-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser40-ecmixed.cert
cert.sh: #8461: Import TestUser40's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser40's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser41 --------------------------
certutil -s "CN=TestUser41, E=TestUser41@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8462: Generate Cert Request for TestUser41 - PASSED
cert.sh: Sign TestUser41's Request --------------------------
certutil -C -c TestCA -m 41 -v 60 -d ../CA -i req -o TestUser41.cert -f ../tests.pw 
cert.sh: #8463: Sign TestUser41's Request - PASSED
cert.sh: Import TestUser41's Cert --------------------------
certutil -A -n TestUser41 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser41.cert
cert.sh: #8464: Import TestUser41's Cert - PASSED
cert.sh SUCCESS: TestUser41's Cert Created
cert.sh: Generate EC Cert Request for TestUser41 --------------------------
certutil -s "CN=TestUser41, E=TestUser41-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8465: Generate EC Cert Request for TestUser41 - PASSED
cert.sh: Sign TestUser41's EC Request --------------------------
certutil -C -c TestCA-ec -m 41 -v 60 -d ../CA -i req -o TestUser41-ec.cert -f ../tests.pw 
cert.sh: #8466: Sign TestUser41's EC Request - PASSED
cert.sh: Import TestUser41's EC Cert --------------------------
certutil -A -n TestUser41-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser41-ec.cert
cert.sh: #8467: Import TestUser41's EC Cert - PASSED
cert.sh SUCCESS: TestUser41's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser41 --------------------------
certutil -s "CN=TestUser41, E=TestUser41-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8468: Generate mixed EC Cert Request for TestUser41 - PASSED
cert.sh: Sign TestUser41's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10041 -v 60 -d ../CA -i req -o TestUser41-ecmixed.cert -f ../tests.pw 
cert.sh: #8469: Sign TestUser41's EC Request with RSA - PASSED
cert.sh: Import TestUser41's mixed EC Cert --------------------------
certutil -A -n TestUser41-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser41-ecmixed.cert
cert.sh: #8470: Import TestUser41's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser41's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser42 --------------------------
certutil -s "CN=TestUser42, E=TestUser42@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8471: Generate Cert Request for TestUser42 - PASSED
cert.sh: Sign TestUser42's Request --------------------------
certutil -C -c TestCA -m 42 -v 60 -d ../CA -i req -o TestUser42.cert -f ../tests.pw 
cert.sh: #8472: Sign TestUser42's Request - PASSED
cert.sh: Import TestUser42's Cert --------------------------
certutil -A -n TestUser42 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser42.cert
cert.sh: #8473: Import TestUser42's Cert - PASSED
cert.sh SUCCESS: TestUser42's Cert Created
cert.sh: Generate EC Cert Request for TestUser42 --------------------------
certutil -s "CN=TestUser42, E=TestUser42-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8474: Generate EC Cert Request for TestUser42 - PASSED
cert.sh: Sign TestUser42's EC Request --------------------------
certutil -C -c TestCA-ec -m 42 -v 60 -d ../CA -i req -o TestUser42-ec.cert -f ../tests.pw 
cert.sh: #8475: Sign TestUser42's EC Request - PASSED
cert.sh: Import TestUser42's EC Cert --------------------------
certutil -A -n TestUser42-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser42-ec.cert
cert.sh: #8476: Import TestUser42's EC Cert - PASSED
cert.sh SUCCESS: TestUser42's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser42 --------------------------
certutil -s "CN=TestUser42, E=TestUser42-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8477: Generate mixed EC Cert Request for TestUser42 - PASSED
cert.sh: Sign TestUser42's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10042 -v 60 -d ../CA -i req -o TestUser42-ecmixed.cert -f ../tests.pw 
cert.sh: #8478: Sign TestUser42's EC Request with RSA - PASSED
cert.sh: Import TestUser42's mixed EC Cert --------------------------
certutil -A -n TestUser42-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser42-ecmixed.cert
cert.sh: #8479: Import TestUser42's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser42's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser43 --------------------------
certutil -s "CN=TestUser43, E=TestUser43@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8480: Generate Cert Request for TestUser43 - PASSED
cert.sh: Sign TestUser43's Request --------------------------
certutil -C -c TestCA -m 43 -v 60 -d ../CA -i req -o TestUser43.cert -f ../tests.pw 
cert.sh: #8481: Sign TestUser43's Request - PASSED
cert.sh: Import TestUser43's Cert --------------------------
certutil -A -n TestUser43 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser43.cert
cert.sh: #8482: Import TestUser43's Cert - PASSED
cert.sh SUCCESS: TestUser43's Cert Created
cert.sh: Generate EC Cert Request for TestUser43 --------------------------
certutil -s "CN=TestUser43, E=TestUser43-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8483: Generate EC Cert Request for TestUser43 - PASSED
cert.sh: Sign TestUser43's EC Request --------------------------
certutil -C -c TestCA-ec -m 43 -v 60 -d ../CA -i req -o TestUser43-ec.cert -f ../tests.pw 
cert.sh: #8484: Sign TestUser43's EC Request - PASSED
cert.sh: Import TestUser43's EC Cert --------------------------
certutil -A -n TestUser43-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser43-ec.cert
cert.sh: #8485: Import TestUser43's EC Cert - PASSED
cert.sh SUCCESS: TestUser43's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser43 --------------------------
certutil -s "CN=TestUser43, E=TestUser43-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8486: Generate mixed EC Cert Request for TestUser43 - PASSED
cert.sh: Sign TestUser43's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10043 -v 60 -d ../CA -i req -o TestUser43-ecmixed.cert -f ../tests.pw 
cert.sh: #8487: Sign TestUser43's EC Request with RSA - PASSED
cert.sh: Import TestUser43's mixed EC Cert --------------------------
certutil -A -n TestUser43-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser43-ecmixed.cert
cert.sh: #8488: Import TestUser43's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser43's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser44 --------------------------
certutil -s "CN=TestUser44, E=TestUser44@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8489: Generate Cert Request for TestUser44 - PASSED
cert.sh: Sign TestUser44's Request --------------------------
certutil -C -c TestCA -m 44 -v 60 -d ../CA -i req -o TestUser44.cert -f ../tests.pw 
cert.sh: #8490: Sign TestUser44's Request - PASSED
cert.sh: Import TestUser44's Cert --------------------------
certutil -A -n TestUser44 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser44.cert
cert.sh: #8491: Import TestUser44's Cert - PASSED
cert.sh SUCCESS: TestUser44's Cert Created
cert.sh: Generate EC Cert Request for TestUser44 --------------------------
certutil -s "CN=TestUser44, E=TestUser44-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8492: Generate EC Cert Request for TestUser44 - PASSED
cert.sh: Sign TestUser44's EC Request --------------------------
certutil -C -c TestCA-ec -m 44 -v 60 -d ../CA -i req -o TestUser44-ec.cert -f ../tests.pw 
cert.sh: #8493: Sign TestUser44's EC Request - PASSED
cert.sh: Import TestUser44's EC Cert --------------------------
certutil -A -n TestUser44-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser44-ec.cert
cert.sh: #8494: Import TestUser44's EC Cert - PASSED
cert.sh SUCCESS: TestUser44's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser44 --------------------------
certutil -s "CN=TestUser44, E=TestUser44-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8495: Generate mixed EC Cert Request for TestUser44 - PASSED
cert.sh: Sign TestUser44's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10044 -v 60 -d ../CA -i req -o TestUser44-ecmixed.cert -f ../tests.pw 
cert.sh: #8496: Sign TestUser44's EC Request with RSA - PASSED
cert.sh: Import TestUser44's mixed EC Cert --------------------------
certutil -A -n TestUser44-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser44-ecmixed.cert
cert.sh: #8497: Import TestUser44's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser44's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser45 --------------------------
certutil -s "CN=TestUser45, E=TestUser45@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8498: Generate Cert Request for TestUser45 - PASSED
cert.sh: Sign TestUser45's Request --------------------------
certutil -C -c TestCA -m 45 -v 60 -d ../CA -i req -o TestUser45.cert -f ../tests.pw 
cert.sh: #8499: Sign TestUser45's Request - PASSED
cert.sh: Import TestUser45's Cert --------------------------
certutil -A -n TestUser45 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser45.cert
cert.sh: #8500: Import TestUser45's Cert - PASSED
cert.sh SUCCESS: TestUser45's Cert Created
cert.sh: Generate EC Cert Request for TestUser45 --------------------------
certutil -s "CN=TestUser45, E=TestUser45-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8501: Generate EC Cert Request for TestUser45 - PASSED
cert.sh: Sign TestUser45's EC Request --------------------------
certutil -C -c TestCA-ec -m 45 -v 60 -d ../CA -i req -o TestUser45-ec.cert -f ../tests.pw 
cert.sh: #8502: Sign TestUser45's EC Request - PASSED
cert.sh: Import TestUser45's EC Cert --------------------------
certutil -A -n TestUser45-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser45-ec.cert
cert.sh: #8503: Import TestUser45's EC Cert - PASSED
cert.sh SUCCESS: TestUser45's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser45 --------------------------
certutil -s "CN=TestUser45, E=TestUser45-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8504: Generate mixed EC Cert Request for TestUser45 - PASSED
cert.sh: Sign TestUser45's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10045 -v 60 -d ../CA -i req -o TestUser45-ecmixed.cert -f ../tests.pw 
cert.sh: #8505: Sign TestUser45's EC Request with RSA - PASSED
cert.sh: Import TestUser45's mixed EC Cert --------------------------
certutil -A -n TestUser45-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser45-ecmixed.cert
cert.sh: #8506: Import TestUser45's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser45's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser46 --------------------------
certutil -s "CN=TestUser46, E=TestUser46@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8507: Generate Cert Request for TestUser46 - PASSED
cert.sh: Sign TestUser46's Request --------------------------
certutil -C -c TestCA -m 46 -v 60 -d ../CA -i req -o TestUser46.cert -f ../tests.pw 
cert.sh: #8508: Sign TestUser46's Request - PASSED
cert.sh: Import TestUser46's Cert --------------------------
certutil -A -n TestUser46 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser46.cert
cert.sh: #8509: Import TestUser46's Cert - PASSED
cert.sh SUCCESS: TestUser46's Cert Created
cert.sh: Generate EC Cert Request for TestUser46 --------------------------
certutil -s "CN=TestUser46, E=TestUser46-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8510: Generate EC Cert Request for TestUser46 - PASSED
cert.sh: Sign TestUser46's EC Request --------------------------
certutil -C -c TestCA-ec -m 46 -v 60 -d ../CA -i req -o TestUser46-ec.cert -f ../tests.pw 
cert.sh: #8511: Sign TestUser46's EC Request - PASSED
cert.sh: Import TestUser46's EC Cert --------------------------
certutil -A -n TestUser46-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser46-ec.cert
cert.sh: #8512: Import TestUser46's EC Cert - PASSED
cert.sh SUCCESS: TestUser46's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser46 --------------------------
certutil -s "CN=TestUser46, E=TestUser46-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8513: Generate mixed EC Cert Request for TestUser46 - PASSED
cert.sh: Sign TestUser46's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10046 -v 60 -d ../CA -i req -o TestUser46-ecmixed.cert -f ../tests.pw 
cert.sh: #8514: Sign TestUser46's EC Request with RSA - PASSED
cert.sh: Import TestUser46's mixed EC Cert --------------------------
certutil -A -n TestUser46-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser46-ecmixed.cert
cert.sh: #8515: Import TestUser46's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser46's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser47 --------------------------
certutil -s "CN=TestUser47, E=TestUser47@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8516: Generate Cert Request for TestUser47 - PASSED
cert.sh: Sign TestUser47's Request --------------------------
certutil -C -c TestCA -m 47 -v 60 -d ../CA -i req -o TestUser47.cert -f ../tests.pw 
cert.sh: #8517: Sign TestUser47's Request - PASSED
cert.sh: Import TestUser47's Cert --------------------------
certutil -A -n TestUser47 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser47.cert
cert.sh: #8518: Import TestUser47's Cert - PASSED
cert.sh SUCCESS: TestUser47's Cert Created
cert.sh: Generate EC Cert Request for TestUser47 --------------------------
certutil -s "CN=TestUser47, E=TestUser47-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8519: Generate EC Cert Request for TestUser47 - PASSED
cert.sh: Sign TestUser47's EC Request --------------------------
certutil -C -c TestCA-ec -m 47 -v 60 -d ../CA -i req -o TestUser47-ec.cert -f ../tests.pw 
cert.sh: #8520: Sign TestUser47's EC Request - PASSED
cert.sh: Import TestUser47's EC Cert --------------------------
certutil -A -n TestUser47-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser47-ec.cert
cert.sh: #8521: Import TestUser47's EC Cert - PASSED
cert.sh SUCCESS: TestUser47's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser47 --------------------------
certutil -s "CN=TestUser47, E=TestUser47-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8522: Generate mixed EC Cert Request for TestUser47 - PASSED
cert.sh: Sign TestUser47's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10047 -v 60 -d ../CA -i req -o TestUser47-ecmixed.cert -f ../tests.pw 
cert.sh: #8523: Sign TestUser47's EC Request with RSA - PASSED
cert.sh: Import TestUser47's mixed EC Cert --------------------------
certutil -A -n TestUser47-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser47-ecmixed.cert
cert.sh: #8524: Import TestUser47's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser47's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser48 --------------------------
certutil -s "CN=TestUser48, E=TestUser48@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8525: Generate Cert Request for TestUser48 - PASSED
cert.sh: Sign TestUser48's Request --------------------------
certutil -C -c TestCA -m 48 -v 60 -d ../CA -i req -o TestUser48.cert -f ../tests.pw 
cert.sh: #8526: Sign TestUser48's Request - PASSED
cert.sh: Import TestUser48's Cert --------------------------
certutil -A -n TestUser48 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser48.cert
cert.sh: #8527: Import TestUser48's Cert - PASSED
cert.sh SUCCESS: TestUser48's Cert Created
cert.sh: Generate EC Cert Request for TestUser48 --------------------------
certutil -s "CN=TestUser48, E=TestUser48-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8528: Generate EC Cert Request for TestUser48 - PASSED
cert.sh: Sign TestUser48's EC Request --------------------------
certutil -C -c TestCA-ec -m 48 -v 60 -d ../CA -i req -o TestUser48-ec.cert -f ../tests.pw 
cert.sh: #8529: Sign TestUser48's EC Request - PASSED
cert.sh: Import TestUser48's EC Cert --------------------------
certutil -A -n TestUser48-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser48-ec.cert
cert.sh: #8530: Import TestUser48's EC Cert - PASSED
cert.sh SUCCESS: TestUser48's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser48 --------------------------
certutil -s "CN=TestUser48, E=TestUser48-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8531: Generate mixed EC Cert Request for TestUser48 - PASSED
cert.sh: Sign TestUser48's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10048 -v 60 -d ../CA -i req -o TestUser48-ecmixed.cert -f ../tests.pw 
cert.sh: #8532: Sign TestUser48's EC Request with RSA - PASSED
cert.sh: Import TestUser48's mixed EC Cert --------------------------
certutil -A -n TestUser48-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser48-ecmixed.cert
cert.sh: #8533: Import TestUser48's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser48's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser49 --------------------------
certutil -s "CN=TestUser49, E=TestUser49@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8534: Generate Cert Request for TestUser49 - PASSED
cert.sh: Sign TestUser49's Request --------------------------
certutil -C -c TestCA -m 49 -v 60 -d ../CA -i req -o TestUser49.cert -f ../tests.pw 
cert.sh: #8535: Sign TestUser49's Request - PASSED
cert.sh: Import TestUser49's Cert --------------------------
certutil -A -n TestUser49 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser49.cert
cert.sh: #8536: Import TestUser49's Cert - PASSED
cert.sh SUCCESS: TestUser49's Cert Created
cert.sh: Generate EC Cert Request for TestUser49 --------------------------
certutil -s "CN=TestUser49, E=TestUser49-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8537: Generate EC Cert Request for TestUser49 - PASSED
cert.sh: Sign TestUser49's EC Request --------------------------
certutil -C -c TestCA-ec -m 49 -v 60 -d ../CA -i req -o TestUser49-ec.cert -f ../tests.pw 
cert.sh: #8538: Sign TestUser49's EC Request - PASSED
cert.sh: Import TestUser49's EC Cert --------------------------
certutil -A -n TestUser49-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser49-ec.cert
cert.sh: #8539: Import TestUser49's EC Cert - PASSED
cert.sh SUCCESS: TestUser49's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser49 --------------------------
certutil -s "CN=TestUser49, E=TestUser49-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8540: Generate mixed EC Cert Request for TestUser49 - PASSED
cert.sh: Sign TestUser49's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10049 -v 60 -d ../CA -i req -o TestUser49-ecmixed.cert -f ../tests.pw 
cert.sh: #8541: Sign TestUser49's EC Request with RSA - PASSED
cert.sh: Import TestUser49's mixed EC Cert --------------------------
certutil -A -n TestUser49-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser49-ecmixed.cert
cert.sh: #8542: Import TestUser49's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser49's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser50 --------------------------
certutil -s "CN=TestUser50, E=TestUser50@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8543: Generate Cert Request for TestUser50 - PASSED
cert.sh: Sign TestUser50's Request --------------------------
certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o TestUser50.cert -f ../tests.pw 
cert.sh: #8544: Sign TestUser50's Request - PASSED
cert.sh: Import TestUser50's Cert --------------------------
certutil -A -n TestUser50 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser50.cert
cert.sh: #8545: Import TestUser50's Cert - PASSED
cert.sh SUCCESS: TestUser50's Cert Created
cert.sh: Generate EC Cert Request for TestUser50 --------------------------
certutil -s "CN=TestUser50, E=TestUser50-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8546: Generate EC Cert Request for TestUser50 - PASSED
cert.sh: Sign TestUser50's EC Request --------------------------
certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o TestUser50-ec.cert -f ../tests.pw 
cert.sh: #8547: Sign TestUser50's EC Request - PASSED
cert.sh: Import TestUser50's EC Cert --------------------------
certutil -A -n TestUser50-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser50-ec.cert
cert.sh: #8548: Import TestUser50's EC Cert - PASSED
cert.sh SUCCESS: TestUser50's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser50 --------------------------
certutil -s "CN=TestUser50, E=TestUser50-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8549: Generate mixed EC Cert Request for TestUser50 - PASSED
cert.sh: Sign TestUser50's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o TestUser50-ecmixed.cert -f ../tests.pw 
cert.sh: #8550: Sign TestUser50's EC Request with RSA - PASSED
cert.sh: Import TestUser50's mixed EC Cert --------------------------
certutil -A -n TestUser50-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser50-ecmixed.cert
cert.sh: #8551: Import TestUser50's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser50's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser51 --------------------------
certutil -s "CN=TestUser51, E=TestUser51@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8552: Generate Cert Request for TestUser51 - PASSED
cert.sh: Sign TestUser51's Request --------------------------
certutil -C -c TestCA -m 51 -v 60 -d ../CA -i req -o TestUser51.cert -f ../tests.pw 
cert.sh: #8553: Sign TestUser51's Request - PASSED
cert.sh: Import TestUser51's Cert --------------------------
certutil -A -n TestUser51 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser51.cert
cert.sh: #8554: Import TestUser51's Cert - PASSED
cert.sh SUCCESS: TestUser51's Cert Created
cert.sh: Generate EC Cert Request for TestUser51 --------------------------
certutil -s "CN=TestUser51, E=TestUser51-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8555: Generate EC Cert Request for TestUser51 - PASSED
cert.sh: Sign TestUser51's EC Request --------------------------
certutil -C -c TestCA-ec -m 51 -v 60 -d ../CA -i req -o TestUser51-ec.cert -f ../tests.pw 
cert.sh: #8556: Sign TestUser51's EC Request - PASSED
cert.sh: Import TestUser51's EC Cert --------------------------
certutil -A -n TestUser51-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser51-ec.cert
cert.sh: #8557: Import TestUser51's EC Cert - PASSED
cert.sh SUCCESS: TestUser51's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser51 --------------------------
certutil -s "CN=TestUser51, E=TestUser51-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8558: Generate mixed EC Cert Request for TestUser51 - PASSED
cert.sh: Sign TestUser51's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10051 -v 60 -d ../CA -i req -o TestUser51-ecmixed.cert -f ../tests.pw 
cert.sh: #8559: Sign TestUser51's EC Request with RSA - PASSED
cert.sh: Import TestUser51's mixed EC Cert --------------------------
certutil -A -n TestUser51-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser51-ecmixed.cert
cert.sh: #8560: Import TestUser51's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser51's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser52 --------------------------
certutil -s "CN=TestUser52, E=TestUser52@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8561: Generate Cert Request for TestUser52 - PASSED
cert.sh: Sign TestUser52's Request --------------------------
certutil -C -c TestCA -m 52 -v 60 -d ../CA -i req -o TestUser52.cert -f ../tests.pw 
cert.sh: #8562: Sign TestUser52's Request - PASSED
cert.sh: Import TestUser52's Cert --------------------------
certutil -A -n TestUser52 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser52.cert
cert.sh: #8563: Import TestUser52's Cert - PASSED
cert.sh SUCCESS: TestUser52's Cert Created
cert.sh: Generate EC Cert Request for TestUser52 --------------------------
certutil -s "CN=TestUser52, E=TestUser52-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8564: Generate EC Cert Request for TestUser52 - PASSED
cert.sh: Sign TestUser52's EC Request --------------------------
certutil -C -c TestCA-ec -m 52 -v 60 -d ../CA -i req -o TestUser52-ec.cert -f ../tests.pw 
cert.sh: #8565: Sign TestUser52's EC Request - PASSED
cert.sh: Import TestUser52's EC Cert --------------------------
certutil -A -n TestUser52-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser52-ec.cert
cert.sh: #8566: Import TestUser52's EC Cert - PASSED
cert.sh SUCCESS: TestUser52's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser52 --------------------------
certutil -s "CN=TestUser52, E=TestUser52-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8567: Generate mixed EC Cert Request for TestUser52 - PASSED
cert.sh: Sign TestUser52's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10052 -v 60 -d ../CA -i req -o TestUser52-ecmixed.cert -f ../tests.pw 
cert.sh: #8568: Sign TestUser52's EC Request with RSA - PASSED
cert.sh: Import TestUser52's mixed EC Cert --------------------------
certutil -A -n TestUser52-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser52-ecmixed.cert
cert.sh: #8569: Import TestUser52's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser52's mixed EC Cert Created
cert.sh: Creating CA CRL =====================================
cert.sh: Generating CRL for range 40-42 TestCA authority --------------------------
crlutil -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/CA -G -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or
cert.sh: #8570: Generating CRL for range 40-42 TestCA authority - PASSED
cert.sh: Generating CRL (ECC) for range 40-42 TestCA-ec authority --------------------------
crlutil -q -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/CA -G -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or-ec
cert.sh: #8571: Generating CRL (ECC) for range 40-42 TestCA-ec authority - PASSED
cert.sh: Modifying CA CRL by adding one more cert ============
cert.sh: Modify CRL by adding one more cert --------------------------
crlutil -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or1 -i ../server/root.crl_40-42_or
cert.sh: #8572: Modify CRL by adding one more cert - PASSED
cert.sh: Modify CRL (ECC) by adding one more cert --------------------------
crlutil -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or1-ec -i ../server/root.crl_40-42_or-ec
cert.sh: #8573: Modify CRL (ECC) by adding one more cert - PASSED
cert.sh: Modifying CA CRL by removing one cert ===============
cert.sh: Modify CRL by removing one cert --------------------------
crlutil -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1
cert.sh: #8574: Modify CRL by removing one cert - PASSED
cert.sh: Modify CRL (ECC) by removing one cert --------------------------
crlutil -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42-ec -i ../server/root.crl_40-42_or1-ec
cert.sh: #8575: Modify CRL (ECC) by removing one cert - PASSED
cert.sh: Creating CA CRL for groups 1 and 2  ===============
cert.sh: Creating CRL for groups 1 and 2 --------------------------
crlutil -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_43-48 -i ../server/root.crl_40-42
cert.sh: #8576: Creating CRL for groups 1 and 2 - PASSED
cert.sh: Creating CRL (ECC) for groups 1 and 2 --------------------------
crlutil -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_43-48-ec -i ../server/root.crl_40-42-ec
cert.sh: #8577: Creating CRL (ECC) for groups 1 and 2 - PASSED
cert.sh: Creating CA CRL for groups 1, 2 and 3  ===============
cert.sh: Creating CRL for groups 1, 2 and 3 --------------------------
crlutil -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_49-52 -i ../server/root.crl_43-48
cert.sh: #8578: Creating CRL for groups 1, 2 and 3 - PASSED
cert.sh: Creating CRL (ECC) for groups 1, 2 and 3 --------------------------
crlutil -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_49-52-ec -i ../server/root.crl_43-48-ec
cert.sh: #8579: Creating CRL (ECC) for groups 1, 2 and 3 - PASSED
cert.sh: Importing Server CA Issued CRL for certs  trough 52
cert.sh: Importing CRL for groups 1 --------------------------
crlutil -q -D -n TestCA -f ../tests.pw -d ../server
crlutil: could not find TestCA's CRL: No matching CRL was found.
crlutil: could not find the issuer TestCA's CRL: No matching CRL was found.
cert.sh: #8580: Importing CRL for groups 1 - PASSED
cert.sh: Importing CRL for groups 1 --------------------------
crlutil -q -I -i ../server/root.crl_40-42 -n TestCA -f ../tests.pw -d ../server
cert.sh: #8581: Importing CRL for groups 1 - PASSED
cert.sh: Importing CRL (ECC) for groups 1 --------------------------
crlutil -q -D -n TestCA-ec -f ../tests.pw -d ../server
crlutil: could not find TestCA-ec's CRL: No matching CRL was found.
crlutil: could not find the issuer TestCA-ec's CRL: No matching CRL was found.
cert.sh: #8582: Importing CRL (ECC) for groups 1 - PASSED
cert.sh: Importing CRL (ECC) for groups 1 --------------------------
crlutil -q -I -i ../server/root.crl_40-42-ec -n TestCA-ec -f ../tests.pw -d ../server
cert.sh: #8583: Importing CRL (ECC) for groups 1 - PASSED
cert.sh SUCCESS: SSL CRL prep passed
cert.sh cert.sh: finished cert.sh
TIMESTAMP cert END: Wed Nov 28 11:22:48 EST 2012
Running tests for dbtests
TIMESTAMP dbtests BEGIN: Wed Nov 28 11:22:48 EST 2012
dbtests.sh: CERT and Key DB Tests ===============================

---------------------------------------------------------------
| test opening the database read/write in a nonexisting directory
---------------------------------------------------------------
certutil: function failed: security library: bad database.
dbtests.sh: #8584: Certutil didn't work in a nonexisting dir 255 - PASSED
dbdir selected is ./non_existent_dir

ERROR: Directory "./non_existent_dir" does not exist.
dbtest: function failed: security library: bad database.
dbtests.sh: #8585: Dbtest readonly didn't work in a nonexisting dir 46 - PASSED

---------------------------------------------------------------
| test force opening the database in a nonexisting directory
---------------------------------------------------------------
dbdir selected is ./non_existent_dir

ERROR: Directory "./non_existent_dir" does not exist.
dbtests.sh: #8586: Dbtest force succeeded in a nonexisting dir 0 - PASSED

---------------------------------------------------------------
| test opening the database readonly in an empty directory
---------------------------------------------------------------
tstclnt: unable to open cert database: security library: bad database.
dbtests.sh: #8587: Tstclnt didn't work in an empty dir 1 - PASSED
dbdir selected is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/emptydir

database checked is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/emptydir/secmod.db
ERROR: File "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/emptydir/secmod.db" does not exist.
database checked is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/emptydir/cert8.db
ERROR: File "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/emptydir/cert8.db" does not exist.
database checked is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/emptydir/key3.db
ERROR: File "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/emptydir/key3.db" does not exist.
dbtest: function failed: security library: bad database.
dbtests.sh: #8588: Dbtest readonly didn't work in an empty dir 46 - PASSED
dbdir selected is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/emptydir

dbtests.sh: #8589: Dbtest logout after empty DB Init has key - PASSED
dbdir selected is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/emptydir

dbtests.sh: #8590: Dbtest password DB Init maintains needlogin state - PASSED
certutil: could not find certificate named "xxxx": Unrecognized Object Identifier.
dbtests.sh: #8591: Certutil didn't work in an empty dir 255 - PASSED

---------------------------------------------------------------
| test force opening the database  readonly in a empty directory
---------------------------------------------------------------
dbdir selected is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/emptydir

database checked is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/emptydir/secmod.db
ERROR: File "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/emptydir/secmod.db" does not exist.
database checked is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/emptydir/cert8.db
ERROR: File "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/emptydir/cert8.db" does not exist.
database checked is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/emptydir/key3.db
ERROR: File "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/emptydir/key3.db" does not exist.
dbtests.sh: #8592: Dbtest force readonly succeeded in an empty dir 0 - PASSED

---------------------------------------------------------------
| test opening the database r/w in a readonly directory
---------------------------------------------------------------
dbdir selected is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/ronlydir

ERROR: Directory "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/ronlydir" is not writeable.
database checked is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/ronlydir/secmod.db
ERROR: File "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/ronlydir/secmod.db" does not exist.
database checked is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/ronlydir/cert8.db
ERROR: File "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/ronlydir/cert8.db" does not exist.
database checked is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/ronlydir/key3.db
ERROR: File "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/ronlydir/key3.db" does not exist.
dbtest: function failed: security library: invalid arguments.
dbtests.sh: #8593: Dbtest r/w didn't work in an readonly dir 46 - PASSED
certutil: could not find certificate named "TestUser": Unrecognized Object Identifier.
dbtests.sh: #8594: Certutil didn't work in an readonly dir 255 - PASSED

---------------------------------------------------------------
| test opening the database ronly in a readonly directory
---------------------------------------------------------------
dbdir selected is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/ronlydir

database checked is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/ronlydir/secmod.db
ERROR: File "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/ronlydir/secmod.db" does not exist.
database checked is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/ronlydir/cert8.db
ERROR: File "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/ronlydir/cert8.db" does not exist.
database checked is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/ronlydir/key3.db
ERROR: File "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/ronlydir/key3.db" does not exist.
dbtests.sh: #8595: Dbtest readonly succeeded in a readonly dir 0 - PASSED

---------------------------------------------------------------
| test force opening the database  r/w in a readonly directory
---------------------------------------------------------------
dbdir selected is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/ronlydir

ERROR: Directory "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/ronlydir" is not writeable.
database checked is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/ronlydir/secmod.db
ERROR: File "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/ronlydir/secmod.db" does not exist.
database checked is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/ronlydir/cert8.db
ERROR: File "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/ronlydir/cert8.db" does not exist.
database checked is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/ronlydir/key3.db
ERROR: File "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/ronlydir/key3.db" does not exist.
dbtests.sh: #8596: Dbtest force succeeded in a readonly dir 0 - PASSED

---------------------------------------------------------------
| ls -l /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/ronlydir
---------------------------------------------------------------
dr-xr-xr-x. 2 tinderbox tinderbox  4096 Nov 28 11:22 /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/ronlydir
-r--------. 1 tinderbox tinderbox 95232 Nov 28 11:22 /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/ronlydir/cert9.db
-r--------. 1 tinderbox tinderbox 58368 Nov 28 11:22 /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/ronlydir/key4.db
-r--------. 1 tinderbox tinderbox   718 Nov 28 11:22 /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/ronlydir/pkcs11.txt
-r--r-----. 1 tinderbox tinderbox   392 Nov 28 11:22 /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/ronlydir/req
-r--r-----. 1 tinderbox tinderbox   609 Nov 28 11:22 /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/ronlydir/TestUser.cert
-r--r-----. 1 tinderbox tinderbox   578 Nov 28 11:22 /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/ronlydir/TestUser-ec.cert
-r--r-----. 1 tinderbox tinderbox   576 Nov 28 11:22 /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/ronlydir/TestUser-ecmixed.cert

---------------------------------------------------------------
| test creating a new cert with a conflicting nickname
---------------------------------------------------------------
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/conflictdir
certutil: could not add certificate to token or database: Error adding certificate to database.
dbtests.sh: #8597: Nicknane conflict test, could not import conflict nickname 255 - PASSED

---------------------------------------------------------------
| test importing an old cert to a conflicting nickname
---------------------------------------------------------------
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 40 (0x28)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:19:06 2012
            Not After : Tue Nov 28 16:19:06 2017
        Subject: "CN=Bob,E=Bob@bogus.com,O=BOGUS NSS,L=Mountain View,ST=Calif
            ornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b2:fe:e8:54:f6:72:ea:ca:fd:a0:8a:b6:34:02:86:0e:
                    f2:8c:e9:eb:5a:6b:cb:b5:5c:9c:a0:e7:7a:4a:04:16:
                    b6:3a:0b:78:57:5d:90:c9:51:ad:04:2d:cf:3f:ec:3b:
                    c0:3f:93:75:dc:6f:b9:70:d4:00:94:c1:17:39:29:ba:
                    93:60:16:35:27:20:24:7b:bf:eb:25:91:c9:f6:0d:49:
                    d9:4c:d0:15:3f:1e:e7:ef:29:d9:cf:3f:0b:96:c5:bf:
                    52:c8:e0:6c:24:84:55:40:5a:b6:8d:6b:2c:91:a1:db:
                    a1:16:09:5b:1e:8d:d1:3f:3c:71:8d:eb:09:20:5c:41
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        11:c1:1e:c3:b9:9d:c7:1e:b9:6a:0f:92:ec:15:2a:95:
        83:f4:c9:e5:32:c6:ea:b7:92:b5:58:42:71:61:99:a0:
        b4:ad:b1:30:b6:c6:8b:d5:20:55:46:fe:9e:c7:36:91:
        32:0f:9f:36:b8:41:18:24:ed:88:42:06:c8:67:32:8f:
        8a:66:52:66:48:8b:93:21:43:11:29:bc:c7:f2:4e:75:
        b1:2e:9d:0a:1f:8c:60:81:92:bc:46:fb:23:67:5c:f3:
        3c:9b:a3:d5:ce:ab:02:59:a7:4f:7e:74:e6:d9:56:ec:
        b2:f5:f5:a3:a5:a9:34:04:64:05:a3:04:09:ad:d7:01
    Fingerprint (MD5):
        D7:5B:E7:64:36:9A:07:CC:B4:03:4E:BC:24:3F:65:56
    Fingerprint (SHA1):
        1E:58:F8:9C:15:80:45:05:56:72:E8:66:07:85:C7:DD:FF:DA:47:3A

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

dbtests.sh: #8598: Nicknane conflict test-setting nickname conflict was correctly rejected - PASSED
TIMESTAMP dbtests END: Wed Nov 28 11:22:52 EST 2012
Running tests for tools
TIMESTAMP tools BEGIN: Wed Nov 28 11:22:52 EST 2012
tools.sh: Tools Tests with ECC ===============================
tools.sh: Exporting Alice's email cert & key - default ciphers
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8599: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                72:d5:d7:17:60:46:ed:a4:b9:d0:97:4c:3e:d0:a0:0b
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:18:03 2012
            Not After : Tue Nov 28 16:18:03 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:e9:64:95:bb:eb:65:9a:03:e1:3f:e2:a9:8a:8b:76:
                    15:cd:13:07:7a:34:c8:39:2b:31:77:67:3f:d9:20:9b:
                    d2:68:3d:31:91:b7:73:f0:f1:46:eb:8c:ca:e9:18:3c:
                    59:dc:9f:13:aa:78:18:20:93:36:ae:72:ad:d9:12:2c:
                    02:01:d8:04:6e:84:fa:e7:07:0c:0a:33:20:ff:16:4d:
                    6a:13:af:29:d9:5d:30:0d:f7:82:4c:67:51:06:d0:0f:
                    b1:66:a5:a7:f4:42:2b:85:15:4c:57:bd:20:f7:23:a7:
                    a8:ec:83:f1:18:d2:8d:b8:32:c6:6a:89:08:4e:79:81
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        35:e8:a2:8f:ac:27:ea:19:d7:df:77:ed:c7:08:e8:90:
        9d:e9:7d:ba:1f:de:07:33:28:72:89:5b:a0:70:ed:7e:
        a3:b1:24:01:13:9c:72:2b:42:37:80:4f:77:b4:43:a9:
        d5:d4:79:10:c3:33:21:ee:f0:5a:4e:a7:03:e0:48:6d:
        1a:7e:5d:af:f9:bb:5f:96:94:8d:70:ee:b7:0a:a4:4f:
        30:9b:b0:15:2e:44:2f:da:12:fc:42:5d:fc:7a:13:73:
        2b:8e:f5:7c:70:11:e1:c4:2f:bf:33:33:9c:16:22:34:
        b7:83:7d:b1:86:5f:23:bd:be:dc:7a:ef:63:4d:d8:66
    Fingerprint (MD5):
        24:C3:FA:7B:B8:87:9E:56:B4:F6:44:8E:C6:12:2F:CE
    Fingerprint (SHA1):
        44:0F:DE:39:C3:51:19:48:3B:F9:DB:9A:8B:D8:0F:D8:5A:E1:80:81

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:19:01 2012
            Not After : Tue Nov 28 16:19:01 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:02:34:c6:22:e9:c3:5e:71:e7:50:e0:14:88:76:ec:
                    b1:f5:d9:3c:84:33:7b:83:fc:f6:46:2e:89:ec:0a:28:
                    b0:68:65:15:e1:90:68:97:28:fc:4d:a3:62:5a:5f:2d:
                    b7:70:80:3c:a4:ab:77:b1:81:86:1b:57:56:d4:b0:b8:
                    e2:b0:3a:fb:52:4a:65:79:1a:3f:32:7b:65:1a:70:95:
                    27:25:b7:9f:64:fc:71:f7:57:fc:c8:2b:51:2e:59:3f:
                    9a:72:55:36:75:64:2e:cb:a6:4e:c1:04:88:cd:c2:21:
                    81:a7:84:a7:51:dd:0b:d1:ea:13:59:98:e0:2c:a7:2f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3c:bd:f7:7d:4a:07:d0:8f:85:7b:33:08:9b:e9:0b:4d:
        32:97:64:93:1e:4c:f9:67:fd:e7:30:09:c3:63:7e:53:
        2e:8f:b2:29:4c:38:c1:ec:d9:a0:a1:a7:a7:43:64:d3:
        92:8e:37:3a:5d:61:45:4a:3d:9d:a0:eb:16:fc:21:f4:
        11:72:4a:93:9b:3c:a9:79:85:34:c5:c6:ec:9b:cd:63:
        d5:3f:0b:2d:8c:38:76:f0:b5:e1:45:16:99:bd:fe:c2:
        8b:6e:52:1e:c8:ac:97:61:e7:a6:e3:7b:71:49:da:dd:
        d8:f8:97:81:a7:8c:80:78:5e:10:76:b3:f1:a2:d3:61
    Fingerprint (MD5):
        C4:19:41:C1:F0:A4:87:00:8A:A8:03:6D:35:55:15:1C
    Fingerprint (SHA1):
        EA:5D:4C:8E:49:5A:FE:58:A7:AC:8F:BC:1D:15:D4:FF:05:DA:91:A6

    Friendly Name: Alice

tools.sh: #8600: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8601: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's email EC cert & key---------------
pk12util -o Alice-ec.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \
         -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8602: Exporting Alice's email EC cert & key (pk12util -o)  - PASSED
tools.sh: Importing Alice's email EC cert & key --------------
pk12util -i Alice-ec.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8603: Importing Alice's email EC cert & key (pk12util -i)  - PASSED
tools.sh: Listing Alice's pk12 EC file -----------------
pk12util -l Alice-ec.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice-ec

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                0e:42:1e:06:db:87:4e:70:7e:b0:8a:b7:e2:f7:87:22
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: X9.62 ECDSA signature with SHA-1
        Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ
            ia,C=US"
        Validity:
            Not Before: Wed Nov 28 16:18:14 2012
            Not After : Tue Nov 28 16:18:14 2062
        Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor
            nia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: X9.62 elliptic curve public key
                Args:
                    06:05:2b:81:04:00:23
            EC Public Key:
                PublicValue:
                    04:01:c7:ab:a2:66:b6:9b:08:75:16:9d:3e:94:2f:0a:
                    af:0e:01:6a:fd:96:bb:21:ce:17:6f:0a:f7:3d:3b:95:
                    f2:44:31:10:4f:68:6c:13:9c:a9:1a:84:a9:d4:d9:b5:
                    2b:a9:b6:25:50:4c:ab:e7:8d:07:86:68:97:6b:d1:01:
                    3f:37:d2:00:cf:bc:5a:bd:20:ec:89:06:05:27:da:c2:
                    9f:ee:9b:7c:37:b5:e1:d9:42:c9:9c:00:0e:1b:25:07:
                    35:84:eb:60:45:06:10:f1:79:ba:ca:52:42:06:b2:c7:
                    88:b6:cb:81:ae:40:b0:f7:b0:15:7b:d0:57:0b:b0:6b:
                    c9:4e:f5:ca:49
                Curve: SECG elliptic curve secp521r1 (aka NIST P-521)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: X9.62 ECDSA signature with SHA-1
    Signature:
        30:81:88:02:42:01:cc:55:75:eb:6f:e1:41:2e:c6:c9:
        bc:d9:d7:e3:50:ef:6d:e0:9f:71:82:57:a5:28:e7:2b:
        3a:70:5b:d0:09:a4:41:20:cb:25:1c:55:0c:37:ce:bf:
        0e:3a:28:f1:15:00:83:a9:0e:7b:38:af:e6:c2:6d:fe:
        43:70:5e:81:65:8f:46:02:42:00:b7:cb:a9:5a:f5:5a:
        23:37:91:9d:ac:eb:8f:0b:60:17:cc:76:0f:f6:eb:39:
        3d:8d:35:0a:e2:e7:a4:25:87:ac:b7:67:79:2a:bd:73:
        66:93:62:c4:97:7c:c9:c0:25:5c:1c:15:c0:6d:b4:ff:
        91:08:7a:eb:02:14:fe:33:b5:58:7f
    Fingerprint (MD5):
        D1:C8:5D:AE:70:1B:C8:27:31:2C:49:EE:42:46:2C:32
    Fingerprint (SHA1):
        F3:B6:6E:47:2B:7A:51:04:0A:BA:D6:71:58:5C:C4:EB:36:FF:EB:66

    Friendly Name: TestCA-ec

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: X9.62 ECDSA signature with SHA-1
        Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ
            ia,C=US"
        Validity:
            Not Before: Wed Nov 28 16:19:02 2012
            Not After : Tue Nov 28 16:19:02 2017
        Subject: "CN=Alice,E=Alice-ec@bogus.com,O=BOGUS NSS,L=Mountain View,S
            T=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: X9.62 elliptic curve public key
                Args:
                    06:05:2b:81:04:00:22
            EC Public Key:
                PublicValue:
                    04:1f:86:7e:6a:9b:07:4d:5d:fc:34:f5:22:43:fc:d2:
                    b4:65:2d:db:ff:d5:6d:27:db:28:c9:8b:5c:32:b0:cb:
                    86:f1:3b:60:fc:43:84:0c:8c:e5:08:ce:d4:55:d3:75:
                    c7:9d:11:4b:00:7d:13:fa:64:23:fe:d0:69:1c:c2:a7:
                    15:d2:8f:7f:2f:5b:8e:1a:f1:8b:c2:c3:e1:df:73:2b:
                    4f:ac:85:de:8c:c4:40:89:0a:15:cb:ca:43:71:91:09:
                    a1
                Curve: SECG elliptic curve secp384r1 (aka NIST P-384)
    Signature Algorithm: X9.62 ECDSA signature with SHA-1
    Signature:
        30:81:88:02:42:00:b8:20:bf:33:ca:2c:85:8f:7f:2c:
        39:0c:1f:24:78:68:96:23:84:4d:69:e6:ca:a6:25:af:
        a6:cd:89:e9:d3:d2:ba:ce:b3:95:87:1b:dc:12:c5:af:
        d1:0e:fd:b1:e3:56:a9:92:24:b9:07:d9:03:c4:71:99:
        c1:4d:e1:1b:77:f3:14:02:42:01:e1:9a:d4:da:5d:4c:
        2e:17:db:37:32:f6:b2:d9:35:ae:15:33:96:d0:87:97:
        55:8b:f2:9c:fe:ca:00:6a:96:a8:06:af:2b:65:c2:03:
        de:cc:c3:02:b9:9d:71:0a:eb:4b:48:99:58:a1:d7:25:
        79:80:82:f8:92:a8:df:1c:57:dd:9f
    Fingerprint (MD5):
        E6:10:30:2D:E9:CF:6F:28:1E:79:0A:4D:35:52:E7:F7
    Fingerprint (SHA1):
        6B:21:A2:EC:E5:EC:B2:3E:BC:44:E0:62:9F:51:A2:1E:CF:1F:F0:5E

    Friendly Name: Alice-ec

tools.sh: #8604: Listing Alice's pk12 EC file (pk12util -l)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c RC2-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8605: Exporting with [RC2-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC
        Parameters:
            Salt:
                32:32:70:54:b1:60:17:4e:a7:99:a4:eb:9d:64:70:9e
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:18:03 2012
            Not After : Tue Nov 28 16:18:03 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:e9:64:95:bb:eb:65:9a:03:e1:3f:e2:a9:8a:8b:76:
                    15:cd:13:07:7a:34:c8:39:2b:31:77:67:3f:d9:20:9b:
                    d2:68:3d:31:91:b7:73:f0:f1:46:eb:8c:ca:e9:18:3c:
                    59:dc:9f:13:aa:78:18:20:93:36:ae:72:ad:d9:12:2c:
                    02:01:d8:04:6e:84:fa:e7:07:0c:0a:33:20:ff:16:4d:
                    6a:13:af:29:d9:5d:30:0d:f7:82:4c:67:51:06:d0:0f:
                    b1:66:a5:a7:f4:42:2b:85:15:4c:57:bd:20:f7:23:a7:
                    a8:ec:83:f1:18:d2:8d:b8:32:c6:6a:89:08:4e:79:81
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        35:e8:a2:8f:ac:27:ea:19:d7:df:77:ed:c7:08:e8:90:
        9d:e9:7d:ba:1f:de:07:33:28:72:89:5b:a0:70:ed:7e:
        a3:b1:24:01:13:9c:72:2b:42:37:80:4f:77:b4:43:a9:
        d5:d4:79:10:c3:33:21:ee:f0:5a:4e:a7:03:e0:48:6d:
        1a:7e:5d:af:f9:bb:5f:96:94:8d:70:ee:b7:0a:a4:4f:
        30:9b:b0:15:2e:44:2f:da:12:fc:42:5d:fc:7a:13:73:
        2b:8e:f5:7c:70:11:e1:c4:2f:bf:33:33:9c:16:22:34:
        b7:83:7d:b1:86:5f:23:bd:be:dc:7a:ef:63:4d:d8:66
    Fingerprint (MD5):
        24:C3:FA:7B:B8:87:9E:56:B4:F6:44:8E:C6:12:2F:CE
    Fingerprint (SHA1):
        44:0F:DE:39:C3:51:19:48:3B:F9:DB:9A:8B:D8:0F:D8:5A:E1:80:81

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:19:01 2012
            Not After : Tue Nov 28 16:19:01 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:02:34:c6:22:e9:c3:5e:71:e7:50:e0:14:88:76:ec:
                    b1:f5:d9:3c:84:33:7b:83:fc:f6:46:2e:89:ec:0a:28:
                    b0:68:65:15:e1:90:68:97:28:fc:4d:a3:62:5a:5f:2d:
                    b7:70:80:3c:a4:ab:77:b1:81:86:1b:57:56:d4:b0:b8:
                    e2:b0:3a:fb:52:4a:65:79:1a:3f:32:7b:65:1a:70:95:
                    27:25:b7:9f:64:fc:71:f7:57:fc:c8:2b:51:2e:59:3f:
                    9a:72:55:36:75:64:2e:cb:a6:4e:c1:04:88:cd:c2:21:
                    81:a7:84:a7:51:dd:0b:d1:ea:13:59:98:e0:2c:a7:2f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3c:bd:f7:7d:4a:07:d0:8f:85:7b:33:08:9b:e9:0b:4d:
        32:97:64:93:1e:4c:f9:67:fd:e7:30:09:c3:63:7e:53:
        2e:8f:b2:29:4c:38:c1:ec:d9:a0:a1:a7:a7:43:64:d3:
        92:8e:37:3a:5d:61:45:4a:3d:9d:a0:eb:16:fc:21:f4:
        11:72:4a:93:9b:3c:a9:79:85:34:c5:c6:ec:9b:cd:63:
        d5:3f:0b:2d:8c:38:76:f0:b5:e1:45:16:99:bd:fe:c2:
        8b:6e:52:1e:c8:ac:97:61:e7:a6:e3:7b:71:49:da:dd:
        d8:f8:97:81:a7:8c:80:78:5e:10:76:b3:f1:a2:d3:61
    Fingerprint (MD5):
        C4:19:41:C1:F0:A4:87:00:8A:A8:03:6D:35:55:15:1C
    Fingerprint (SHA1):
        EA:5D:4C:8E:49:5A:FE:58:A7:AC:8F:BC:1D:15:D4:FF:05:DA:91:A6

    Friendly Name: Alice

tools.sh: #8606: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8607: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c RC2-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8608: Exporting with [RC2-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC
        Parameters:
            Salt:
                60:0b:9f:a1:a8:69:c9:f1:f9:d3:4d:b3:20:86:38:9a
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:18:03 2012
            Not After : Tue Nov 28 16:18:03 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:e9:64:95:bb:eb:65:9a:03:e1:3f:e2:a9:8a:8b:76:
                    15:cd:13:07:7a:34:c8:39:2b:31:77:67:3f:d9:20:9b:
                    d2:68:3d:31:91:b7:73:f0:f1:46:eb:8c:ca:e9:18:3c:
                    59:dc:9f:13:aa:78:18:20:93:36:ae:72:ad:d9:12:2c:
                    02:01:d8:04:6e:84:fa:e7:07:0c:0a:33:20:ff:16:4d:
                    6a:13:af:29:d9:5d:30:0d:f7:82:4c:67:51:06:d0:0f:
                    b1:66:a5:a7:f4:42:2b:85:15:4c:57:bd:20:f7:23:a7:
                    a8:ec:83:f1:18:d2:8d:b8:32:c6:6a:89:08:4e:79:81
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        35:e8:a2:8f:ac:27:ea:19:d7:df:77:ed:c7:08:e8:90:
        9d:e9:7d:ba:1f:de:07:33:28:72:89:5b:a0:70:ed:7e:
        a3:b1:24:01:13:9c:72:2b:42:37:80:4f:77:b4:43:a9:
        d5:d4:79:10:c3:33:21:ee:f0:5a:4e:a7:03:e0:48:6d:
        1a:7e:5d:af:f9:bb:5f:96:94:8d:70:ee:b7:0a:a4:4f:
        30:9b:b0:15:2e:44:2f:da:12:fc:42:5d:fc:7a:13:73:
        2b:8e:f5:7c:70:11:e1:c4:2f:bf:33:33:9c:16:22:34:
        b7:83:7d:b1:86:5f:23:bd:be:dc:7a:ef:63:4d:d8:66
    Fingerprint (MD5):
        24:C3:FA:7B:B8:87:9E:56:B4:F6:44:8E:C6:12:2F:CE
    Fingerprint (SHA1):
        44:0F:DE:39:C3:51:19:48:3B:F9:DB:9A:8B:D8:0F:D8:5A:E1:80:81

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:19:01 2012
            Not After : Tue Nov 28 16:19:01 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:02:34:c6:22:e9:c3:5e:71:e7:50:e0:14:88:76:ec:
                    b1:f5:d9:3c:84:33:7b:83:fc:f6:46:2e:89:ec:0a:28:
                    b0:68:65:15:e1:90:68:97:28:fc:4d:a3:62:5a:5f:2d:
                    b7:70:80:3c:a4:ab:77:b1:81:86:1b:57:56:d4:b0:b8:
                    e2:b0:3a:fb:52:4a:65:79:1a:3f:32:7b:65:1a:70:95:
                    27:25:b7:9f:64:fc:71:f7:57:fc:c8:2b:51:2e:59:3f:
                    9a:72:55:36:75:64:2e:cb:a6:4e:c1:04:88:cd:c2:21:
                    81:a7:84:a7:51:dd:0b:d1:ea:13:59:98:e0:2c:a7:2f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3c:bd:f7:7d:4a:07:d0:8f:85:7b:33:08:9b:e9:0b:4d:
        32:97:64:93:1e:4c:f9:67:fd:e7:30:09:c3:63:7e:53:
        2e:8f:b2:29:4c:38:c1:ec:d9:a0:a1:a7:a7:43:64:d3:
        92:8e:37:3a:5d:61:45:4a:3d:9d:a0:eb:16:fc:21:f4:
        11:72:4a:93:9b:3c:a9:79:85:34:c5:c6:ec:9b:cd:63:
        d5:3f:0b:2d:8c:38:76:f0:b5:e1:45:16:99:bd:fe:c2:
        8b:6e:52:1e:c8:ac:97:61:e7:a6:e3:7b:71:49:da:dd:
        d8:f8:97:81:a7:8c:80:78:5e:10:76:b3:f1:a2:d3:61
    Fingerprint (MD5):
        C4:19:41:C1:F0:A4:87:00:8A:A8:03:6D:35:55:15:1C
    Fingerprint (SHA1):
        EA:5D:4C:8E:49:5A:FE:58:A7:AC:8F:BC:1D:15:D4:FF:05:DA:91:A6

    Friendly Name: Alice

tools.sh: #8609: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8610: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c RC2-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8611: Exporting with [RC2-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:18:03 2012
            Not After : Tue Nov 28 16:18:03 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:e9:64:95:bb:eb:65:9a:03:e1:3f:e2:a9:8a:8b:76:
                    15:cd:13:07:7a:34:c8:39:2b:31:77:67:3f:d9:20:9b:
                    d2:68:3d:31:91:b7:73:f0:f1:46:eb:8c:ca:e9:18:3c:
                    59:dc:9f:13:aa:78:18:20:93:36:ae:72:ad:d9:12:2c:
                    02:01:d8:04:6e:84:fa:e7:07:0c:0a:33:20:ff:16:4d:
                    6a:13:af:29:d9:5d:30:0d:f7:82:4c:67:51:06:d0:0f:
                    b1:66:a5:a7:f4:42:2b:85:15:4c:57:bd:20:f7:23:a7:
                    a8:ec:83:f1:18:d2:8d:b8:32:c6:6a:89:08:4e:79:81
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        35:e8:a2:8f:ac:27:ea:19:d7:df:77:ed:c7:08:e8:90:
        9d:e9:7d:ba:1f:de:07:33:28:72:89:5b:a0:70:ed:7e:
        a3:b1:24:01:13:9c:72:2b:42:37:80:4f:77:b4:43:a9:
        d5:d4:79:10:c3:33:21:ee:f0:5a:4e:a7:03:e0:48:6d:
        1a:7e:5d:af:f9:bb:5f:96:94:8d:70:ee:b7:0a:a4:4f:
        30:9b:b0:15:2e:44:2f:da:12:fc:42:5d:fc:7a:13:73:
        2b:8e:f5:7c:70:11:e1:c4:2f:bf:33:33:9c:16:22:34:
        b7:83:7d:b1:86:5f:23:bd:be:dc:7a:ef:63:4d:d8:66
    Fingerprint (MD5):
        24:C3:FA:7B:B8:87:9E:56:B4:F6:44:8E:C6:12:2F:CE
    Fingerprint (SHA1):
        44:0F:DE:39:C3:51:19:48:3B:F9:DB:9A:8B:D8:0F:D8:5A:E1:80:81

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:19:01 2012
            Not After : Tue Nov 28 16:19:01 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:02:34:c6:22:e9:c3:5e:71:e7:50:e0:14:88:76:ec:
                    b1:f5:d9:3c:84:33:7b:83:fc:f6:46:2e:89:ec:0a:28:
                    b0:68:65:15:e1:90:68:97:28:fc:4d:a3:62:5a:5f:2d:
                    b7:70:80:3c:a4:ab:77:b1:81:86:1b:57:56:d4:b0:b8:
                    e2:b0:3a:fb:52:4a:65:79:1a:3f:32:7b:65:1a:70:95:
                    27:25:b7:9f:64:fc:71:f7:57:fc:c8:2b:51:2e:59:3f:
                    9a:72:55:36:75:64:2e:cb:a6:4e:c1:04:88:cd:c2:21:
                    81:a7:84:a7:51:dd:0b:d1:ea:13:59:98:e0:2c:a7:2f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3c:bd:f7:7d:4a:07:d0:8f:85:7b:33:08:9b:e9:0b:4d:
        32:97:64:93:1e:4c:f9:67:fd:e7:30:09:c3:63:7e:53:
        2e:8f:b2:29:4c:38:c1:ec:d9:a0:a1:a7:a7:43:64:d3:
        92:8e:37:3a:5d:61:45:4a:3d:9d:a0:eb:16:fc:21:f4:
        11:72:4a:93:9b:3c:a9:79:85:34:c5:c6:ec:9b:cd:63:
        d5:3f:0b:2d:8c:38:76:f0:b5:e1:45:16:99:bd:fe:c2:
        8b:6e:52:1e:c8:ac:97:61:e7:a6:e3:7b:71:49:da:dd:
        d8:f8:97:81:a7:8c:80:78:5e:10:76:b3:f1:a2:d3:61
    Fingerprint (MD5):
        C4:19:41:C1:F0:A4:87:00:8A:A8:03:6D:35:55:15:1C
    Fingerprint (SHA1):
        EA:5D:4C:8E:49:5A:FE:58:A7:AC:8F:BC:1D:15:D4:FF:05:DA:91:A6

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC
        Parameters:
            Salt:
                fa:2d:7f:5e:c9:75:4f:40:17:8c:34:96:d0:04:4e:34
            Iteration Count: 2000 (0x7d0)
tools.sh: #8612: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8613: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8614: Exporting with [DES-EDE3-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                26:03:ff:15:55:4c:0b:5d:16:7d:ba:6a:ce:aa:e1:f8
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:18:03 2012
            Not After : Tue Nov 28 16:18:03 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:e9:64:95:bb:eb:65:9a:03:e1:3f:e2:a9:8a:8b:76:
                    15:cd:13:07:7a:34:c8:39:2b:31:77:67:3f:d9:20:9b:
                    d2:68:3d:31:91:b7:73:f0:f1:46:eb:8c:ca:e9:18:3c:
                    59:dc:9f:13:aa:78:18:20:93:36:ae:72:ad:d9:12:2c:
                    02:01:d8:04:6e:84:fa:e7:07:0c:0a:33:20:ff:16:4d:
                    6a:13:af:29:d9:5d:30:0d:f7:82:4c:67:51:06:d0:0f:
                    b1:66:a5:a7:f4:42:2b:85:15:4c:57:bd:20:f7:23:a7:
                    a8:ec:83:f1:18:d2:8d:b8:32:c6:6a:89:08:4e:79:81
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        35:e8:a2:8f:ac:27:ea:19:d7:df:77:ed:c7:08:e8:90:
        9d:e9:7d:ba:1f:de:07:33:28:72:89:5b:a0:70:ed:7e:
        a3:b1:24:01:13:9c:72:2b:42:37:80:4f:77:b4:43:a9:
        d5:d4:79:10:c3:33:21:ee:f0:5a:4e:a7:03:e0:48:6d:
        1a:7e:5d:af:f9:bb:5f:96:94:8d:70:ee:b7:0a:a4:4f:
        30:9b:b0:15:2e:44:2f:da:12:fc:42:5d:fc:7a:13:73:
        2b:8e:f5:7c:70:11:e1:c4:2f:bf:33:33:9c:16:22:34:
        b7:83:7d:b1:86:5f:23:bd:be:dc:7a:ef:63:4d:d8:66
    Fingerprint (MD5):
        24:C3:FA:7B:B8:87:9E:56:B4:F6:44:8E:C6:12:2F:CE
    Fingerprint (SHA1):
        44:0F:DE:39:C3:51:19:48:3B:F9:DB:9A:8B:D8:0F:D8:5A:E1:80:81

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:19:01 2012
            Not After : Tue Nov 28 16:19:01 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:02:34:c6:22:e9:c3:5e:71:e7:50:e0:14:88:76:ec:
                    b1:f5:d9:3c:84:33:7b:83:fc:f6:46:2e:89:ec:0a:28:
                    b0:68:65:15:e1:90:68:97:28:fc:4d:a3:62:5a:5f:2d:
                    b7:70:80:3c:a4:ab:77:b1:81:86:1b:57:56:d4:b0:b8:
                    e2:b0:3a:fb:52:4a:65:79:1a:3f:32:7b:65:1a:70:95:
                    27:25:b7:9f:64:fc:71:f7:57:fc:c8:2b:51:2e:59:3f:
                    9a:72:55:36:75:64:2e:cb:a6:4e:c1:04:88:cd:c2:21:
                    81:a7:84:a7:51:dd:0b:d1:ea:13:59:98:e0:2c:a7:2f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3c:bd:f7:7d:4a:07:d0:8f:85:7b:33:08:9b:e9:0b:4d:
        32:97:64:93:1e:4c:f9:67:fd:e7:30:09:c3:63:7e:53:
        2e:8f:b2:29:4c:38:c1:ec:d9:a0:a1:a7:a7:43:64:d3:
        92:8e:37:3a:5d:61:45:4a:3d:9d:a0:eb:16:fc:21:f4:
        11:72:4a:93:9b:3c:a9:79:85:34:c5:c6:ec:9b:cd:63:
        d5:3f:0b:2d:8c:38:76:f0:b5:e1:45:16:99:bd:fe:c2:
        8b:6e:52:1e:c8:ac:97:61:e7:a6:e3:7b:71:49:da:dd:
        d8:f8:97:81:a7:8c:80:78:5e:10:76:b3:f1:a2:d3:61
    Fingerprint (MD5):
        C4:19:41:C1:F0:A4:87:00:8A:A8:03:6D:35:55:15:1C
    Fingerprint (SHA1):
        EA:5D:4C:8E:49:5A:FE:58:A7:AC:8F:BC:1D:15:D4:FF:05:DA:91:A6

    Friendly Name: Alice

tools.sh: #8615: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8616: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8617: Exporting with [DES-EDE3-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                06:4c:a1:6c:e9:f2:d0:9d:5c:0a:fa:76:a5:70:85:12
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:18:03 2012
            Not After : Tue Nov 28 16:18:03 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:e9:64:95:bb:eb:65:9a:03:e1:3f:e2:a9:8a:8b:76:
                    15:cd:13:07:7a:34:c8:39:2b:31:77:67:3f:d9:20:9b:
                    d2:68:3d:31:91:b7:73:f0:f1:46:eb:8c:ca:e9:18:3c:
                    59:dc:9f:13:aa:78:18:20:93:36:ae:72:ad:d9:12:2c:
                    02:01:d8:04:6e:84:fa:e7:07:0c:0a:33:20:ff:16:4d:
                    6a:13:af:29:d9:5d:30:0d:f7:82:4c:67:51:06:d0:0f:
                    b1:66:a5:a7:f4:42:2b:85:15:4c:57:bd:20:f7:23:a7:
                    a8:ec:83:f1:18:d2:8d:b8:32:c6:6a:89:08:4e:79:81
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        35:e8:a2:8f:ac:27:ea:19:d7:df:77:ed:c7:08:e8:90:
        9d:e9:7d:ba:1f:de:07:33:28:72:89:5b:a0:70:ed:7e:
        a3:b1:24:01:13:9c:72:2b:42:37:80:4f:77:b4:43:a9:
        d5:d4:79:10:c3:33:21:ee:f0:5a:4e:a7:03:e0:48:6d:
        1a:7e:5d:af:f9:bb:5f:96:94:8d:70:ee:b7:0a:a4:4f:
        30:9b:b0:15:2e:44:2f:da:12:fc:42:5d:fc:7a:13:73:
        2b:8e:f5:7c:70:11:e1:c4:2f:bf:33:33:9c:16:22:34:
        b7:83:7d:b1:86:5f:23:bd:be:dc:7a:ef:63:4d:d8:66
    Fingerprint (MD5):
        24:C3:FA:7B:B8:87:9E:56:B4:F6:44:8E:C6:12:2F:CE
    Fingerprint (SHA1):
        44:0F:DE:39:C3:51:19:48:3B:F9:DB:9A:8B:D8:0F:D8:5A:E1:80:81

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:19:01 2012
            Not After : Tue Nov 28 16:19:01 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:02:34:c6:22:e9:c3:5e:71:e7:50:e0:14:88:76:ec:
                    b1:f5:d9:3c:84:33:7b:83:fc:f6:46:2e:89:ec:0a:28:
                    b0:68:65:15:e1:90:68:97:28:fc:4d:a3:62:5a:5f:2d:
                    b7:70:80:3c:a4:ab:77:b1:81:86:1b:57:56:d4:b0:b8:
                    e2:b0:3a:fb:52:4a:65:79:1a:3f:32:7b:65:1a:70:95:
                    27:25:b7:9f:64:fc:71:f7:57:fc:c8:2b:51:2e:59:3f:
                    9a:72:55:36:75:64:2e:cb:a6:4e:c1:04:88:cd:c2:21:
                    81:a7:84:a7:51:dd:0b:d1:ea:13:59:98:e0:2c:a7:2f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3c:bd:f7:7d:4a:07:d0:8f:85:7b:33:08:9b:e9:0b:4d:
        32:97:64:93:1e:4c:f9:67:fd:e7:30:09:c3:63:7e:53:
        2e:8f:b2:29:4c:38:c1:ec:d9:a0:a1:a7:a7:43:64:d3:
        92:8e:37:3a:5d:61:45:4a:3d:9d:a0:eb:16:fc:21:f4:
        11:72:4a:93:9b:3c:a9:79:85:34:c5:c6:ec:9b:cd:63:
        d5:3f:0b:2d:8c:38:76:f0:b5:e1:45:16:99:bd:fe:c2:
        8b:6e:52:1e:c8:ac:97:61:e7:a6:e3:7b:71:49:da:dd:
        d8:f8:97:81:a7:8c:80:78:5e:10:76:b3:f1:a2:d3:61
    Fingerprint (MD5):
        C4:19:41:C1:F0:A4:87:00:8A:A8:03:6D:35:55:15:1C
    Fingerprint (SHA1):
        EA:5D:4C:8E:49:5A:FE:58:A7:AC:8F:BC:1D:15:D4:FF:05:DA:91:A6

    Friendly Name: Alice

tools.sh: #8618: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8619: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8620: Exporting with [DES-EDE3-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:18:03 2012
            Not After : Tue Nov 28 16:18:03 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:e9:64:95:bb:eb:65:9a:03:e1:3f:e2:a9:8a:8b:76:
                    15:cd:13:07:7a:34:c8:39:2b:31:77:67:3f:d9:20:9b:
                    d2:68:3d:31:91:b7:73:f0:f1:46:eb:8c:ca:e9:18:3c:
                    59:dc:9f:13:aa:78:18:20:93:36:ae:72:ad:d9:12:2c:
                    02:01:d8:04:6e:84:fa:e7:07:0c:0a:33:20:ff:16:4d:
                    6a:13:af:29:d9:5d:30:0d:f7:82:4c:67:51:06:d0:0f:
                    b1:66:a5:a7:f4:42:2b:85:15:4c:57:bd:20:f7:23:a7:
                    a8:ec:83:f1:18:d2:8d:b8:32:c6:6a:89:08:4e:79:81
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        35:e8:a2:8f:ac:27:ea:19:d7:df:77:ed:c7:08:e8:90:
        9d:e9:7d:ba:1f:de:07:33:28:72:89:5b:a0:70:ed:7e:
        a3:b1:24:01:13:9c:72:2b:42:37:80:4f:77:b4:43:a9:
        d5:d4:79:10:c3:33:21:ee:f0:5a:4e:a7:03:e0:48:6d:
        1a:7e:5d:af:f9:bb:5f:96:94:8d:70:ee:b7:0a:a4:4f:
        30:9b:b0:15:2e:44:2f:da:12:fc:42:5d:fc:7a:13:73:
        2b:8e:f5:7c:70:11:e1:c4:2f:bf:33:33:9c:16:22:34:
        b7:83:7d:b1:86:5f:23:bd:be:dc:7a:ef:63:4d:d8:66
    Fingerprint (MD5):
        24:C3:FA:7B:B8:87:9E:56:B4:F6:44:8E:C6:12:2F:CE
    Fingerprint (SHA1):
        44:0F:DE:39:C3:51:19:48:3B:F9:DB:9A:8B:D8:0F:D8:5A:E1:80:81

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:19:01 2012
            Not After : Tue Nov 28 16:19:01 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:02:34:c6:22:e9:c3:5e:71:e7:50:e0:14:88:76:ec:
                    b1:f5:d9:3c:84:33:7b:83:fc:f6:46:2e:89:ec:0a:28:
                    b0:68:65:15:e1:90:68:97:28:fc:4d:a3:62:5a:5f:2d:
                    b7:70:80:3c:a4:ab:77:b1:81:86:1b:57:56:d4:b0:b8:
                    e2:b0:3a:fb:52:4a:65:79:1a:3f:32:7b:65:1a:70:95:
                    27:25:b7:9f:64:fc:71:f7:57:fc:c8:2b:51:2e:59:3f:
                    9a:72:55:36:75:64:2e:cb:a6:4e:c1:04:88:cd:c2:21:
                    81:a7:84:a7:51:dd:0b:d1:ea:13:59:98:e0:2c:a7:2f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3c:bd:f7:7d:4a:07:d0:8f:85:7b:33:08:9b:e9:0b:4d:
        32:97:64:93:1e:4c:f9:67:fd:e7:30:09:c3:63:7e:53:
        2e:8f:b2:29:4c:38:c1:ec:d9:a0:a1:a7:a7:43:64:d3:
        92:8e:37:3a:5d:61:45:4a:3d:9d:a0:eb:16:fc:21:f4:
        11:72:4a:93:9b:3c:a9:79:85:34:c5:c6:ec:9b:cd:63:
        d5:3f:0b:2d:8c:38:76:f0:b5:e1:45:16:99:bd:fe:c2:
        8b:6e:52:1e:c8:ac:97:61:e7:a6:e3:7b:71:49:da:dd:
        d8:f8:97:81:a7:8c:80:78:5e:10:76:b3:f1:a2:d3:61
    Fingerprint (MD5):
        C4:19:41:C1:F0:A4:87:00:8A:A8:03:6D:35:55:15:1C
    Fingerprint (SHA1):
        EA:5D:4C:8E:49:5A:FE:58:A7:AC:8F:BC:1D:15:D4:FF:05:DA:91:A6

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                e1:2b:36:e1:f6:09:a3:77:f4:a8:8a:4c:4d:2b:94:3e
            Iteration Count: 2000 (0x7d0)
tools.sh: #8621: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8622: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8623: Exporting with [AES-128-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        f4:0e:18:f0:81:0a:83:4e:27:6a:3e:de:d1:fd:cb:1f
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-128-CBC
                Args:
                    04:10:7d:aa:c9:51:c6:d5:69:ad:b3:8b:de:64:7e:46:
                    d2:ed
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:18:03 2012
            Not After : Tue Nov 28 16:18:03 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:e9:64:95:bb:eb:65:9a:03:e1:3f:e2:a9:8a:8b:76:
                    15:cd:13:07:7a:34:c8:39:2b:31:77:67:3f:d9:20:9b:
                    d2:68:3d:31:91:b7:73:f0:f1:46:eb:8c:ca:e9:18:3c:
                    59:dc:9f:13:aa:78:18:20:93:36:ae:72:ad:d9:12:2c:
                    02:01:d8:04:6e:84:fa:e7:07:0c:0a:33:20:ff:16:4d:
                    6a:13:af:29:d9:5d:30:0d:f7:82:4c:67:51:06:d0:0f:
                    b1:66:a5:a7:f4:42:2b:85:15:4c:57:bd:20:f7:23:a7:
                    a8:ec:83:f1:18:d2:8d:b8:32:c6:6a:89:08:4e:79:81
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        35:e8:a2:8f:ac:27:ea:19:d7:df:77:ed:c7:08:e8:90:
        9d:e9:7d:ba:1f:de:07:33:28:72:89:5b:a0:70:ed:7e:
        a3:b1:24:01:13:9c:72:2b:42:37:80:4f:77:b4:43:a9:
        d5:d4:79:10:c3:33:21:ee:f0:5a:4e:a7:03:e0:48:6d:
        1a:7e:5d:af:f9:bb:5f:96:94:8d:70:ee:b7:0a:a4:4f:
        30:9b:b0:15:2e:44:2f:da:12:fc:42:5d:fc:7a:13:73:
        2b:8e:f5:7c:70:11:e1:c4:2f:bf:33:33:9c:16:22:34:
        b7:83:7d:b1:86:5f:23:bd:be:dc:7a:ef:63:4d:d8:66
    Fingerprint (MD5):
        24:C3:FA:7B:B8:87:9E:56:B4:F6:44:8E:C6:12:2F:CE
    Fingerprint (SHA1):
        44:0F:DE:39:C3:51:19:48:3B:F9:DB:9A:8B:D8:0F:D8:5A:E1:80:81

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:19:01 2012
            Not After : Tue Nov 28 16:19:01 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:02:34:c6:22:e9:c3:5e:71:e7:50:e0:14:88:76:ec:
                    b1:f5:d9:3c:84:33:7b:83:fc:f6:46:2e:89:ec:0a:28:
                    b0:68:65:15:e1:90:68:97:28:fc:4d:a3:62:5a:5f:2d:
                    b7:70:80:3c:a4:ab:77:b1:81:86:1b:57:56:d4:b0:b8:
                    e2:b0:3a:fb:52:4a:65:79:1a:3f:32:7b:65:1a:70:95:
                    27:25:b7:9f:64:fc:71:f7:57:fc:c8:2b:51:2e:59:3f:
                    9a:72:55:36:75:64:2e:cb:a6:4e:c1:04:88:cd:c2:21:
                    81:a7:84:a7:51:dd:0b:d1:ea:13:59:98:e0:2c:a7:2f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3c:bd:f7:7d:4a:07:d0:8f:85:7b:33:08:9b:e9:0b:4d:
        32:97:64:93:1e:4c:f9:67:fd:e7:30:09:c3:63:7e:53:
        2e:8f:b2:29:4c:38:c1:ec:d9:a0:a1:a7:a7:43:64:d3:
        92:8e:37:3a:5d:61:45:4a:3d:9d:a0:eb:16:fc:21:f4:
        11:72:4a:93:9b:3c:a9:79:85:34:c5:c6:ec:9b:cd:63:
        d5:3f:0b:2d:8c:38:76:f0:b5:e1:45:16:99:bd:fe:c2:
        8b:6e:52:1e:c8:ac:97:61:e7:a6:e3:7b:71:49:da:dd:
        d8:f8:97:81:a7:8c:80:78:5e:10:76:b3:f1:a2:d3:61
    Fingerprint (MD5):
        C4:19:41:C1:F0:A4:87:00:8A:A8:03:6D:35:55:15:1C
    Fingerprint (SHA1):
        EA:5D:4C:8E:49:5A:FE:58:A7:AC:8F:BC:1D:15:D4:FF:05:DA:91:A6

    Friendly Name: Alice

tools.sh: #8624: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8625: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8626: Exporting with [AES-128-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        18:a5:2b:81:e1:c4:71:d0:c6:8f:47:0f:d9:2e:69:b4
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-128-CBC
                Args:
                    04:10:73:f1:11:15:03:75:e3:32:20:f5:11:e5:7f:dc:
                    8d:cb
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:18:03 2012
            Not After : Tue Nov 28 16:18:03 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:e9:64:95:bb:eb:65:9a:03:e1:3f:e2:a9:8a:8b:76:
                    15:cd:13:07:7a:34:c8:39:2b:31:77:67:3f:d9:20:9b:
                    d2:68:3d:31:91:b7:73:f0:f1:46:eb:8c:ca:e9:18:3c:
                    59:dc:9f:13:aa:78:18:20:93:36:ae:72:ad:d9:12:2c:
                    02:01:d8:04:6e:84:fa:e7:07:0c:0a:33:20:ff:16:4d:
                    6a:13:af:29:d9:5d:30:0d:f7:82:4c:67:51:06:d0:0f:
                    b1:66:a5:a7:f4:42:2b:85:15:4c:57:bd:20:f7:23:a7:
                    a8:ec:83:f1:18:d2:8d:b8:32:c6:6a:89:08:4e:79:81
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        35:e8:a2:8f:ac:27:ea:19:d7:df:77:ed:c7:08:e8:90:
        9d:e9:7d:ba:1f:de:07:33:28:72:89:5b:a0:70:ed:7e:
        a3:b1:24:01:13:9c:72:2b:42:37:80:4f:77:b4:43:a9:
        d5:d4:79:10:c3:33:21:ee:f0:5a:4e:a7:03:e0:48:6d:
        1a:7e:5d:af:f9:bb:5f:96:94:8d:70:ee:b7:0a:a4:4f:
        30:9b:b0:15:2e:44:2f:da:12:fc:42:5d:fc:7a:13:73:
        2b:8e:f5:7c:70:11:e1:c4:2f:bf:33:33:9c:16:22:34:
        b7:83:7d:b1:86:5f:23:bd:be:dc:7a:ef:63:4d:d8:66
    Fingerprint (MD5):
        24:C3:FA:7B:B8:87:9E:56:B4:F6:44:8E:C6:12:2F:CE
    Fingerprint (SHA1):
        44:0F:DE:39:C3:51:19:48:3B:F9:DB:9A:8B:D8:0F:D8:5A:E1:80:81

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:19:01 2012
            Not After : Tue Nov 28 16:19:01 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:02:34:c6:22:e9:c3:5e:71:e7:50:e0:14:88:76:ec:
                    b1:f5:d9:3c:84:33:7b:83:fc:f6:46:2e:89:ec:0a:28:
                    b0:68:65:15:e1:90:68:97:28:fc:4d:a3:62:5a:5f:2d:
                    b7:70:80:3c:a4:ab:77:b1:81:86:1b:57:56:d4:b0:b8:
                    e2:b0:3a:fb:52:4a:65:79:1a:3f:32:7b:65:1a:70:95:
                    27:25:b7:9f:64:fc:71:f7:57:fc:c8:2b:51:2e:59:3f:
                    9a:72:55:36:75:64:2e:cb:a6:4e:c1:04:88:cd:c2:21:
                    81:a7:84:a7:51:dd:0b:d1:ea:13:59:98:e0:2c:a7:2f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3c:bd:f7:7d:4a:07:d0:8f:85:7b:33:08:9b:e9:0b:4d:
        32:97:64:93:1e:4c:f9:67:fd:e7:30:09:c3:63:7e:53:
        2e:8f:b2:29:4c:38:c1:ec:d9:a0:a1:a7:a7:43:64:d3:
        92:8e:37:3a:5d:61:45:4a:3d:9d:a0:eb:16:fc:21:f4:
        11:72:4a:93:9b:3c:a9:79:85:34:c5:c6:ec:9b:cd:63:
        d5:3f:0b:2d:8c:38:76:f0:b5:e1:45:16:99:bd:fe:c2:
        8b:6e:52:1e:c8:ac:97:61:e7:a6:e3:7b:71:49:da:dd:
        d8:f8:97:81:a7:8c:80:78:5e:10:76:b3:f1:a2:d3:61
    Fingerprint (MD5):
        C4:19:41:C1:F0:A4:87:00:8A:A8:03:6D:35:55:15:1C
    Fingerprint (SHA1):
        EA:5D:4C:8E:49:5A:FE:58:A7:AC:8F:BC:1D:15:D4:FF:05:DA:91:A6

    Friendly Name: Alice

tools.sh: #8627: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8628: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8629: Exporting with [AES-128-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:18:03 2012
            Not After : Tue Nov 28 16:18:03 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:e9:64:95:bb:eb:65:9a:03:e1:3f:e2:a9:8a:8b:76:
                    15:cd:13:07:7a:34:c8:39:2b:31:77:67:3f:d9:20:9b:
                    d2:68:3d:31:91:b7:73:f0:f1:46:eb:8c:ca:e9:18:3c:
                    59:dc:9f:13:aa:78:18:20:93:36:ae:72:ad:d9:12:2c:
                    02:01:d8:04:6e:84:fa:e7:07:0c:0a:33:20:ff:16:4d:
                    6a:13:af:29:d9:5d:30:0d:f7:82:4c:67:51:06:d0:0f:
                    b1:66:a5:a7:f4:42:2b:85:15:4c:57:bd:20:f7:23:a7:
                    a8:ec:83:f1:18:d2:8d:b8:32:c6:6a:89:08:4e:79:81
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        35:e8:a2:8f:ac:27:ea:19:d7:df:77:ed:c7:08:e8:90:
        9d:e9:7d:ba:1f:de:07:33:28:72:89:5b:a0:70:ed:7e:
        a3:b1:24:01:13:9c:72:2b:42:37:80:4f:77:b4:43:a9:
        d5:d4:79:10:c3:33:21:ee:f0:5a:4e:a7:03:e0:48:6d:
        1a:7e:5d:af:f9:bb:5f:96:94:8d:70:ee:b7:0a:a4:4f:
        30:9b:b0:15:2e:44:2f:da:12:fc:42:5d:fc:7a:13:73:
        2b:8e:f5:7c:70:11:e1:c4:2f:bf:33:33:9c:16:22:34:
        b7:83:7d:b1:86:5f:23:bd:be:dc:7a:ef:63:4d:d8:66
    Fingerprint (MD5):
        24:C3:FA:7B:B8:87:9E:56:B4:F6:44:8E:C6:12:2F:CE
    Fingerprint (SHA1):
        44:0F:DE:39:C3:51:19:48:3B:F9:DB:9A:8B:D8:0F:D8:5A:E1:80:81

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:19:01 2012
            Not After : Tue Nov 28 16:19:01 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:02:34:c6:22:e9:c3:5e:71:e7:50:e0:14:88:76:ec:
                    b1:f5:d9:3c:84:33:7b:83:fc:f6:46:2e:89:ec:0a:28:
                    b0:68:65:15:e1:90:68:97:28:fc:4d:a3:62:5a:5f:2d:
                    b7:70:80:3c:a4:ab:77:b1:81:86:1b:57:56:d4:b0:b8:
                    e2:b0:3a:fb:52:4a:65:79:1a:3f:32:7b:65:1a:70:95:
                    27:25:b7:9f:64:fc:71:f7:57:fc:c8:2b:51:2e:59:3f:
                    9a:72:55:36:75:64:2e:cb:a6:4e:c1:04:88:cd:c2:21:
                    81:a7:84:a7:51:dd:0b:d1:ea:13:59:98:e0:2c:a7:2f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3c:bd:f7:7d:4a:07:d0:8f:85:7b:33:08:9b:e9:0b:4d:
        32:97:64:93:1e:4c:f9:67:fd:e7:30:09:c3:63:7e:53:
        2e:8f:b2:29:4c:38:c1:ec:d9:a0:a1:a7:a7:43:64:d3:
        92:8e:37:3a:5d:61:45:4a:3d:9d:a0:eb:16:fc:21:f4:
        11:72:4a:93:9b:3c:a9:79:85:34:c5:c6:ec:9b:cd:63:
        d5:3f:0b:2d:8c:38:76:f0:b5:e1:45:16:99:bd:fe:c2:
        8b:6e:52:1e:c8:ac:97:61:e7:a6:e3:7b:71:49:da:dd:
        d8:f8:97:81:a7:8c:80:78:5e:10:76:b3:f1:a2:d3:61
    Fingerprint (MD5):
        C4:19:41:C1:F0:A4:87:00:8A:A8:03:6D:35:55:15:1C
    Fingerprint (SHA1):
        EA:5D:4C:8E:49:5A:FE:58:A7:AC:8F:BC:1D:15:D4:FF:05:DA:91:A6

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        e9:63:c4:a9:78:49:b6:7e:e7:02:c5:cf:b5:d5:a6:94
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-128-CBC
                Args:
                    04:10:69:c1:f5:0f:92:34:fa:01:9d:25:06:50:34:f1:
                    10:be
tools.sh: #8630: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8631: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8632: Exporting with [AES-192-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        03:65:de:2b:cf:58:f0:26:25:e4:77:b4:07:bb:26:3c
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-192-CBC
                Args:
                    04:10:06:6d:ba:e6:a7:1c:87:aa:93:d5:df:d8:04:ca:
                    48:c9
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:18:03 2012
            Not After : Tue Nov 28 16:18:03 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:e9:64:95:bb:eb:65:9a:03:e1:3f:e2:a9:8a:8b:76:
                    15:cd:13:07:7a:34:c8:39:2b:31:77:67:3f:d9:20:9b:
                    d2:68:3d:31:91:b7:73:f0:f1:46:eb:8c:ca:e9:18:3c:
                    59:dc:9f:13:aa:78:18:20:93:36:ae:72:ad:d9:12:2c:
                    02:01:d8:04:6e:84:fa:e7:07:0c:0a:33:20:ff:16:4d:
                    6a:13:af:29:d9:5d:30:0d:f7:82:4c:67:51:06:d0:0f:
                    b1:66:a5:a7:f4:42:2b:85:15:4c:57:bd:20:f7:23:a7:
                    a8:ec:83:f1:18:d2:8d:b8:32:c6:6a:89:08:4e:79:81
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        35:e8:a2:8f:ac:27:ea:19:d7:df:77:ed:c7:08:e8:90:
        9d:e9:7d:ba:1f:de:07:33:28:72:89:5b:a0:70:ed:7e:
        a3:b1:24:01:13:9c:72:2b:42:37:80:4f:77:b4:43:a9:
        d5:d4:79:10:c3:33:21:ee:f0:5a:4e:a7:03:e0:48:6d:
        1a:7e:5d:af:f9:bb:5f:96:94:8d:70:ee:b7:0a:a4:4f:
        30:9b:b0:15:2e:44:2f:da:12:fc:42:5d:fc:7a:13:73:
        2b:8e:f5:7c:70:11:e1:c4:2f:bf:33:33:9c:16:22:34:
        b7:83:7d:b1:86:5f:23:bd:be:dc:7a:ef:63:4d:d8:66
    Fingerprint (MD5):
        24:C3:FA:7B:B8:87:9E:56:B4:F6:44:8E:C6:12:2F:CE
    Fingerprint (SHA1):
        44:0F:DE:39:C3:51:19:48:3B:F9:DB:9A:8B:D8:0F:D8:5A:E1:80:81

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:19:01 2012
            Not After : Tue Nov 28 16:19:01 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:02:34:c6:22:e9:c3:5e:71:e7:50:e0:14:88:76:ec:
                    b1:f5:d9:3c:84:33:7b:83:fc:f6:46:2e:89:ec:0a:28:
                    b0:68:65:15:e1:90:68:97:28:fc:4d:a3:62:5a:5f:2d:
                    b7:70:80:3c:a4:ab:77:b1:81:86:1b:57:56:d4:b0:b8:
                    e2:b0:3a:fb:52:4a:65:79:1a:3f:32:7b:65:1a:70:95:
                    27:25:b7:9f:64:fc:71:f7:57:fc:c8:2b:51:2e:59:3f:
                    9a:72:55:36:75:64:2e:cb:a6:4e:c1:04:88:cd:c2:21:
                    81:a7:84:a7:51:dd:0b:d1:ea:13:59:98:e0:2c:a7:2f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3c:bd:f7:7d:4a:07:d0:8f:85:7b:33:08:9b:e9:0b:4d:
        32:97:64:93:1e:4c:f9:67:fd:e7:30:09:c3:63:7e:53:
        2e:8f:b2:29:4c:38:c1:ec:d9:a0:a1:a7:a7:43:64:d3:
        92:8e:37:3a:5d:61:45:4a:3d:9d:a0:eb:16:fc:21:f4:
        11:72:4a:93:9b:3c:a9:79:85:34:c5:c6:ec:9b:cd:63:
        d5:3f:0b:2d:8c:38:76:f0:b5:e1:45:16:99:bd:fe:c2:
        8b:6e:52:1e:c8:ac:97:61:e7:a6:e3:7b:71:49:da:dd:
        d8:f8:97:81:a7:8c:80:78:5e:10:76:b3:f1:a2:d3:61
    Fingerprint (MD5):
        C4:19:41:C1:F0:A4:87:00:8A:A8:03:6D:35:55:15:1C
    Fingerprint (SHA1):
        EA:5D:4C:8E:49:5A:FE:58:A7:AC:8F:BC:1D:15:D4:FF:05:DA:91:A6

    Friendly Name: Alice

tools.sh: #8633: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8634: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8635: Exporting with [AES-192-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        e6:bb:ee:1f:f9:01:6b:73:07:e4:16:a1:1c:a2:42:74
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-192-CBC
                Args:
                    04:10:df:75:ec:09:d3:6d:b7:ac:05:ba:a7:be:1d:c4:
                    ad:ac
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:18:03 2012
            Not After : Tue Nov 28 16:18:03 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:e9:64:95:bb:eb:65:9a:03:e1:3f:e2:a9:8a:8b:76:
                    15:cd:13:07:7a:34:c8:39:2b:31:77:67:3f:d9:20:9b:
                    d2:68:3d:31:91:b7:73:f0:f1:46:eb:8c:ca:e9:18:3c:
                    59:dc:9f:13:aa:78:18:20:93:36:ae:72:ad:d9:12:2c:
                    02:01:d8:04:6e:84:fa:e7:07:0c:0a:33:20:ff:16:4d:
                    6a:13:af:29:d9:5d:30:0d:f7:82:4c:67:51:06:d0:0f:
                    b1:66:a5:a7:f4:42:2b:85:15:4c:57:bd:20:f7:23:a7:
                    a8:ec:83:f1:18:d2:8d:b8:32:c6:6a:89:08:4e:79:81
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        35:e8:a2:8f:ac:27:ea:19:d7:df:77:ed:c7:08:e8:90:
        9d:e9:7d:ba:1f:de:07:33:28:72:89:5b:a0:70:ed:7e:
        a3:b1:24:01:13:9c:72:2b:42:37:80:4f:77:b4:43:a9:
        d5:d4:79:10:c3:33:21:ee:f0:5a:4e:a7:03:e0:48:6d:
        1a:7e:5d:af:f9:bb:5f:96:94:8d:70:ee:b7:0a:a4:4f:
        30:9b:b0:15:2e:44:2f:da:12:fc:42:5d:fc:7a:13:73:
        2b:8e:f5:7c:70:11:e1:c4:2f:bf:33:33:9c:16:22:34:
        b7:83:7d:b1:86:5f:23:bd:be:dc:7a:ef:63:4d:d8:66
    Fingerprint (MD5):
        24:C3:FA:7B:B8:87:9E:56:B4:F6:44:8E:C6:12:2F:CE
    Fingerprint (SHA1):
        44:0F:DE:39:C3:51:19:48:3B:F9:DB:9A:8B:D8:0F:D8:5A:E1:80:81

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:19:01 2012
            Not After : Tue Nov 28 16:19:01 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:02:34:c6:22:e9:c3:5e:71:e7:50:e0:14:88:76:ec:
                    b1:f5:d9:3c:84:33:7b:83:fc:f6:46:2e:89:ec:0a:28:
                    b0:68:65:15:e1:90:68:97:28:fc:4d:a3:62:5a:5f:2d:
                    b7:70:80:3c:a4:ab:77:b1:81:86:1b:57:56:d4:b0:b8:
                    e2:b0:3a:fb:52:4a:65:79:1a:3f:32:7b:65:1a:70:95:
                    27:25:b7:9f:64:fc:71:f7:57:fc:c8:2b:51:2e:59:3f:
                    9a:72:55:36:75:64:2e:cb:a6:4e:c1:04:88:cd:c2:21:
                    81:a7:84:a7:51:dd:0b:d1:ea:13:59:98:e0:2c:a7:2f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3c:bd:f7:7d:4a:07:d0:8f:85:7b:33:08:9b:e9:0b:4d:
        32:97:64:93:1e:4c:f9:67:fd:e7:30:09:c3:63:7e:53:
        2e:8f:b2:29:4c:38:c1:ec:d9:a0:a1:a7:a7:43:64:d3:
        92:8e:37:3a:5d:61:45:4a:3d:9d:a0:eb:16:fc:21:f4:
        11:72:4a:93:9b:3c:a9:79:85:34:c5:c6:ec:9b:cd:63:
        d5:3f:0b:2d:8c:38:76:f0:b5:e1:45:16:99:bd:fe:c2:
        8b:6e:52:1e:c8:ac:97:61:e7:a6:e3:7b:71:49:da:dd:
        d8:f8:97:81:a7:8c:80:78:5e:10:76:b3:f1:a2:d3:61
    Fingerprint (MD5):
        C4:19:41:C1:F0:A4:87:00:8A:A8:03:6D:35:55:15:1C
    Fingerprint (SHA1):
        EA:5D:4C:8E:49:5A:FE:58:A7:AC:8F:BC:1D:15:D4:FF:05:DA:91:A6

    Friendly Name: Alice

tools.sh: #8636: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8637: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8638: Exporting with [AES-192-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:18:03 2012
            Not After : Tue Nov 28 16:18:03 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:e9:64:95:bb:eb:65:9a:03:e1:3f:e2:a9:8a:8b:76:
                    15:cd:13:07:7a:34:c8:39:2b:31:77:67:3f:d9:20:9b:
                    d2:68:3d:31:91:b7:73:f0:f1:46:eb:8c:ca:e9:18:3c:
                    59:dc:9f:13:aa:78:18:20:93:36:ae:72:ad:d9:12:2c:
                    02:01:d8:04:6e:84:fa:e7:07:0c:0a:33:20:ff:16:4d:
                    6a:13:af:29:d9:5d:30:0d:f7:82:4c:67:51:06:d0:0f:
                    b1:66:a5:a7:f4:42:2b:85:15:4c:57:bd:20:f7:23:a7:
                    a8:ec:83:f1:18:d2:8d:b8:32:c6:6a:89:08:4e:79:81
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        35:e8:a2:8f:ac:27:ea:19:d7:df:77:ed:c7:08:e8:90:
        9d:e9:7d:ba:1f:de:07:33:28:72:89:5b:a0:70:ed:7e:
        a3:b1:24:01:13:9c:72:2b:42:37:80:4f:77:b4:43:a9:
        d5:d4:79:10:c3:33:21:ee:f0:5a:4e:a7:03:e0:48:6d:
        1a:7e:5d:af:f9:bb:5f:96:94:8d:70:ee:b7:0a:a4:4f:
        30:9b:b0:15:2e:44:2f:da:12:fc:42:5d:fc:7a:13:73:
        2b:8e:f5:7c:70:11:e1:c4:2f:bf:33:33:9c:16:22:34:
        b7:83:7d:b1:86:5f:23:bd:be:dc:7a:ef:63:4d:d8:66
    Fingerprint (MD5):
        24:C3:FA:7B:B8:87:9E:56:B4:F6:44:8E:C6:12:2F:CE
    Fingerprint (SHA1):
        44:0F:DE:39:C3:51:19:48:3B:F9:DB:9A:8B:D8:0F:D8:5A:E1:80:81

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:19:01 2012
            Not After : Tue Nov 28 16:19:01 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:02:34:c6:22:e9:c3:5e:71:e7:50:e0:14:88:76:ec:
                    b1:f5:d9:3c:84:33:7b:83:fc:f6:46:2e:89:ec:0a:28:
                    b0:68:65:15:e1:90:68:97:28:fc:4d:a3:62:5a:5f:2d:
                    b7:70:80:3c:a4:ab:77:b1:81:86:1b:57:56:d4:b0:b8:
                    e2:b0:3a:fb:52:4a:65:79:1a:3f:32:7b:65:1a:70:95:
                    27:25:b7:9f:64:fc:71:f7:57:fc:c8:2b:51:2e:59:3f:
                    9a:72:55:36:75:64:2e:cb:a6:4e:c1:04:88:cd:c2:21:
                    81:a7:84:a7:51:dd:0b:d1:ea:13:59:98:e0:2c:a7:2f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3c:bd:f7:7d:4a:07:d0:8f:85:7b:33:08:9b:e9:0b:4d:
        32:97:64:93:1e:4c:f9:67:fd:e7:30:09:c3:63:7e:53:
        2e:8f:b2:29:4c:38:c1:ec:d9:a0:a1:a7:a7:43:64:d3:
        92:8e:37:3a:5d:61:45:4a:3d:9d:a0:eb:16:fc:21:f4:
        11:72:4a:93:9b:3c:a9:79:85:34:c5:c6:ec:9b:cd:63:
        d5:3f:0b:2d:8c:38:76:f0:b5:e1:45:16:99:bd:fe:c2:
        8b:6e:52:1e:c8:ac:97:61:e7:a6:e3:7b:71:49:da:dd:
        d8:f8:97:81:a7:8c:80:78:5e:10:76:b3:f1:a2:d3:61
    Fingerprint (MD5):
        C4:19:41:C1:F0:A4:87:00:8A:A8:03:6D:35:55:15:1C
    Fingerprint (SHA1):
        EA:5D:4C:8E:49:5A:FE:58:A7:AC:8F:BC:1D:15:D4:FF:05:DA:91:A6

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        03:73:18:f9:dc:0b:45:bb:f5:f4:ab:ad:19:bb:e7:3a
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-192-CBC
                Args:
                    04:10:46:9a:c6:e5:4d:a7:c5:9d:6d:db:ff:19:39:9e:
                    cd:db
tools.sh: #8639: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8640: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8641: Exporting with [AES-256-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        3c:9b:00:f0:d6:57:66:93:2b:da:a5:05:5d:de:3c:e0
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-256-CBC
                Args:
                    04:10:50:5c:99:85:fc:31:de:ad:28:47:1d:00:2f:55:
                    36:6d
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:18:03 2012
            Not After : Tue Nov 28 16:18:03 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:e9:64:95:bb:eb:65:9a:03:e1:3f:e2:a9:8a:8b:76:
                    15:cd:13:07:7a:34:c8:39:2b:31:77:67:3f:d9:20:9b:
                    d2:68:3d:31:91:b7:73:f0:f1:46:eb:8c:ca:e9:18:3c:
                    59:dc:9f:13:aa:78:18:20:93:36:ae:72:ad:d9:12:2c:
                    02:01:d8:04:6e:84:fa:e7:07:0c:0a:33:20:ff:16:4d:
                    6a:13:af:29:d9:5d:30:0d:f7:82:4c:67:51:06:d0:0f:
                    b1:66:a5:a7:f4:42:2b:85:15:4c:57:bd:20:f7:23:a7:
                    a8:ec:83:f1:18:d2:8d:b8:32:c6:6a:89:08:4e:79:81
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        35:e8:a2:8f:ac:27:ea:19:d7:df:77:ed:c7:08:e8:90:
        9d:e9:7d:ba:1f:de:07:33:28:72:89:5b:a0:70:ed:7e:
        a3:b1:24:01:13:9c:72:2b:42:37:80:4f:77:b4:43:a9:
        d5:d4:79:10:c3:33:21:ee:f0:5a:4e:a7:03:e0:48:6d:
        1a:7e:5d:af:f9:bb:5f:96:94:8d:70:ee:b7:0a:a4:4f:
        30:9b:b0:15:2e:44:2f:da:12:fc:42:5d:fc:7a:13:73:
        2b:8e:f5:7c:70:11:e1:c4:2f:bf:33:33:9c:16:22:34:
        b7:83:7d:b1:86:5f:23:bd:be:dc:7a:ef:63:4d:d8:66
    Fingerprint (MD5):
        24:C3:FA:7B:B8:87:9E:56:B4:F6:44:8E:C6:12:2F:CE
    Fingerprint (SHA1):
        44:0F:DE:39:C3:51:19:48:3B:F9:DB:9A:8B:D8:0F:D8:5A:E1:80:81

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:19:01 2012
            Not After : Tue Nov 28 16:19:01 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:02:34:c6:22:e9:c3:5e:71:e7:50:e0:14:88:76:ec:
                    b1:f5:d9:3c:84:33:7b:83:fc:f6:46:2e:89:ec:0a:28:
                    b0:68:65:15:e1:90:68:97:28:fc:4d:a3:62:5a:5f:2d:
                    b7:70:80:3c:a4:ab:77:b1:81:86:1b:57:56:d4:b0:b8:
                    e2:b0:3a:fb:52:4a:65:79:1a:3f:32:7b:65:1a:70:95:
                    27:25:b7:9f:64:fc:71:f7:57:fc:c8:2b:51:2e:59:3f:
                    9a:72:55:36:75:64:2e:cb:a6:4e:c1:04:88:cd:c2:21:
                    81:a7:84:a7:51:dd:0b:d1:ea:13:59:98:e0:2c:a7:2f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3c:bd:f7:7d:4a:07:d0:8f:85:7b:33:08:9b:e9:0b:4d:
        32:97:64:93:1e:4c:f9:67:fd:e7:30:09:c3:63:7e:53:
        2e:8f:b2:29:4c:38:c1:ec:d9:a0:a1:a7:a7:43:64:d3:
        92:8e:37:3a:5d:61:45:4a:3d:9d:a0:eb:16:fc:21:f4:
        11:72:4a:93:9b:3c:a9:79:85:34:c5:c6:ec:9b:cd:63:
        d5:3f:0b:2d:8c:38:76:f0:b5:e1:45:16:99:bd:fe:c2:
        8b:6e:52:1e:c8:ac:97:61:e7:a6:e3:7b:71:49:da:dd:
        d8:f8:97:81:a7:8c:80:78:5e:10:76:b3:f1:a2:d3:61
    Fingerprint (MD5):
        C4:19:41:C1:F0:A4:87:00:8A:A8:03:6D:35:55:15:1C
    Fingerprint (SHA1):
        EA:5D:4C:8E:49:5A:FE:58:A7:AC:8F:BC:1D:15:D4:FF:05:DA:91:A6

    Friendly Name: Alice

tools.sh: #8642: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8643: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8644: Exporting with [AES-256-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        52:f4:ff:15:d7:ae:b0:e5:d5:4a:2a:ac:93:a3:ee:71
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-256-CBC
                Args:
                    04:10:3b:63:48:48:b9:41:25:be:67:36:5b:6a:ad:12:
                    41:c6
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:18:03 2012
            Not After : Tue Nov 28 16:18:03 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:e9:64:95:bb:eb:65:9a:03:e1:3f:e2:a9:8a:8b:76:
                    15:cd:13:07:7a:34:c8:39:2b:31:77:67:3f:d9:20:9b:
                    d2:68:3d:31:91:b7:73:f0:f1:46:eb:8c:ca:e9:18:3c:
                    59:dc:9f:13:aa:78:18:20:93:36:ae:72:ad:d9:12:2c:
                    02:01:d8:04:6e:84:fa:e7:07:0c:0a:33:20:ff:16:4d:
                    6a:13:af:29:d9:5d:30:0d:f7:82:4c:67:51:06:d0:0f:
                    b1:66:a5:a7:f4:42:2b:85:15:4c:57:bd:20:f7:23:a7:
                    a8:ec:83:f1:18:d2:8d:b8:32:c6:6a:89:08:4e:79:81
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        35:e8:a2:8f:ac:27:ea:19:d7:df:77:ed:c7:08:e8:90:
        9d:e9:7d:ba:1f:de:07:33:28:72:89:5b:a0:70:ed:7e:
        a3:b1:24:01:13:9c:72:2b:42:37:80:4f:77:b4:43:a9:
        d5:d4:79:10:c3:33:21:ee:f0:5a:4e:a7:03:e0:48:6d:
        1a:7e:5d:af:f9:bb:5f:96:94:8d:70:ee:b7:0a:a4:4f:
        30:9b:b0:15:2e:44:2f:da:12:fc:42:5d:fc:7a:13:73:
        2b:8e:f5:7c:70:11:e1:c4:2f:bf:33:33:9c:16:22:34:
        b7:83:7d:b1:86:5f:23:bd:be:dc:7a:ef:63:4d:d8:66
    Fingerprint (MD5):
        24:C3:FA:7B:B8:87:9E:56:B4:F6:44:8E:C6:12:2F:CE
    Fingerprint (SHA1):
        44:0F:DE:39:C3:51:19:48:3B:F9:DB:9A:8B:D8:0F:D8:5A:E1:80:81

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:19:01 2012
            Not After : Tue Nov 28 16:19:01 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:02:34:c6:22:e9:c3:5e:71:e7:50:e0:14:88:76:ec:
                    b1:f5:d9:3c:84:33:7b:83:fc:f6:46:2e:89:ec:0a:28:
                    b0:68:65:15:e1:90:68:97:28:fc:4d:a3:62:5a:5f:2d:
                    b7:70:80:3c:a4:ab:77:b1:81:86:1b:57:56:d4:b0:b8:
                    e2:b0:3a:fb:52:4a:65:79:1a:3f:32:7b:65:1a:70:95:
                    27:25:b7:9f:64:fc:71:f7:57:fc:c8:2b:51:2e:59:3f:
                    9a:72:55:36:75:64:2e:cb:a6:4e:c1:04:88:cd:c2:21:
                    81:a7:84:a7:51:dd:0b:d1:ea:13:59:98:e0:2c:a7:2f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3c:bd:f7:7d:4a:07:d0:8f:85:7b:33:08:9b:e9:0b:4d:
        32:97:64:93:1e:4c:f9:67:fd:e7:30:09:c3:63:7e:53:
        2e:8f:b2:29:4c:38:c1:ec:d9:a0:a1:a7:a7:43:64:d3:
        92:8e:37:3a:5d:61:45:4a:3d:9d:a0:eb:16:fc:21:f4:
        11:72:4a:93:9b:3c:a9:79:85:34:c5:c6:ec:9b:cd:63:
        d5:3f:0b:2d:8c:38:76:f0:b5:e1:45:16:99:bd:fe:c2:
        8b:6e:52:1e:c8:ac:97:61:e7:a6:e3:7b:71:49:da:dd:
        d8:f8:97:81:a7:8c:80:78:5e:10:76:b3:f1:a2:d3:61
    Fingerprint (MD5):
        C4:19:41:C1:F0:A4:87:00:8A:A8:03:6D:35:55:15:1C
    Fingerprint (SHA1):
        EA:5D:4C:8E:49:5A:FE:58:A7:AC:8F:BC:1D:15:D4:FF:05:DA:91:A6

    Friendly Name: Alice

tools.sh: #8645: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8646: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8647: Exporting with [AES-256-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:18:03 2012
            Not After : Tue Nov 28 16:18:03 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:e9:64:95:bb:eb:65:9a:03:e1:3f:e2:a9:8a:8b:76:
                    15:cd:13:07:7a:34:c8:39:2b:31:77:67:3f:d9:20:9b:
                    d2:68:3d:31:91:b7:73:f0:f1:46:eb:8c:ca:e9:18:3c:
                    59:dc:9f:13:aa:78:18:20:93:36:ae:72:ad:d9:12:2c:
                    02:01:d8:04:6e:84:fa:e7:07:0c:0a:33:20:ff:16:4d:
                    6a:13:af:29:d9:5d:30:0d:f7:82:4c:67:51:06:d0:0f:
                    b1:66:a5:a7:f4:42:2b:85:15:4c:57:bd:20:f7:23:a7:
                    a8:ec:83:f1:18:d2:8d:b8:32:c6:6a:89:08:4e:79:81
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        35:e8:a2:8f:ac:27:ea:19:d7:df:77:ed:c7:08:e8:90:
        9d:e9:7d:ba:1f:de:07:33:28:72:89:5b:a0:70:ed:7e:
        a3:b1:24:01:13:9c:72:2b:42:37:80:4f:77:b4:43:a9:
        d5:d4:79:10:c3:33:21:ee:f0:5a:4e:a7:03:e0:48:6d:
        1a:7e:5d:af:f9:bb:5f:96:94:8d:70:ee:b7:0a:a4:4f:
        30:9b:b0:15:2e:44:2f:da:12:fc:42:5d:fc:7a:13:73:
        2b:8e:f5:7c:70:11:e1:c4:2f:bf:33:33:9c:16:22:34:
        b7:83:7d:b1:86:5f:23:bd:be:dc:7a:ef:63:4d:d8:66
    Fingerprint (MD5):
        24:C3:FA:7B:B8:87:9E:56:B4:F6:44:8E:C6:12:2F:CE
    Fingerprint (SHA1):
        44:0F:DE:39:C3:51:19:48:3B:F9:DB:9A:8B:D8:0F:D8:5A:E1:80:81

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:19:01 2012
            Not After : Tue Nov 28 16:19:01 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:02:34:c6:22:e9:c3:5e:71:e7:50:e0:14:88:76:ec:
                    b1:f5:d9:3c:84:33:7b:83:fc:f6:46:2e:89:ec:0a:28:
                    b0:68:65:15:e1:90:68:97:28:fc:4d:a3:62:5a:5f:2d:
                    b7:70:80:3c:a4:ab:77:b1:81:86:1b:57:56:d4:b0:b8:
                    e2:b0:3a:fb:52:4a:65:79:1a:3f:32:7b:65:1a:70:95:
                    27:25:b7:9f:64:fc:71:f7:57:fc:c8:2b:51:2e:59:3f:
                    9a:72:55:36:75:64:2e:cb:a6:4e:c1:04:88:cd:c2:21:
                    81:a7:84:a7:51:dd:0b:d1:ea:13:59:98:e0:2c:a7:2f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3c:bd:f7:7d:4a:07:d0:8f:85:7b:33:08:9b:e9:0b:4d:
        32:97:64:93:1e:4c:f9:67:fd:e7:30:09:c3:63:7e:53:
        2e:8f:b2:29:4c:38:c1:ec:d9:a0:a1:a7:a7:43:64:d3:
        92:8e:37:3a:5d:61:45:4a:3d:9d:a0:eb:16:fc:21:f4:
        11:72:4a:93:9b:3c:a9:79:85:34:c5:c6:ec:9b:cd:63:
        d5:3f:0b:2d:8c:38:76:f0:b5:e1:45:16:99:bd:fe:c2:
        8b:6e:52:1e:c8:ac:97:61:e7:a6:e3:7b:71:49:da:dd:
        d8:f8:97:81:a7:8c:80:78:5e:10:76:b3:f1:a2:d3:61
    Fingerprint (MD5):
        C4:19:41:C1:F0:A4:87:00:8A:A8:03:6D:35:55:15:1C
    Fingerprint (SHA1):
        EA:5D:4C:8E:49:5A:FE:58:A7:AC:8F:BC:1D:15:D4:FF:05:DA:91:A6

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        be:f7:92:53:ca:3a:33:c6:99:77:d7:c6:d1:10:c2:db
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-256-CBC
                Args:
                    04:10:0c:82:37:42:85:5c:f6:f9:ad:02:df:19:f6:33:
                    16:1d
tools.sh: #8648: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8649: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8650: Exporting with [CAMELLIA-128-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        24:50:03:d1:1c:3c:f8:57:ef:a3:bf:49:09:70:5a:74
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-128-CBC
                Args:
                    04:10:1e:80:07:6b:f1:c3:53:fc:8e:e8:23:87:b6:e9:
                    13:99
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:18:03 2012
            Not After : Tue Nov 28 16:18:03 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:e9:64:95:bb:eb:65:9a:03:e1:3f:e2:a9:8a:8b:76:
                    15:cd:13:07:7a:34:c8:39:2b:31:77:67:3f:d9:20:9b:
                    d2:68:3d:31:91:b7:73:f0:f1:46:eb:8c:ca:e9:18:3c:
                    59:dc:9f:13:aa:78:18:20:93:36:ae:72:ad:d9:12:2c:
                    02:01:d8:04:6e:84:fa:e7:07:0c:0a:33:20:ff:16:4d:
                    6a:13:af:29:d9:5d:30:0d:f7:82:4c:67:51:06:d0:0f:
                    b1:66:a5:a7:f4:42:2b:85:15:4c:57:bd:20:f7:23:a7:
                    a8:ec:83:f1:18:d2:8d:b8:32:c6:6a:89:08:4e:79:81
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        35:e8:a2:8f:ac:27:ea:19:d7:df:77:ed:c7:08:e8:90:
        9d:e9:7d:ba:1f:de:07:33:28:72:89:5b:a0:70:ed:7e:
        a3:b1:24:01:13:9c:72:2b:42:37:80:4f:77:b4:43:a9:
        d5:d4:79:10:c3:33:21:ee:f0:5a:4e:a7:03:e0:48:6d:
        1a:7e:5d:af:f9:bb:5f:96:94:8d:70:ee:b7:0a:a4:4f:
        30:9b:b0:15:2e:44:2f:da:12:fc:42:5d:fc:7a:13:73:
        2b:8e:f5:7c:70:11:e1:c4:2f:bf:33:33:9c:16:22:34:
        b7:83:7d:b1:86:5f:23:bd:be:dc:7a:ef:63:4d:d8:66
    Fingerprint (MD5):
        24:C3:FA:7B:B8:87:9E:56:B4:F6:44:8E:C6:12:2F:CE
    Fingerprint (SHA1):
        44:0F:DE:39:C3:51:19:48:3B:F9:DB:9A:8B:D8:0F:D8:5A:E1:80:81

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:19:01 2012
            Not After : Tue Nov 28 16:19:01 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:02:34:c6:22:e9:c3:5e:71:e7:50:e0:14:88:76:ec:
                    b1:f5:d9:3c:84:33:7b:83:fc:f6:46:2e:89:ec:0a:28:
                    b0:68:65:15:e1:90:68:97:28:fc:4d:a3:62:5a:5f:2d:
                    b7:70:80:3c:a4:ab:77:b1:81:86:1b:57:56:d4:b0:b8:
                    e2:b0:3a:fb:52:4a:65:79:1a:3f:32:7b:65:1a:70:95:
                    27:25:b7:9f:64:fc:71:f7:57:fc:c8:2b:51:2e:59:3f:
                    9a:72:55:36:75:64:2e:cb:a6:4e:c1:04:88:cd:c2:21:
                    81:a7:84:a7:51:dd:0b:d1:ea:13:59:98:e0:2c:a7:2f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3c:bd:f7:7d:4a:07:d0:8f:85:7b:33:08:9b:e9:0b:4d:
        32:97:64:93:1e:4c:f9:67:fd:e7:30:09:c3:63:7e:53:
        2e:8f:b2:29:4c:38:c1:ec:d9:a0:a1:a7:a7:43:64:d3:
        92:8e:37:3a:5d:61:45:4a:3d:9d:a0:eb:16:fc:21:f4:
        11:72:4a:93:9b:3c:a9:79:85:34:c5:c6:ec:9b:cd:63:
        d5:3f:0b:2d:8c:38:76:f0:b5:e1:45:16:99:bd:fe:c2:
        8b:6e:52:1e:c8:ac:97:61:e7:a6:e3:7b:71:49:da:dd:
        d8:f8:97:81:a7:8c:80:78:5e:10:76:b3:f1:a2:d3:61
    Fingerprint (MD5):
        C4:19:41:C1:F0:A4:87:00:8A:A8:03:6D:35:55:15:1C
    Fingerprint (SHA1):
        EA:5D:4C:8E:49:5A:FE:58:A7:AC:8F:BC:1D:15:D4:FF:05:DA:91:A6

    Friendly Name: Alice

tools.sh: #8651: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8652: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8653: Exporting with [CAMELLIA-128-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        47:2c:16:a3:d3:b7:1a:2d:31:9c:f5:99:86:de:61:1d
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-128-CBC
                Args:
                    04:10:f4:6b:b2:2d:d7:89:ce:e9:9b:55:25:55:f0:b3:
                    3a:e7
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:18:03 2012
            Not After : Tue Nov 28 16:18:03 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:e9:64:95:bb:eb:65:9a:03:e1:3f:e2:a9:8a:8b:76:
                    15:cd:13:07:7a:34:c8:39:2b:31:77:67:3f:d9:20:9b:
                    d2:68:3d:31:91:b7:73:f0:f1:46:eb:8c:ca:e9:18:3c:
                    59:dc:9f:13:aa:78:18:20:93:36:ae:72:ad:d9:12:2c:
                    02:01:d8:04:6e:84:fa:e7:07:0c:0a:33:20:ff:16:4d:
                    6a:13:af:29:d9:5d:30:0d:f7:82:4c:67:51:06:d0:0f:
                    b1:66:a5:a7:f4:42:2b:85:15:4c:57:bd:20:f7:23:a7:
                    a8:ec:83:f1:18:d2:8d:b8:32:c6:6a:89:08:4e:79:81
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        35:e8:a2:8f:ac:27:ea:19:d7:df:77:ed:c7:08:e8:90:
        9d:e9:7d:ba:1f:de:07:33:28:72:89:5b:a0:70:ed:7e:
        a3:b1:24:01:13:9c:72:2b:42:37:80:4f:77:b4:43:a9:
        d5:d4:79:10:c3:33:21:ee:f0:5a:4e:a7:03:e0:48:6d:
        1a:7e:5d:af:f9:bb:5f:96:94:8d:70:ee:b7:0a:a4:4f:
        30:9b:b0:15:2e:44:2f:da:12:fc:42:5d:fc:7a:13:73:
        2b:8e:f5:7c:70:11:e1:c4:2f:bf:33:33:9c:16:22:34:
        b7:83:7d:b1:86:5f:23:bd:be:dc:7a:ef:63:4d:d8:66
    Fingerprint (MD5):
        24:C3:FA:7B:B8:87:9E:56:B4:F6:44:8E:C6:12:2F:CE
    Fingerprint (SHA1):
        44:0F:DE:39:C3:51:19:48:3B:F9:DB:9A:8B:D8:0F:D8:5A:E1:80:81

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:19:01 2012
            Not After : Tue Nov 28 16:19:01 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:02:34:c6:22:e9:c3:5e:71:e7:50:e0:14:88:76:ec:
                    b1:f5:d9:3c:84:33:7b:83:fc:f6:46:2e:89:ec:0a:28:
                    b0:68:65:15:e1:90:68:97:28:fc:4d:a3:62:5a:5f:2d:
                    b7:70:80:3c:a4:ab:77:b1:81:86:1b:57:56:d4:b0:b8:
                    e2:b0:3a:fb:52:4a:65:79:1a:3f:32:7b:65:1a:70:95:
                    27:25:b7:9f:64:fc:71:f7:57:fc:c8:2b:51:2e:59:3f:
                    9a:72:55:36:75:64:2e:cb:a6:4e:c1:04:88:cd:c2:21:
                    81:a7:84:a7:51:dd:0b:d1:ea:13:59:98:e0:2c:a7:2f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3c:bd:f7:7d:4a:07:d0:8f:85:7b:33:08:9b:e9:0b:4d:
        32:97:64:93:1e:4c:f9:67:fd:e7:30:09:c3:63:7e:53:
        2e:8f:b2:29:4c:38:c1:ec:d9:a0:a1:a7:a7:43:64:d3:
        92:8e:37:3a:5d:61:45:4a:3d:9d:a0:eb:16:fc:21:f4:
        11:72:4a:93:9b:3c:a9:79:85:34:c5:c6:ec:9b:cd:63:
        d5:3f:0b:2d:8c:38:76:f0:b5:e1:45:16:99:bd:fe:c2:
        8b:6e:52:1e:c8:ac:97:61:e7:a6:e3:7b:71:49:da:dd:
        d8:f8:97:81:a7:8c:80:78:5e:10:76:b3:f1:a2:d3:61
    Fingerprint (MD5):
        C4:19:41:C1:F0:A4:87:00:8A:A8:03:6D:35:55:15:1C
    Fingerprint (SHA1):
        EA:5D:4C:8E:49:5A:FE:58:A7:AC:8F:BC:1D:15:D4:FF:05:DA:91:A6

    Friendly Name: Alice

tools.sh: #8654: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8655: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8656: Exporting with [CAMELLIA-128-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:18:03 2012
            Not After : Tue Nov 28 16:18:03 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:e9:64:95:bb:eb:65:9a:03:e1:3f:e2:a9:8a:8b:76:
                    15:cd:13:07:7a:34:c8:39:2b:31:77:67:3f:d9:20:9b:
                    d2:68:3d:31:91:b7:73:f0:f1:46:eb:8c:ca:e9:18:3c:
                    59:dc:9f:13:aa:78:18:20:93:36:ae:72:ad:d9:12:2c:
                    02:01:d8:04:6e:84:fa:e7:07:0c:0a:33:20:ff:16:4d:
                    6a:13:af:29:d9:5d:30:0d:f7:82:4c:67:51:06:d0:0f:
                    b1:66:a5:a7:f4:42:2b:85:15:4c:57:bd:20:f7:23:a7:
                    a8:ec:83:f1:18:d2:8d:b8:32:c6:6a:89:08:4e:79:81
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        35:e8:a2:8f:ac:27:ea:19:d7:df:77:ed:c7:08:e8:90:
        9d:e9:7d:ba:1f:de:07:33:28:72:89:5b:a0:70:ed:7e:
        a3:b1:24:01:13:9c:72:2b:42:37:80:4f:77:b4:43:a9:
        d5:d4:79:10:c3:33:21:ee:f0:5a:4e:a7:03:e0:48:6d:
        1a:7e:5d:af:f9:bb:5f:96:94:8d:70:ee:b7:0a:a4:4f:
        30:9b:b0:15:2e:44:2f:da:12:fc:42:5d:fc:7a:13:73:
        2b:8e:f5:7c:70:11:e1:c4:2f:bf:33:33:9c:16:22:34:
        b7:83:7d:b1:86:5f:23:bd:be:dc:7a:ef:63:4d:d8:66
    Fingerprint (MD5):
        24:C3:FA:7B:B8:87:9E:56:B4:F6:44:8E:C6:12:2F:CE
    Fingerprint (SHA1):
        44:0F:DE:39:C3:51:19:48:3B:F9:DB:9A:8B:D8:0F:D8:5A:E1:80:81

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:19:01 2012
            Not After : Tue Nov 28 16:19:01 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:02:34:c6:22:e9:c3:5e:71:e7:50:e0:14:88:76:ec:
                    b1:f5:d9:3c:84:33:7b:83:fc:f6:46:2e:89:ec:0a:28:
                    b0:68:65:15:e1:90:68:97:28:fc:4d:a3:62:5a:5f:2d:
                    b7:70:80:3c:a4:ab:77:b1:81:86:1b:57:56:d4:b0:b8:
                    e2:b0:3a:fb:52:4a:65:79:1a:3f:32:7b:65:1a:70:95:
                    27:25:b7:9f:64:fc:71:f7:57:fc:c8:2b:51:2e:59:3f:
                    9a:72:55:36:75:64:2e:cb:a6:4e:c1:04:88:cd:c2:21:
                    81:a7:84:a7:51:dd:0b:d1:ea:13:59:98:e0:2c:a7:2f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3c:bd:f7:7d:4a:07:d0:8f:85:7b:33:08:9b:e9:0b:4d:
        32:97:64:93:1e:4c:f9:67:fd:e7:30:09:c3:63:7e:53:
        2e:8f:b2:29:4c:38:c1:ec:d9:a0:a1:a7:a7:43:64:d3:
        92:8e:37:3a:5d:61:45:4a:3d:9d:a0:eb:16:fc:21:f4:
        11:72:4a:93:9b:3c:a9:79:85:34:c5:c6:ec:9b:cd:63:
        d5:3f:0b:2d:8c:38:76:f0:b5:e1:45:16:99:bd:fe:c2:
        8b:6e:52:1e:c8:ac:97:61:e7:a6:e3:7b:71:49:da:dd:
        d8:f8:97:81:a7:8c:80:78:5e:10:76:b3:f1:a2:d3:61
    Fingerprint (MD5):
        C4:19:41:C1:F0:A4:87:00:8A:A8:03:6D:35:55:15:1C
    Fingerprint (SHA1):
        EA:5D:4C:8E:49:5A:FE:58:A7:AC:8F:BC:1D:15:D4:FF:05:DA:91:A6

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        a6:7b:1f:69:58:e2:99:a6:2e:68:e0:4e:bd:12:0e:62
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-128-CBC
                Args:
                    04:10:e0:5c:e2:8e:4d:c3:53:cc:b2:10:06:b5:7b:af:
                    db:44
tools.sh: #8657: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8658: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8659: Exporting with [CAMELLIA-192-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        2c:78:6e:f3:cb:57:8d:4d:d3:aa:19:50:09:9f:5b:24
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-192-CBC
                Args:
                    04:10:a9:e9:87:2f:78:67:66:41:15:d5:07:71:30:96:
                    61:43
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:18:03 2012
            Not After : Tue Nov 28 16:18:03 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:e9:64:95:bb:eb:65:9a:03:e1:3f:e2:a9:8a:8b:76:
                    15:cd:13:07:7a:34:c8:39:2b:31:77:67:3f:d9:20:9b:
                    d2:68:3d:31:91:b7:73:f0:f1:46:eb:8c:ca:e9:18:3c:
                    59:dc:9f:13:aa:78:18:20:93:36:ae:72:ad:d9:12:2c:
                    02:01:d8:04:6e:84:fa:e7:07:0c:0a:33:20:ff:16:4d:
                    6a:13:af:29:d9:5d:30:0d:f7:82:4c:67:51:06:d0:0f:
                    b1:66:a5:a7:f4:42:2b:85:15:4c:57:bd:20:f7:23:a7:
                    a8:ec:83:f1:18:d2:8d:b8:32:c6:6a:89:08:4e:79:81
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        35:e8:a2:8f:ac:27:ea:19:d7:df:77:ed:c7:08:e8:90:
        9d:e9:7d:ba:1f:de:07:33:28:72:89:5b:a0:70:ed:7e:
        a3:b1:24:01:13:9c:72:2b:42:37:80:4f:77:b4:43:a9:
        d5:d4:79:10:c3:33:21:ee:f0:5a:4e:a7:03:e0:48:6d:
        1a:7e:5d:af:f9:bb:5f:96:94:8d:70:ee:b7:0a:a4:4f:
        30:9b:b0:15:2e:44:2f:da:12:fc:42:5d:fc:7a:13:73:
        2b:8e:f5:7c:70:11:e1:c4:2f:bf:33:33:9c:16:22:34:
        b7:83:7d:b1:86:5f:23:bd:be:dc:7a:ef:63:4d:d8:66
    Fingerprint (MD5):
        24:C3:FA:7B:B8:87:9E:56:B4:F6:44:8E:C6:12:2F:CE
    Fingerprint (SHA1):
        44:0F:DE:39:C3:51:19:48:3B:F9:DB:9A:8B:D8:0F:D8:5A:E1:80:81

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:19:01 2012
            Not After : Tue Nov 28 16:19:01 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:02:34:c6:22:e9:c3:5e:71:e7:50:e0:14:88:76:ec:
                    b1:f5:d9:3c:84:33:7b:83:fc:f6:46:2e:89:ec:0a:28:
                    b0:68:65:15:e1:90:68:97:28:fc:4d:a3:62:5a:5f:2d:
                    b7:70:80:3c:a4:ab:77:b1:81:86:1b:57:56:d4:b0:b8:
                    e2:b0:3a:fb:52:4a:65:79:1a:3f:32:7b:65:1a:70:95:
                    27:25:b7:9f:64:fc:71:f7:57:fc:c8:2b:51:2e:59:3f:
                    9a:72:55:36:75:64:2e:cb:a6:4e:c1:04:88:cd:c2:21:
                    81:a7:84:a7:51:dd:0b:d1:ea:13:59:98:e0:2c:a7:2f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3c:bd:f7:7d:4a:07:d0:8f:85:7b:33:08:9b:e9:0b:4d:
        32:97:64:93:1e:4c:f9:67:fd:e7:30:09:c3:63:7e:53:
        2e:8f:b2:29:4c:38:c1:ec:d9:a0:a1:a7:a7:43:64:d3:
        92:8e:37:3a:5d:61:45:4a:3d:9d:a0:eb:16:fc:21:f4:
        11:72:4a:93:9b:3c:a9:79:85:34:c5:c6:ec:9b:cd:63:
        d5:3f:0b:2d:8c:38:76:f0:b5:e1:45:16:99:bd:fe:c2:
        8b:6e:52:1e:c8:ac:97:61:e7:a6:e3:7b:71:49:da:dd:
        d8:f8:97:81:a7:8c:80:78:5e:10:76:b3:f1:a2:d3:61
    Fingerprint (MD5):
        C4:19:41:C1:F0:A4:87:00:8A:A8:03:6D:35:55:15:1C
    Fingerprint (SHA1):
        EA:5D:4C:8E:49:5A:FE:58:A7:AC:8F:BC:1D:15:D4:FF:05:DA:91:A6

    Friendly Name: Alice

tools.sh: #8660: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8661: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8662: Exporting with [CAMELLIA-192-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        d4:51:83:58:f5:29:ca:2d:a2:5f:eb:4f:c6:1f:05:2e
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-192-CBC
                Args:
                    04:10:84:0e:7b:c2:c4:67:18:b9:5f:91:ab:42:be:42:
                    2b:44
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:18:03 2012
            Not After : Tue Nov 28 16:18:03 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:e9:64:95:bb:eb:65:9a:03:e1:3f:e2:a9:8a:8b:76:
                    15:cd:13:07:7a:34:c8:39:2b:31:77:67:3f:d9:20:9b:
                    d2:68:3d:31:91:b7:73:f0:f1:46:eb:8c:ca:e9:18:3c:
                    59:dc:9f:13:aa:78:18:20:93:36:ae:72:ad:d9:12:2c:
                    02:01:d8:04:6e:84:fa:e7:07:0c:0a:33:20:ff:16:4d:
                    6a:13:af:29:d9:5d:30:0d:f7:82:4c:67:51:06:d0:0f:
                    b1:66:a5:a7:f4:42:2b:85:15:4c:57:bd:20:f7:23:a7:
                    a8:ec:83:f1:18:d2:8d:b8:32:c6:6a:89:08:4e:79:81
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        35:e8:a2:8f:ac:27:ea:19:d7:df:77:ed:c7:08:e8:90:
        9d:e9:7d:ba:1f:de:07:33:28:72:89:5b:a0:70:ed:7e:
        a3:b1:24:01:13:9c:72:2b:42:37:80:4f:77:b4:43:a9:
        d5:d4:79:10:c3:33:21:ee:f0:5a:4e:a7:03:e0:48:6d:
        1a:7e:5d:af:f9:bb:5f:96:94:8d:70:ee:b7:0a:a4:4f:
        30:9b:b0:15:2e:44:2f:da:12:fc:42:5d:fc:7a:13:73:
        2b:8e:f5:7c:70:11:e1:c4:2f:bf:33:33:9c:16:22:34:
        b7:83:7d:b1:86:5f:23:bd:be:dc:7a:ef:63:4d:d8:66
    Fingerprint (MD5):
        24:C3:FA:7B:B8:87:9E:56:B4:F6:44:8E:C6:12:2F:CE
    Fingerprint (SHA1):
        44:0F:DE:39:C3:51:19:48:3B:F9:DB:9A:8B:D8:0F:D8:5A:E1:80:81

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:19:01 2012
            Not After : Tue Nov 28 16:19:01 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:02:34:c6:22:e9:c3:5e:71:e7:50:e0:14:88:76:ec:
                    b1:f5:d9:3c:84:33:7b:83:fc:f6:46:2e:89:ec:0a:28:
                    b0:68:65:15:e1:90:68:97:28:fc:4d:a3:62:5a:5f:2d:
                    b7:70:80:3c:a4:ab:77:b1:81:86:1b:57:56:d4:b0:b8:
                    e2:b0:3a:fb:52:4a:65:79:1a:3f:32:7b:65:1a:70:95:
                    27:25:b7:9f:64:fc:71:f7:57:fc:c8:2b:51:2e:59:3f:
                    9a:72:55:36:75:64:2e:cb:a6:4e:c1:04:88:cd:c2:21:
                    81:a7:84:a7:51:dd:0b:d1:ea:13:59:98:e0:2c:a7:2f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3c:bd:f7:7d:4a:07:d0:8f:85:7b:33:08:9b:e9:0b:4d:
        32:97:64:93:1e:4c:f9:67:fd:e7:30:09:c3:63:7e:53:
        2e:8f:b2:29:4c:38:c1:ec:d9:a0:a1:a7:a7:43:64:d3:
        92:8e:37:3a:5d:61:45:4a:3d:9d:a0:eb:16:fc:21:f4:
        11:72:4a:93:9b:3c:a9:79:85:34:c5:c6:ec:9b:cd:63:
        d5:3f:0b:2d:8c:38:76:f0:b5:e1:45:16:99:bd:fe:c2:
        8b:6e:52:1e:c8:ac:97:61:e7:a6:e3:7b:71:49:da:dd:
        d8:f8:97:81:a7:8c:80:78:5e:10:76:b3:f1:a2:d3:61
    Fingerprint (MD5):
        C4:19:41:C1:F0:A4:87:00:8A:A8:03:6D:35:55:15:1C
    Fingerprint (SHA1):
        EA:5D:4C:8E:49:5A:FE:58:A7:AC:8F:BC:1D:15:D4:FF:05:DA:91:A6

    Friendly Name: Alice

tools.sh: #8663: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8664: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8665: Exporting with [CAMELLIA-192-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:18:03 2012
            Not After : Tue Nov 28 16:18:03 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:e9:64:95:bb:eb:65:9a:03:e1:3f:e2:a9:8a:8b:76:
                    15:cd:13:07:7a:34:c8:39:2b:31:77:67:3f:d9:20:9b:
                    d2:68:3d:31:91:b7:73:f0:f1:46:eb:8c:ca:e9:18:3c:
                    59:dc:9f:13:aa:78:18:20:93:36:ae:72:ad:d9:12:2c:
                    02:01:d8:04:6e:84:fa:e7:07:0c:0a:33:20:ff:16:4d:
                    6a:13:af:29:d9:5d:30:0d:f7:82:4c:67:51:06:d0:0f:
                    b1:66:a5:a7:f4:42:2b:85:15:4c:57:bd:20:f7:23:a7:
                    a8:ec:83:f1:18:d2:8d:b8:32:c6:6a:89:08:4e:79:81
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        35:e8:a2:8f:ac:27:ea:19:d7:df:77:ed:c7:08:e8:90:
        9d:e9:7d:ba:1f:de:07:33:28:72:89:5b:a0:70:ed:7e:
        a3:b1:24:01:13:9c:72:2b:42:37:80:4f:77:b4:43:a9:
        d5:d4:79:10:c3:33:21:ee:f0:5a:4e:a7:03:e0:48:6d:
        1a:7e:5d:af:f9:bb:5f:96:94:8d:70:ee:b7:0a:a4:4f:
        30:9b:b0:15:2e:44:2f:da:12:fc:42:5d:fc:7a:13:73:
        2b:8e:f5:7c:70:11:e1:c4:2f:bf:33:33:9c:16:22:34:
        b7:83:7d:b1:86:5f:23:bd:be:dc:7a:ef:63:4d:d8:66
    Fingerprint (MD5):
        24:C3:FA:7B:B8:87:9E:56:B4:F6:44:8E:C6:12:2F:CE
    Fingerprint (SHA1):
        44:0F:DE:39:C3:51:19:48:3B:F9:DB:9A:8B:D8:0F:D8:5A:E1:80:81

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:19:01 2012
            Not After : Tue Nov 28 16:19:01 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:02:34:c6:22:e9:c3:5e:71:e7:50:e0:14:88:76:ec:
                    b1:f5:d9:3c:84:33:7b:83:fc:f6:46:2e:89:ec:0a:28:
                    b0:68:65:15:e1:90:68:97:28:fc:4d:a3:62:5a:5f:2d:
                    b7:70:80:3c:a4:ab:77:b1:81:86:1b:57:56:d4:b0:b8:
                    e2:b0:3a:fb:52:4a:65:79:1a:3f:32:7b:65:1a:70:95:
                    27:25:b7:9f:64:fc:71:f7:57:fc:c8:2b:51:2e:59:3f:
                    9a:72:55:36:75:64:2e:cb:a6:4e:c1:04:88:cd:c2:21:
                    81:a7:84:a7:51:dd:0b:d1:ea:13:59:98:e0:2c:a7:2f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3c:bd:f7:7d:4a:07:d0:8f:85:7b:33:08:9b:e9:0b:4d:
        32:97:64:93:1e:4c:f9:67:fd:e7:30:09:c3:63:7e:53:
        2e:8f:b2:29:4c:38:c1:ec:d9:a0:a1:a7:a7:43:64:d3:
        92:8e:37:3a:5d:61:45:4a:3d:9d:a0:eb:16:fc:21:f4:
        11:72:4a:93:9b:3c:a9:79:85:34:c5:c6:ec:9b:cd:63:
        d5:3f:0b:2d:8c:38:76:f0:b5:e1:45:16:99:bd:fe:c2:
        8b:6e:52:1e:c8:ac:97:61:e7:a6:e3:7b:71:49:da:dd:
        d8:f8:97:81:a7:8c:80:78:5e:10:76:b3:f1:a2:d3:61
    Fingerprint (MD5):
        C4:19:41:C1:F0:A4:87:00:8A:A8:03:6D:35:55:15:1C
    Fingerprint (SHA1):
        EA:5D:4C:8E:49:5A:FE:58:A7:AC:8F:BC:1D:15:D4:FF:05:DA:91:A6

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        4d:ba:c5:3e:ff:a2:5d:ff:9f:22:d2:b5:9b:a6:06:af
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-192-CBC
                Args:
                    04:10:e6:33:63:c3:0f:2f:97:48:6c:35:36:3c:54:71:
                    fe:4c
tools.sh: #8666: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8667: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8668: Exporting with [CAMELLIA-256-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        6f:ad:21:65:4b:99:8a:52:26:b1:0f:ed:3c:0b:b5:14
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-256-CBC
                Args:
                    04:10:4d:78:15:8d:3e:4f:c3:fa:be:3c:83:c6:4e:a7:
                    b0:b9
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:18:03 2012
            Not After : Tue Nov 28 16:18:03 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:e9:64:95:bb:eb:65:9a:03:e1:3f:e2:a9:8a:8b:76:
                    15:cd:13:07:7a:34:c8:39:2b:31:77:67:3f:d9:20:9b:
                    d2:68:3d:31:91:b7:73:f0:f1:46:eb:8c:ca:e9:18:3c:
                    59:dc:9f:13:aa:78:18:20:93:36:ae:72:ad:d9:12:2c:
                    02:01:d8:04:6e:84:fa:e7:07:0c:0a:33:20:ff:16:4d:
                    6a:13:af:29:d9:5d:30:0d:f7:82:4c:67:51:06:d0:0f:
                    b1:66:a5:a7:f4:42:2b:85:15:4c:57:bd:20:f7:23:a7:
                    a8:ec:83:f1:18:d2:8d:b8:32:c6:6a:89:08:4e:79:81
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        35:e8:a2:8f:ac:27:ea:19:d7:df:77:ed:c7:08:e8:90:
        9d:e9:7d:ba:1f:de:07:33:28:72:89:5b:a0:70:ed:7e:
        a3:b1:24:01:13:9c:72:2b:42:37:80:4f:77:b4:43:a9:
        d5:d4:79:10:c3:33:21:ee:f0:5a:4e:a7:03:e0:48:6d:
        1a:7e:5d:af:f9:bb:5f:96:94:8d:70:ee:b7:0a:a4:4f:
        30:9b:b0:15:2e:44:2f:da:12:fc:42:5d:fc:7a:13:73:
        2b:8e:f5:7c:70:11:e1:c4:2f:bf:33:33:9c:16:22:34:
        b7:83:7d:b1:86:5f:23:bd:be:dc:7a:ef:63:4d:d8:66
    Fingerprint (MD5):
        24:C3:FA:7B:B8:87:9E:56:B4:F6:44:8E:C6:12:2F:CE
    Fingerprint (SHA1):
        44:0F:DE:39:C3:51:19:48:3B:F9:DB:9A:8B:D8:0F:D8:5A:E1:80:81

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:19:01 2012
            Not After : Tue Nov 28 16:19:01 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:02:34:c6:22:e9:c3:5e:71:e7:50:e0:14:88:76:ec:
                    b1:f5:d9:3c:84:33:7b:83:fc:f6:46:2e:89:ec:0a:28:
                    b0:68:65:15:e1:90:68:97:28:fc:4d:a3:62:5a:5f:2d:
                    b7:70:80:3c:a4:ab:77:b1:81:86:1b:57:56:d4:b0:b8:
                    e2:b0:3a:fb:52:4a:65:79:1a:3f:32:7b:65:1a:70:95:
                    27:25:b7:9f:64:fc:71:f7:57:fc:c8:2b:51:2e:59:3f:
                    9a:72:55:36:75:64:2e:cb:a6:4e:c1:04:88:cd:c2:21:
                    81:a7:84:a7:51:dd:0b:d1:ea:13:59:98:e0:2c:a7:2f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3c:bd:f7:7d:4a:07:d0:8f:85:7b:33:08:9b:e9:0b:4d:
        32:97:64:93:1e:4c:f9:67:fd:e7:30:09:c3:63:7e:53:
        2e:8f:b2:29:4c:38:c1:ec:d9:a0:a1:a7:a7:43:64:d3:
        92:8e:37:3a:5d:61:45:4a:3d:9d:a0:eb:16:fc:21:f4:
        11:72:4a:93:9b:3c:a9:79:85:34:c5:c6:ec:9b:cd:63:
        d5:3f:0b:2d:8c:38:76:f0:b5:e1:45:16:99:bd:fe:c2:
        8b:6e:52:1e:c8:ac:97:61:e7:a6:e3:7b:71:49:da:dd:
        d8:f8:97:81:a7:8c:80:78:5e:10:76:b3:f1:a2:d3:61
    Fingerprint (MD5):
        C4:19:41:C1:F0:A4:87:00:8A:A8:03:6D:35:55:15:1C
    Fingerprint (SHA1):
        EA:5D:4C:8E:49:5A:FE:58:A7:AC:8F:BC:1D:15:D4:FF:05:DA:91:A6

    Friendly Name: Alice

tools.sh: #8669: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8670: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8671: Exporting with [CAMELLIA-256-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        15:65:bc:ae:42:83:41:d7:35:00:03:c7:09:7c:ce:45
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-256-CBC
                Args:
                    04:10:b1:2e:9f:00:1b:68:0f:5e:0b:cf:58:12:40:56:
                    e6:f7
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:18:03 2012
            Not After : Tue Nov 28 16:18:03 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:e9:64:95:bb:eb:65:9a:03:e1:3f:e2:a9:8a:8b:76:
                    15:cd:13:07:7a:34:c8:39:2b:31:77:67:3f:d9:20:9b:
                    d2:68:3d:31:91:b7:73:f0:f1:46:eb:8c:ca:e9:18:3c:
                    59:dc:9f:13:aa:78:18:20:93:36:ae:72:ad:d9:12:2c:
                    02:01:d8:04:6e:84:fa:e7:07:0c:0a:33:20:ff:16:4d:
                    6a:13:af:29:d9:5d:30:0d:f7:82:4c:67:51:06:d0:0f:
                    b1:66:a5:a7:f4:42:2b:85:15:4c:57:bd:20:f7:23:a7:
                    a8:ec:83:f1:18:d2:8d:b8:32:c6:6a:89:08:4e:79:81
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        35:e8:a2:8f:ac:27:ea:19:d7:df:77:ed:c7:08:e8:90:
        9d:e9:7d:ba:1f:de:07:33:28:72:89:5b:a0:70:ed:7e:
        a3:b1:24:01:13:9c:72:2b:42:37:80:4f:77:b4:43:a9:
        d5:d4:79:10:c3:33:21:ee:f0:5a:4e:a7:03:e0:48:6d:
        1a:7e:5d:af:f9:bb:5f:96:94:8d:70:ee:b7:0a:a4:4f:
        30:9b:b0:15:2e:44:2f:da:12:fc:42:5d:fc:7a:13:73:
        2b:8e:f5:7c:70:11:e1:c4:2f:bf:33:33:9c:16:22:34:
        b7:83:7d:b1:86:5f:23:bd:be:dc:7a:ef:63:4d:d8:66
    Fingerprint (MD5):
        24:C3:FA:7B:B8:87:9E:56:B4:F6:44:8E:C6:12:2F:CE
    Fingerprint (SHA1):
        44:0F:DE:39:C3:51:19:48:3B:F9:DB:9A:8B:D8:0F:D8:5A:E1:80:81

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:19:01 2012
            Not After : Tue Nov 28 16:19:01 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:02:34:c6:22:e9:c3:5e:71:e7:50:e0:14:88:76:ec:
                    b1:f5:d9:3c:84:33:7b:83:fc:f6:46:2e:89:ec:0a:28:
                    b0:68:65:15:e1:90:68:97:28:fc:4d:a3:62:5a:5f:2d:
                    b7:70:80:3c:a4:ab:77:b1:81:86:1b:57:56:d4:b0:b8:
                    e2:b0:3a:fb:52:4a:65:79:1a:3f:32:7b:65:1a:70:95:
                    27:25:b7:9f:64:fc:71:f7:57:fc:c8:2b:51:2e:59:3f:
                    9a:72:55:36:75:64:2e:cb:a6:4e:c1:04:88:cd:c2:21:
                    81:a7:84:a7:51:dd:0b:d1:ea:13:59:98:e0:2c:a7:2f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3c:bd:f7:7d:4a:07:d0:8f:85:7b:33:08:9b:e9:0b:4d:
        32:97:64:93:1e:4c:f9:67:fd:e7:30:09:c3:63:7e:53:
        2e:8f:b2:29:4c:38:c1:ec:d9:a0:a1:a7:a7:43:64:d3:
        92:8e:37:3a:5d:61:45:4a:3d:9d:a0:eb:16:fc:21:f4:
        11:72:4a:93:9b:3c:a9:79:85:34:c5:c6:ec:9b:cd:63:
        d5:3f:0b:2d:8c:38:76:f0:b5:e1:45:16:99:bd:fe:c2:
        8b:6e:52:1e:c8:ac:97:61:e7:a6:e3:7b:71:49:da:dd:
        d8:f8:97:81:a7:8c:80:78:5e:10:76:b3:f1:a2:d3:61
    Fingerprint (MD5):
        C4:19:41:C1:F0:A4:87:00:8A:A8:03:6D:35:55:15:1C
    Fingerprint (SHA1):
        EA:5D:4C:8E:49:5A:FE:58:A7:AC:8F:BC:1D:15:D4:FF:05:DA:91:A6

    Friendly Name: Alice

tools.sh: #8672: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8673: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8674: Exporting with [CAMELLIA-256-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:18:03 2012
            Not After : Tue Nov 28 16:18:03 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:e9:64:95:bb:eb:65:9a:03:e1:3f:e2:a9:8a:8b:76:
                    15:cd:13:07:7a:34:c8:39:2b:31:77:67:3f:d9:20:9b:
                    d2:68:3d:31:91:b7:73:f0:f1:46:eb:8c:ca:e9:18:3c:
                    59:dc:9f:13:aa:78:18:20:93:36:ae:72:ad:d9:12:2c:
                    02:01:d8:04:6e:84:fa:e7:07:0c:0a:33:20:ff:16:4d:
                    6a:13:af:29:d9:5d:30:0d:f7:82:4c:67:51:06:d0:0f:
                    b1:66:a5:a7:f4:42:2b:85:15:4c:57:bd:20:f7:23:a7:
                    a8:ec:83:f1:18:d2:8d:b8:32:c6:6a:89:08:4e:79:81
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        35:e8:a2:8f:ac:27:ea:19:d7:df:77:ed:c7:08:e8:90:
        9d:e9:7d:ba:1f:de:07:33:28:72:89:5b:a0:70:ed:7e:
        a3:b1:24:01:13:9c:72:2b:42:37:80:4f:77:b4:43:a9:
        d5:d4:79:10:c3:33:21:ee:f0:5a:4e:a7:03:e0:48:6d:
        1a:7e:5d:af:f9:bb:5f:96:94:8d:70:ee:b7:0a:a4:4f:
        30:9b:b0:15:2e:44:2f:da:12:fc:42:5d:fc:7a:13:73:
        2b:8e:f5:7c:70:11:e1:c4:2f:bf:33:33:9c:16:22:34:
        b7:83:7d:b1:86:5f:23:bd:be:dc:7a:ef:63:4d:d8:66
    Fingerprint (MD5):
        24:C3:FA:7B:B8:87:9E:56:B4:F6:44:8E:C6:12:2F:CE
    Fingerprint (SHA1):
        44:0F:DE:39:C3:51:19:48:3B:F9:DB:9A:8B:D8:0F:D8:5A:E1:80:81

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:19:01 2012
            Not After : Tue Nov 28 16:19:01 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:02:34:c6:22:e9:c3:5e:71:e7:50:e0:14:88:76:ec:
                    b1:f5:d9:3c:84:33:7b:83:fc:f6:46:2e:89:ec:0a:28:
                    b0:68:65:15:e1:90:68:97:28:fc:4d:a3:62:5a:5f:2d:
                    b7:70:80:3c:a4:ab:77:b1:81:86:1b:57:56:d4:b0:b8:
                    e2:b0:3a:fb:52:4a:65:79:1a:3f:32:7b:65:1a:70:95:
                    27:25:b7:9f:64:fc:71:f7:57:fc:c8:2b:51:2e:59:3f:
                    9a:72:55:36:75:64:2e:cb:a6:4e:c1:04:88:cd:c2:21:
                    81:a7:84:a7:51:dd:0b:d1:ea:13:59:98:e0:2c:a7:2f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3c:bd:f7:7d:4a:07:d0:8f:85:7b:33:08:9b:e9:0b:4d:
        32:97:64:93:1e:4c:f9:67:fd:e7:30:09:c3:63:7e:53:
        2e:8f:b2:29:4c:38:c1:ec:d9:a0:a1:a7:a7:43:64:d3:
        92:8e:37:3a:5d:61:45:4a:3d:9d:a0:eb:16:fc:21:f4:
        11:72:4a:93:9b:3c:a9:79:85:34:c5:c6:ec:9b:cd:63:
        d5:3f:0b:2d:8c:38:76:f0:b5:e1:45:16:99:bd:fe:c2:
        8b:6e:52:1e:c8:ac:97:61:e7:a6:e3:7b:71:49:da:dd:
        d8:f8:97:81:a7:8c:80:78:5e:10:76:b3:f1:a2:d3:61
    Fingerprint (MD5):
        C4:19:41:C1:F0:A4:87:00:8A:A8:03:6D:35:55:15:1C
    Fingerprint (SHA1):
        EA:5D:4C:8E:49:5A:FE:58:A7:AC:8F:BC:1D:15:D4:FF:05:DA:91:A6

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        f6:93:01:1d:d7:65:e5:2a:8b:45:9f:e7:a3:e0:4a:bd
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-256-CBC
                Args:
                    04:10:2c:00:5b:09:d6:5c:92:55:88:d5:ea:3f:70:6f:
                    5f:1c
tools.sh: #8675: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8676: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8677: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
        Parameters:
            Salt:
                05:02:3d:5d:b1:b5:67:53:c4:28:8f:1f:aa:39:79:2c
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:18:03 2012
            Not After : Tue Nov 28 16:18:03 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:e9:64:95:bb:eb:65:9a:03:e1:3f:e2:a9:8a:8b:76:
                    15:cd:13:07:7a:34:c8:39:2b:31:77:67:3f:d9:20:9b:
                    d2:68:3d:31:91:b7:73:f0:f1:46:eb:8c:ca:e9:18:3c:
                    59:dc:9f:13:aa:78:18:20:93:36:ae:72:ad:d9:12:2c:
                    02:01:d8:04:6e:84:fa:e7:07:0c:0a:33:20:ff:16:4d:
                    6a:13:af:29:d9:5d:30:0d:f7:82:4c:67:51:06:d0:0f:
                    b1:66:a5:a7:f4:42:2b:85:15:4c:57:bd:20:f7:23:a7:
                    a8:ec:83:f1:18:d2:8d:b8:32:c6:6a:89:08:4e:79:81
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        35:e8:a2:8f:ac:27:ea:19:d7:df:77:ed:c7:08:e8:90:
        9d:e9:7d:ba:1f:de:07:33:28:72:89:5b:a0:70:ed:7e:
        a3:b1:24:01:13:9c:72:2b:42:37:80:4f:77:b4:43:a9:
        d5:d4:79:10:c3:33:21:ee:f0:5a:4e:a7:03:e0:48:6d:
        1a:7e:5d:af:f9:bb:5f:96:94:8d:70:ee:b7:0a:a4:4f:
        30:9b:b0:15:2e:44:2f:da:12:fc:42:5d:fc:7a:13:73:
        2b:8e:f5:7c:70:11:e1:c4:2f:bf:33:33:9c:16:22:34:
        b7:83:7d:b1:86:5f:23:bd:be:dc:7a:ef:63:4d:d8:66
    Fingerprint (MD5):
        24:C3:FA:7B:B8:87:9E:56:B4:F6:44:8E:C6:12:2F:CE
    Fingerprint (SHA1):
        44:0F:DE:39:C3:51:19:48:3B:F9:DB:9A:8B:D8:0F:D8:5A:E1:80:81

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:19:01 2012
            Not After : Tue Nov 28 16:19:01 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:02:34:c6:22:e9:c3:5e:71:e7:50:e0:14:88:76:ec:
                    b1:f5:d9:3c:84:33:7b:83:fc:f6:46:2e:89:ec:0a:28:
                    b0:68:65:15:e1:90:68:97:28:fc:4d:a3:62:5a:5f:2d:
                    b7:70:80:3c:a4:ab:77:b1:81:86:1b:57:56:d4:b0:b8:
                    e2:b0:3a:fb:52:4a:65:79:1a:3f:32:7b:65:1a:70:95:
                    27:25:b7:9f:64:fc:71:f7:57:fc:c8:2b:51:2e:59:3f:
                    9a:72:55:36:75:64:2e:cb:a6:4e:c1:04:88:cd:c2:21:
                    81:a7:84:a7:51:dd:0b:d1:ea:13:59:98:e0:2c:a7:2f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3c:bd:f7:7d:4a:07:d0:8f:85:7b:33:08:9b:e9:0b:4d:
        32:97:64:93:1e:4c:f9:67:fd:e7:30:09:c3:63:7e:53:
        2e:8f:b2:29:4c:38:c1:ec:d9:a0:a1:a7:a7:43:64:d3:
        92:8e:37:3a:5d:61:45:4a:3d:9d:a0:eb:16:fc:21:f4:
        11:72:4a:93:9b:3c:a9:79:85:34:c5:c6:ec:9b:cd:63:
        d5:3f:0b:2d:8c:38:76:f0:b5:e1:45:16:99:bd:fe:c2:
        8b:6e:52:1e:c8:ac:97:61:e7:a6:e3:7b:71:49:da:dd:
        d8:f8:97:81:a7:8c:80:78:5e:10:76:b3:f1:a2:d3:61
    Fingerprint (MD5):
        C4:19:41:C1:F0:A4:87:00:8A:A8:03:6D:35:55:15:1C
    Fingerprint (SHA1):
        EA:5D:4C:8E:49:5A:FE:58:A7:AC:8F:BC:1D:15:D4:FF:05:DA:91:A6

    Friendly Name: Alice

tools.sh: #8678: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8679: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8680: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
        Parameters:
            Salt:
                13:60:cd:54:93:89:de:f5:c2:c5:d0:d9:02:b0:67:34
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:18:03 2012
            Not After : Tue Nov 28 16:18:03 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:e9:64:95:bb:eb:65:9a:03:e1:3f:e2:a9:8a:8b:76:
                    15:cd:13:07:7a:34:c8:39:2b:31:77:67:3f:d9:20:9b:
                    d2:68:3d:31:91:b7:73:f0:f1:46:eb:8c:ca:e9:18:3c:
                    59:dc:9f:13:aa:78:18:20:93:36:ae:72:ad:d9:12:2c:
                    02:01:d8:04:6e:84:fa:e7:07:0c:0a:33:20:ff:16:4d:
                    6a:13:af:29:d9:5d:30:0d:f7:82:4c:67:51:06:d0:0f:
                    b1:66:a5:a7:f4:42:2b:85:15:4c:57:bd:20:f7:23:a7:
                    a8:ec:83:f1:18:d2:8d:b8:32:c6:6a:89:08:4e:79:81
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        35:e8:a2:8f:ac:27:ea:19:d7:df:77:ed:c7:08:e8:90:
        9d:e9:7d:ba:1f:de:07:33:28:72:89:5b:a0:70:ed:7e:
        a3:b1:24:01:13:9c:72:2b:42:37:80:4f:77:b4:43:a9:
        d5:d4:79:10:c3:33:21:ee:f0:5a:4e:a7:03:e0:48:6d:
        1a:7e:5d:af:f9:bb:5f:96:94:8d:70:ee:b7:0a:a4:4f:
        30:9b:b0:15:2e:44:2f:da:12:fc:42:5d:fc:7a:13:73:
        2b:8e:f5:7c:70:11:e1:c4:2f:bf:33:33:9c:16:22:34:
        b7:83:7d:b1:86:5f:23:bd:be:dc:7a:ef:63:4d:d8:66
    Fingerprint (MD5):
        24:C3:FA:7B:B8:87:9E:56:B4:F6:44:8E:C6:12:2F:CE
    Fingerprint (SHA1):
        44:0F:DE:39:C3:51:19:48:3B:F9:DB:9A:8B:D8:0F:D8:5A:E1:80:81

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:19:01 2012
            Not After : Tue Nov 28 16:19:01 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:02:34:c6:22:e9:c3:5e:71:e7:50:e0:14:88:76:ec:
                    b1:f5:d9:3c:84:33:7b:83:fc:f6:46:2e:89:ec:0a:28:
                    b0:68:65:15:e1:90:68:97:28:fc:4d:a3:62:5a:5f:2d:
                    b7:70:80:3c:a4:ab:77:b1:81:86:1b:57:56:d4:b0:b8:
                    e2:b0:3a:fb:52:4a:65:79:1a:3f:32:7b:65:1a:70:95:
                    27:25:b7:9f:64:fc:71:f7:57:fc:c8:2b:51:2e:59:3f:
                    9a:72:55:36:75:64:2e:cb:a6:4e:c1:04:88:cd:c2:21:
                    81:a7:84:a7:51:dd:0b:d1:ea:13:59:98:e0:2c:a7:2f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3c:bd:f7:7d:4a:07:d0:8f:85:7b:33:08:9b:e9:0b:4d:
        32:97:64:93:1e:4c:f9:67:fd:e7:30:09:c3:63:7e:53:
        2e:8f:b2:29:4c:38:c1:ec:d9:a0:a1:a7:a7:43:64:d3:
        92:8e:37:3a:5d:61:45:4a:3d:9d:a0:eb:16:fc:21:f4:
        11:72:4a:93:9b:3c:a9:79:85:34:c5:c6:ec:9b:cd:63:
        d5:3f:0b:2d:8c:38:76:f0:b5:e1:45:16:99:bd:fe:c2:
        8b:6e:52:1e:c8:ac:97:61:e7:a6:e3:7b:71:49:da:dd:
        d8:f8:97:81:a7:8c:80:78:5e:10:76:b3:f1:a2:d3:61
    Fingerprint (MD5):
        C4:19:41:C1:F0:A4:87:00:8A:A8:03:6D:35:55:15:1C
    Fingerprint (SHA1):
        EA:5D:4C:8E:49:5A:FE:58:A7:AC:8F:BC:1D:15:D4:FF:05:DA:91:A6

    Friendly Name: Alice

tools.sh: #8681: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8682: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8683: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
        Parameters:
            Salt:
                0e:ba:06:b5:fc:5b:ba:76:f8:7e:c3:2c:83:ea:88:5f
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:18:03 2012
            Not After : Tue Nov 28 16:18:03 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:e9:64:95:bb:eb:65:9a:03:e1:3f:e2:a9:8a:8b:76:
                    15:cd:13:07:7a:34:c8:39:2b:31:77:67:3f:d9:20:9b:
                    d2:68:3d:31:91:b7:73:f0:f1:46:eb:8c:ca:e9:18:3c:
                    59:dc:9f:13:aa:78:18:20:93:36:ae:72:ad:d9:12:2c:
                    02:01:d8:04:6e:84:fa:e7:07:0c:0a:33:20:ff:16:4d:
                    6a:13:af:29:d9:5d:30:0d:f7:82:4c:67:51:06:d0:0f:
                    b1:66:a5:a7:f4:42:2b:85:15:4c:57:bd:20:f7:23:a7:
                    a8:ec:83:f1:18:d2:8d:b8:32:c6:6a:89:08:4e:79:81
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        35:e8:a2:8f:ac:27:ea:19:d7:df:77:ed:c7:08:e8:90:
        9d:e9:7d:ba:1f:de:07:33:28:72:89:5b:a0:70:ed:7e:
        a3:b1:24:01:13:9c:72:2b:42:37:80:4f:77:b4:43:a9:
        d5:d4:79:10:c3:33:21:ee:f0:5a:4e:a7:03:e0:48:6d:
        1a:7e:5d:af:f9:bb:5f:96:94:8d:70:ee:b7:0a:a4:4f:
        30:9b:b0:15:2e:44:2f:da:12:fc:42:5d:fc:7a:13:73:
        2b:8e:f5:7c:70:11:e1:c4:2f:bf:33:33:9c:16:22:34:
        b7:83:7d:b1:86:5f:23:bd:be:dc:7a:ef:63:4d:d8:66
    Fingerprint (MD5):
        24:C3:FA:7B:B8:87:9E:56:B4:F6:44:8E:C6:12:2F:CE
    Fingerprint (SHA1):
        44:0F:DE:39:C3:51:19:48:3B:F9:DB:9A:8B:D8:0F:D8:5A:E1:80:81

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:19:01 2012
            Not After : Tue Nov 28 16:19:01 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:02:34:c6:22:e9:c3:5e:71:e7:50:e0:14:88:76:ec:
                    b1:f5:d9:3c:84:33:7b:83:fc:f6:46:2e:89:ec:0a:28:
                    b0:68:65:15:e1:90:68:97:28:fc:4d:a3:62:5a:5f:2d:
                    b7:70:80:3c:a4:ab:77:b1:81:86:1b:57:56:d4:b0:b8:
                    e2:b0:3a:fb:52:4a:65:79:1a:3f:32:7b:65:1a:70:95:
                    27:25:b7:9f:64:fc:71:f7:57:fc:c8:2b:51:2e:59:3f:
                    9a:72:55:36:75:64:2e:cb:a6:4e:c1:04:88:cd:c2:21:
                    81:a7:84:a7:51:dd:0b:d1:ea:13:59:98:e0:2c:a7:2f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3c:bd:f7:7d:4a:07:d0:8f:85:7b:33:08:9b:e9:0b:4d:
        32:97:64:93:1e:4c:f9:67:fd:e7:30:09:c3:63:7e:53:
        2e:8f:b2:29:4c:38:c1:ec:d9:a0:a1:a7:a7:43:64:d3:
        92:8e:37:3a:5d:61:45:4a:3d:9d:a0:eb:16:fc:21:f4:
        11:72:4a:93:9b:3c:a9:79:85:34:c5:c6:ec:9b:cd:63:
        d5:3f:0b:2d:8c:38:76:f0:b5:e1:45:16:99:bd:fe:c2:
        8b:6e:52:1e:c8:ac:97:61:e7:a6:e3:7b:71:49:da:dd:
        d8:f8:97:81:a7:8c:80:78:5e:10:76:b3:f1:a2:d3:61
    Fingerprint (MD5):
        C4:19:41:C1:F0:A4:87:00:8A:A8:03:6D:35:55:15:1C
    Fingerprint (SHA1):
        EA:5D:4C:8E:49:5A:FE:58:A7:AC:8F:BC:1D:15:D4:FF:05:DA:91:A6

    Friendly Name: Alice

tools.sh: #8684: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8685: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8686: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
        Parameters:
            Salt:
                5c:64:c7:d4:d1:56:24:c3:8a:f4:78:31:b7:71:10:73
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:18:03 2012
            Not After : Tue Nov 28 16:18:03 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:e9:64:95:bb:eb:65:9a:03:e1:3f:e2:a9:8a:8b:76:
                    15:cd:13:07:7a:34:c8:39:2b:31:77:67:3f:d9:20:9b:
                    d2:68:3d:31:91:b7:73:f0:f1:46:eb:8c:ca:e9:18:3c:
                    59:dc:9f:13:aa:78:18:20:93:36:ae:72:ad:d9:12:2c:
                    02:01:d8:04:6e:84:fa:e7:07:0c:0a:33:20:ff:16:4d:
                    6a:13:af:29:d9:5d:30:0d:f7:82:4c:67:51:06:d0:0f:
                    b1:66:a5:a7:f4:42:2b:85:15:4c:57:bd:20:f7:23:a7:
                    a8:ec:83:f1:18:d2:8d:b8:32:c6:6a:89:08:4e:79:81
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        35:e8:a2:8f:ac:27:ea:19:d7:df:77:ed:c7:08:e8:90:
        9d:e9:7d:ba:1f:de:07:33:28:72:89:5b:a0:70:ed:7e:
        a3:b1:24:01:13:9c:72:2b:42:37:80:4f:77:b4:43:a9:
        d5:d4:79:10:c3:33:21:ee:f0:5a:4e:a7:03:e0:48:6d:
        1a:7e:5d:af:f9:bb:5f:96:94:8d:70:ee:b7:0a:a4:4f:
        30:9b:b0:15:2e:44:2f:da:12:fc:42:5d:fc:7a:13:73:
        2b:8e:f5:7c:70:11:e1:c4:2f:bf:33:33:9c:16:22:34:
        b7:83:7d:b1:86:5f:23:bd:be:dc:7a:ef:63:4d:d8:66
    Fingerprint (MD5):
        24:C3:FA:7B:B8:87:9E:56:B4:F6:44:8E:C6:12:2F:CE
    Fingerprint (SHA1):
        44:0F:DE:39:C3:51:19:48:3B:F9:DB:9A:8B:D8:0F:D8:5A:E1:80:81

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:19:01 2012
            Not After : Tue Nov 28 16:19:01 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:02:34:c6:22:e9:c3:5e:71:e7:50:e0:14:88:76:ec:
                    b1:f5:d9:3c:84:33:7b:83:fc:f6:46:2e:89:ec:0a:28:
                    b0:68:65:15:e1:90:68:97:28:fc:4d:a3:62:5a:5f:2d:
                    b7:70:80:3c:a4:ab:77:b1:81:86:1b:57:56:d4:b0:b8:
                    e2:b0:3a:fb:52:4a:65:79:1a:3f:32:7b:65:1a:70:95:
                    27:25:b7:9f:64:fc:71:f7:57:fc:c8:2b:51:2e:59:3f:
                    9a:72:55:36:75:64:2e:cb:a6:4e:c1:04:88:cd:c2:21:
                    81:a7:84:a7:51:dd:0b:d1:ea:13:59:98:e0:2c:a7:2f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3c:bd:f7:7d:4a:07:d0:8f:85:7b:33:08:9b:e9:0b:4d:
        32:97:64:93:1e:4c:f9:67:fd:e7:30:09:c3:63:7e:53:
        2e:8f:b2:29:4c:38:c1:ec:d9:a0:a1:a7:a7:43:64:d3:
        92:8e:37:3a:5d:61:45:4a:3d:9d:a0:eb:16:fc:21:f4:
        11:72:4a:93:9b:3c:a9:79:85:34:c5:c6:ec:9b:cd:63:
        d5:3f:0b:2d:8c:38:76:f0:b5:e1:45:16:99:bd:fe:c2:
        8b:6e:52:1e:c8:ac:97:61:e7:a6:e3:7b:71:49:da:dd:
        d8:f8:97:81:a7:8c:80:78:5e:10:76:b3:f1:a2:d3:61
    Fingerprint (MD5):
        C4:19:41:C1:F0:A4:87:00:8A:A8:03:6D:35:55:15:1C
    Fingerprint (SHA1):
        EA:5D:4C:8E:49:5A:FE:58:A7:AC:8F:BC:1D:15:D4:FF:05:DA:91:A6

    Friendly Name: Alice

tools.sh: #8687: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8688: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8689: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:18:03 2012
            Not After : Tue Nov 28 16:18:03 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:e9:64:95:bb:eb:65:9a:03:e1:3f:e2:a9:8a:8b:76:
                    15:cd:13:07:7a:34:c8:39:2b:31:77:67:3f:d9:20:9b:
                    d2:68:3d:31:91:b7:73:f0:f1:46:eb:8c:ca:e9:18:3c:
                    59:dc:9f:13:aa:78:18:20:93:36:ae:72:ad:d9:12:2c:
                    02:01:d8:04:6e:84:fa:e7:07:0c:0a:33:20:ff:16:4d:
                    6a:13:af:29:d9:5d:30:0d:f7:82:4c:67:51:06:d0:0f:
                    b1:66:a5:a7:f4:42:2b:85:15:4c:57:bd:20:f7:23:a7:
                    a8:ec:83:f1:18:d2:8d:b8:32:c6:6a:89:08:4e:79:81
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        35:e8:a2:8f:ac:27:ea:19:d7:df:77:ed:c7:08:e8:90:
        9d:e9:7d:ba:1f:de:07:33:28:72:89:5b:a0:70:ed:7e:
        a3:b1:24:01:13:9c:72:2b:42:37:80:4f:77:b4:43:a9:
        d5:d4:79:10:c3:33:21:ee:f0:5a:4e:a7:03:e0:48:6d:
        1a:7e:5d:af:f9:bb:5f:96:94:8d:70:ee:b7:0a:a4:4f:
        30:9b:b0:15:2e:44:2f:da:12:fc:42:5d:fc:7a:13:73:
        2b:8e:f5:7c:70:11:e1:c4:2f:bf:33:33:9c:16:22:34:
        b7:83:7d:b1:86:5f:23:bd:be:dc:7a:ef:63:4d:d8:66
    Fingerprint (MD5):
        24:C3:FA:7B:B8:87:9E:56:B4:F6:44:8E:C6:12:2F:CE
    Fingerprint (SHA1):
        44:0F:DE:39:C3:51:19:48:3B:F9:DB:9A:8B:D8:0F:D8:5A:E1:80:81

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:19:01 2012
            Not After : Tue Nov 28 16:19:01 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:02:34:c6:22:e9:c3:5e:71:e7:50:e0:14:88:76:ec:
                    b1:f5:d9:3c:84:33:7b:83:fc:f6:46:2e:89:ec:0a:28:
                    b0:68:65:15:e1:90:68:97:28:fc:4d:a3:62:5a:5f:2d:
                    b7:70:80:3c:a4:ab:77:b1:81:86:1b:57:56:d4:b0:b8:
                    e2:b0:3a:fb:52:4a:65:79:1a:3f:32:7b:65:1a:70:95:
                    27:25:b7:9f:64:fc:71:f7:57:fc:c8:2b:51:2e:59:3f:
                    9a:72:55:36:75:64:2e:cb:a6:4e:c1:04:88:cd:c2:21:
                    81:a7:84:a7:51:dd:0b:d1:ea:13:59:98:e0:2c:a7:2f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3c:bd:f7:7d:4a:07:d0:8f:85:7b:33:08:9b:e9:0b:4d:
        32:97:64:93:1e:4c:f9:67:fd:e7:30:09:c3:63:7e:53:
        2e:8f:b2:29:4c:38:c1:ec:d9:a0:a1:a7:a7:43:64:d3:
        92:8e:37:3a:5d:61:45:4a:3d:9d:a0:eb:16:fc:21:f4:
        11:72:4a:93:9b:3c:a9:79:85:34:c5:c6:ec:9b:cd:63:
        d5:3f:0b:2d:8c:38:76:f0:b5:e1:45:16:99:bd:fe:c2:
        8b:6e:52:1e:c8:ac:97:61:e7:a6:e3:7b:71:49:da:dd:
        d8:f8:97:81:a7:8c:80:78:5e:10:76:b3:f1:a2:d3:61
    Fingerprint (MD5):
        C4:19:41:C1:F0:A4:87:00:8A:A8:03:6D:35:55:15:1C
    Fingerprint (SHA1):
        EA:5D:4C:8E:49:5A:FE:58:A7:AC:8F:BC:1D:15:D4:FF:05:DA:91:A6

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
        Parameters:
            Salt:
                77:3b:b7:01:66:bb:33:52:ae:d6:68:a3:15:ee:91:87
            Iteration Count: 2000 (0x7d0)
tools.sh: #8690: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8691: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8692: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
        Parameters:
            Salt:
                24:1a:b1:20:46:64:1a:95:a1:a6:6c:8d:08:0b:7a:6d
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:18:03 2012
            Not After : Tue Nov 28 16:18:03 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:e9:64:95:bb:eb:65:9a:03:e1:3f:e2:a9:8a:8b:76:
                    15:cd:13:07:7a:34:c8:39:2b:31:77:67:3f:d9:20:9b:
                    d2:68:3d:31:91:b7:73:f0:f1:46:eb:8c:ca:e9:18:3c:
                    59:dc:9f:13:aa:78:18:20:93:36:ae:72:ad:d9:12:2c:
                    02:01:d8:04:6e:84:fa:e7:07:0c:0a:33:20:ff:16:4d:
                    6a:13:af:29:d9:5d:30:0d:f7:82:4c:67:51:06:d0:0f:
                    b1:66:a5:a7:f4:42:2b:85:15:4c:57:bd:20:f7:23:a7:
                    a8:ec:83:f1:18:d2:8d:b8:32:c6:6a:89:08:4e:79:81
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        35:e8:a2:8f:ac:27:ea:19:d7:df:77:ed:c7:08:e8:90:
        9d:e9:7d:ba:1f:de:07:33:28:72:89:5b:a0:70:ed:7e:
        a3:b1:24:01:13:9c:72:2b:42:37:80:4f:77:b4:43:a9:
        d5:d4:79:10:c3:33:21:ee:f0:5a:4e:a7:03:e0:48:6d:
        1a:7e:5d:af:f9:bb:5f:96:94:8d:70:ee:b7:0a:a4:4f:
        30:9b:b0:15:2e:44:2f:da:12:fc:42:5d:fc:7a:13:73:
        2b:8e:f5:7c:70:11:e1:c4:2f:bf:33:33:9c:16:22:34:
        b7:83:7d:b1:86:5f:23:bd:be:dc:7a:ef:63:4d:d8:66
    Fingerprint (MD5):
        24:C3:FA:7B:B8:87:9E:56:B4:F6:44:8E:C6:12:2F:CE
    Fingerprint (SHA1):
        44:0F:DE:39:C3:51:19:48:3B:F9:DB:9A:8B:D8:0F:D8:5A:E1:80:81

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:19:01 2012
            Not After : Tue Nov 28 16:19:01 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:02:34:c6:22:e9:c3:5e:71:e7:50:e0:14:88:76:ec:
                    b1:f5:d9:3c:84:33:7b:83:fc:f6:46:2e:89:ec:0a:28:
                    b0:68:65:15:e1:90:68:97:28:fc:4d:a3:62:5a:5f:2d:
                    b7:70:80:3c:a4:ab:77:b1:81:86:1b:57:56:d4:b0:b8:
                    e2:b0:3a:fb:52:4a:65:79:1a:3f:32:7b:65:1a:70:95:
                    27:25:b7:9f:64:fc:71:f7:57:fc:c8:2b:51:2e:59:3f:
                    9a:72:55:36:75:64:2e:cb:a6:4e:c1:04:88:cd:c2:21:
                    81:a7:84:a7:51:dd:0b:d1:ea:13:59:98:e0:2c:a7:2f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3c:bd:f7:7d:4a:07:d0:8f:85:7b:33:08:9b:e9:0b:4d:
        32:97:64:93:1e:4c:f9:67:fd:e7:30:09:c3:63:7e:53:
        2e:8f:b2:29:4c:38:c1:ec:d9:a0:a1:a7:a7:43:64:d3:
        92:8e:37:3a:5d:61:45:4a:3d:9d:a0:eb:16:fc:21:f4:
        11:72:4a:93:9b:3c:a9:79:85:34:c5:c6:ec:9b:cd:63:
        d5:3f:0b:2d:8c:38:76:f0:b5:e1:45:16:99:bd:fe:c2:
        8b:6e:52:1e:c8:ac:97:61:e7:a6:e3:7b:71:49:da:dd:
        d8:f8:97:81:a7:8c:80:78:5e:10:76:b3:f1:a2:d3:61
    Fingerprint (MD5):
        C4:19:41:C1:F0:A4:87:00:8A:A8:03:6D:35:55:15:1C
    Fingerprint (SHA1):
        EA:5D:4C:8E:49:5A:FE:58:A7:AC:8F:BC:1D:15:D4:FF:05:DA:91:A6

    Friendly Name: Alice

tools.sh: #8693: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8694: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8695: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
        Parameters:
            Salt:
                ee:fe:62:33:53:95:57:87:30:68:fb:a4:db:17:62:0e
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:18:03 2012
            Not After : Tue Nov 28 16:18:03 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:e9:64:95:bb:eb:65:9a:03:e1:3f:e2:a9:8a:8b:76:
                    15:cd:13:07:7a:34:c8:39:2b:31:77:67:3f:d9:20:9b:
                    d2:68:3d:31:91:b7:73:f0:f1:46:eb:8c:ca:e9:18:3c:
                    59:dc:9f:13:aa:78:18:20:93:36:ae:72:ad:d9:12:2c:
                    02:01:d8:04:6e:84:fa:e7:07:0c:0a:33:20:ff:16:4d:
                    6a:13:af:29:d9:5d:30:0d:f7:82:4c:67:51:06:d0:0f:
                    b1:66:a5:a7:f4:42:2b:85:15:4c:57:bd:20:f7:23:a7:
                    a8:ec:83:f1:18:d2:8d:b8:32:c6:6a:89:08:4e:79:81
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        35:e8:a2:8f:ac:27:ea:19:d7:df:77:ed:c7:08:e8:90:
        9d:e9:7d:ba:1f:de:07:33:28:72:89:5b:a0:70:ed:7e:
        a3:b1:24:01:13:9c:72:2b:42:37:80:4f:77:b4:43:a9:
        d5:d4:79:10:c3:33:21:ee:f0:5a:4e:a7:03:e0:48:6d:
        1a:7e:5d:af:f9:bb:5f:96:94:8d:70:ee:b7:0a:a4:4f:
        30:9b:b0:15:2e:44:2f:da:12:fc:42:5d:fc:7a:13:73:
        2b:8e:f5:7c:70:11:e1:c4:2f:bf:33:33:9c:16:22:34:
        b7:83:7d:b1:86:5f:23:bd:be:dc:7a:ef:63:4d:d8:66
    Fingerprint (MD5):
        24:C3:FA:7B:B8:87:9E:56:B4:F6:44:8E:C6:12:2F:CE
    Fingerprint (SHA1):
        44:0F:DE:39:C3:51:19:48:3B:F9:DB:9A:8B:D8:0F:D8:5A:E1:80:81

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:19:01 2012
            Not After : Tue Nov 28 16:19:01 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:02:34:c6:22:e9:c3:5e:71:e7:50:e0:14:88:76:ec:
                    b1:f5:d9:3c:84:33:7b:83:fc:f6:46:2e:89:ec:0a:28:
                    b0:68:65:15:e1:90:68:97:28:fc:4d:a3:62:5a:5f:2d:
                    b7:70:80:3c:a4:ab:77:b1:81:86:1b:57:56:d4:b0:b8:
                    e2:b0:3a:fb:52:4a:65:79:1a:3f:32:7b:65:1a:70:95:
                    27:25:b7:9f:64:fc:71:f7:57:fc:c8:2b:51:2e:59:3f:
                    9a:72:55:36:75:64:2e:cb:a6:4e:c1:04:88:cd:c2:21:
                    81:a7:84:a7:51:dd:0b:d1:ea:13:59:98:e0:2c:a7:2f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3c:bd:f7:7d:4a:07:d0:8f:85:7b:33:08:9b:e9:0b:4d:
        32:97:64:93:1e:4c:f9:67:fd:e7:30:09:c3:63:7e:53:
        2e:8f:b2:29:4c:38:c1:ec:d9:a0:a1:a7:a7:43:64:d3:
        92:8e:37:3a:5d:61:45:4a:3d:9d:a0:eb:16:fc:21:f4:
        11:72:4a:93:9b:3c:a9:79:85:34:c5:c6:ec:9b:cd:63:
        d5:3f:0b:2d:8c:38:76:f0:b5:e1:45:16:99:bd:fe:c2:
        8b:6e:52:1e:c8:ac:97:61:e7:a6:e3:7b:71:49:da:dd:
        d8:f8:97:81:a7:8c:80:78:5e:10:76:b3:f1:a2:d3:61
    Fingerprint (MD5):
        C4:19:41:C1:F0:A4:87:00:8A:A8:03:6D:35:55:15:1C
    Fingerprint (SHA1):
        EA:5D:4C:8E:49:5A:FE:58:A7:AC:8F:BC:1D:15:D4:FF:05:DA:91:A6

    Friendly Name: Alice

tools.sh: #8696: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8697: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8698: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
        Parameters:
            Salt:
                8e:5c:54:7a:74:30:4b:ae:a8:e5:96:73:d7:44:78:65
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:18:03 2012
            Not After : Tue Nov 28 16:18:03 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:e9:64:95:bb:eb:65:9a:03:e1:3f:e2:a9:8a:8b:76:
                    15:cd:13:07:7a:34:c8:39:2b:31:77:67:3f:d9:20:9b:
                    d2:68:3d:31:91:b7:73:f0:f1:46:eb:8c:ca:e9:18:3c:
                    59:dc:9f:13:aa:78:18:20:93:36:ae:72:ad:d9:12:2c:
                    02:01:d8:04:6e:84:fa:e7:07:0c:0a:33:20:ff:16:4d:
                    6a:13:af:29:d9:5d:30:0d:f7:82:4c:67:51:06:d0:0f:
                    b1:66:a5:a7:f4:42:2b:85:15:4c:57:bd:20:f7:23:a7:
                    a8:ec:83:f1:18:d2:8d:b8:32:c6:6a:89:08:4e:79:81
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        35:e8:a2:8f:ac:27:ea:19:d7:df:77:ed:c7:08:e8:90:
        9d:e9:7d:ba:1f:de:07:33:28:72:89:5b:a0:70:ed:7e:
        a3:b1:24:01:13:9c:72:2b:42:37:80:4f:77:b4:43:a9:
        d5:d4:79:10:c3:33:21:ee:f0:5a:4e:a7:03:e0:48:6d:
        1a:7e:5d:af:f9:bb:5f:96:94:8d:70:ee:b7:0a:a4:4f:
        30:9b:b0:15:2e:44:2f:da:12:fc:42:5d:fc:7a:13:73:
        2b:8e:f5:7c:70:11:e1:c4:2f:bf:33:33:9c:16:22:34:
        b7:83:7d:b1:86:5f:23:bd:be:dc:7a:ef:63:4d:d8:66
    Fingerprint (MD5):
        24:C3:FA:7B:B8:87:9E:56:B4:F6:44:8E:C6:12:2F:CE
    Fingerprint (SHA1):
        44:0F:DE:39:C3:51:19:48:3B:F9:DB:9A:8B:D8:0F:D8:5A:E1:80:81

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:19:01 2012
            Not After : Tue Nov 28 16:19:01 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:02:34:c6:22:e9:c3:5e:71:e7:50:e0:14:88:76:ec:
                    b1:f5:d9:3c:84:33:7b:83:fc:f6:46:2e:89:ec:0a:28:
                    b0:68:65:15:e1:90:68:97:28:fc:4d:a3:62:5a:5f:2d:
                    b7:70:80:3c:a4:ab:77:b1:81:86:1b:57:56:d4:b0:b8:
                    e2:b0:3a:fb:52:4a:65:79:1a:3f:32:7b:65:1a:70:95:
                    27:25:b7:9f:64:fc:71:f7:57:fc:c8:2b:51:2e:59:3f:
                    9a:72:55:36:75:64:2e:cb:a6:4e:c1:04:88:cd:c2:21:
                    81:a7:84:a7:51:dd:0b:d1:ea:13:59:98:e0:2c:a7:2f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3c:bd:f7:7d:4a:07:d0:8f:85:7b:33:08:9b:e9:0b:4d:
        32:97:64:93:1e:4c:f9:67:fd:e7:30:09:c3:63:7e:53:
        2e:8f:b2:29:4c:38:c1:ec:d9:a0:a1:a7:a7:43:64:d3:
        92:8e:37:3a:5d:61:45:4a:3d:9d:a0:eb:16:fc:21:f4:
        11:72:4a:93:9b:3c:a9:79:85:34:c5:c6:ec:9b:cd:63:
        d5:3f:0b:2d:8c:38:76:f0:b5:e1:45:16:99:bd:fe:c2:
        8b:6e:52:1e:c8:ac:97:61:e7:a6:e3:7b:71:49:da:dd:
        d8:f8:97:81:a7:8c:80:78:5e:10:76:b3:f1:a2:d3:61
    Fingerprint (MD5):
        C4:19:41:C1:F0:A4:87:00:8A:A8:03:6D:35:55:15:1C
    Fingerprint (SHA1):
        EA:5D:4C:8E:49:5A:FE:58:A7:AC:8F:BC:1D:15:D4:FF:05:DA:91:A6

    Friendly Name: Alice

tools.sh: #8699: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8700: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8701: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
        Parameters:
            Salt:
                c1:d0:a8:1a:11:b3:fa:f1:cf:2b:f5:cd:2a:4e:b4:28
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:18:03 2012
            Not After : Tue Nov 28 16:18:03 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:e9:64:95:bb:eb:65:9a:03:e1:3f:e2:a9:8a:8b:76:
                    15:cd:13:07:7a:34:c8:39:2b:31:77:67:3f:d9:20:9b:
                    d2:68:3d:31:91:b7:73:f0:f1:46:eb:8c:ca:e9:18:3c:
                    59:dc:9f:13:aa:78:18:20:93:36:ae:72:ad:d9:12:2c:
                    02:01:d8:04:6e:84:fa:e7:07:0c:0a:33:20:ff:16:4d:
                    6a:13:af:29:d9:5d:30:0d:f7:82:4c:67:51:06:d0:0f:
                    b1:66:a5:a7:f4:42:2b:85:15:4c:57:bd:20:f7:23:a7:
                    a8:ec:83:f1:18:d2:8d:b8:32:c6:6a:89:08:4e:79:81
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        35:e8:a2:8f:ac:27:ea:19:d7:df:77:ed:c7:08:e8:90:
        9d:e9:7d:ba:1f:de:07:33:28:72:89:5b:a0:70:ed:7e:
        a3:b1:24:01:13:9c:72:2b:42:37:80:4f:77:b4:43:a9:
        d5:d4:79:10:c3:33:21:ee:f0:5a:4e:a7:03:e0:48:6d:
        1a:7e:5d:af:f9:bb:5f:96:94:8d:70:ee:b7:0a:a4:4f:
        30:9b:b0:15:2e:44:2f:da:12:fc:42:5d:fc:7a:13:73:
        2b:8e:f5:7c:70:11:e1:c4:2f:bf:33:33:9c:16:22:34:
        b7:83:7d:b1:86:5f:23:bd:be:dc:7a:ef:63:4d:d8:66
    Fingerprint (MD5):
        24:C3:FA:7B:B8:87:9E:56:B4:F6:44:8E:C6:12:2F:CE
    Fingerprint (SHA1):
        44:0F:DE:39:C3:51:19:48:3B:F9:DB:9A:8B:D8:0F:D8:5A:E1:80:81

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:19:01 2012
            Not After : Tue Nov 28 16:19:01 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:02:34:c6:22:e9:c3:5e:71:e7:50:e0:14:88:76:ec:
                    b1:f5:d9:3c:84:33:7b:83:fc:f6:46:2e:89:ec:0a:28:
                    b0:68:65:15:e1:90:68:97:28:fc:4d:a3:62:5a:5f:2d:
                    b7:70:80:3c:a4:ab:77:b1:81:86:1b:57:56:d4:b0:b8:
                    e2:b0:3a:fb:52:4a:65:79:1a:3f:32:7b:65:1a:70:95:
                    27:25:b7:9f:64:fc:71:f7:57:fc:c8:2b:51:2e:59:3f:
                    9a:72:55:36:75:64:2e:cb:a6:4e:c1:04:88:cd:c2:21:
                    81:a7:84:a7:51:dd:0b:d1:ea:13:59:98:e0:2c:a7:2f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3c:bd:f7:7d:4a:07:d0:8f:85:7b:33:08:9b:e9:0b:4d:
        32:97:64:93:1e:4c:f9:67:fd:e7:30:09:c3:63:7e:53:
        2e:8f:b2:29:4c:38:c1:ec:d9:a0:a1:a7:a7:43:64:d3:
        92:8e:37:3a:5d:61:45:4a:3d:9d:a0:eb:16:fc:21:f4:
        11:72:4a:93:9b:3c:a9:79:85:34:c5:c6:ec:9b:cd:63:
        d5:3f:0b:2d:8c:38:76:f0:b5:e1:45:16:99:bd:fe:c2:
        8b:6e:52:1e:c8:ac:97:61:e7:a6:e3:7b:71:49:da:dd:
        d8:f8:97:81:a7:8c:80:78:5e:10:76:b3:f1:a2:d3:61
    Fingerprint (MD5):
        C4:19:41:C1:F0:A4:87:00:8A:A8:03:6D:35:55:15:1C
    Fingerprint (SHA1):
        EA:5D:4C:8E:49:5A:FE:58:A7:AC:8F:BC:1D:15:D4:FF:05:DA:91:A6

    Friendly Name: Alice

tools.sh: #8702: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8703: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8704: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:18:03 2012
            Not After : Tue Nov 28 16:18:03 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:e9:64:95:bb:eb:65:9a:03:e1:3f:e2:a9:8a:8b:76:
                    15:cd:13:07:7a:34:c8:39:2b:31:77:67:3f:d9:20:9b:
                    d2:68:3d:31:91:b7:73:f0:f1:46:eb:8c:ca:e9:18:3c:
                    59:dc:9f:13:aa:78:18:20:93:36:ae:72:ad:d9:12:2c:
                    02:01:d8:04:6e:84:fa:e7:07:0c:0a:33:20:ff:16:4d:
                    6a:13:af:29:d9:5d:30:0d:f7:82:4c:67:51:06:d0:0f:
                    b1:66:a5:a7:f4:42:2b:85:15:4c:57:bd:20:f7:23:a7:
                    a8:ec:83:f1:18:d2:8d:b8:32:c6:6a:89:08:4e:79:81
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        35:e8:a2:8f:ac:27:ea:19:d7:df:77:ed:c7:08:e8:90:
        9d:e9:7d:ba:1f:de:07:33:28:72:89:5b:a0:70:ed:7e:
        a3:b1:24:01:13:9c:72:2b:42:37:80:4f:77:b4:43:a9:
        d5:d4:79:10:c3:33:21:ee:f0:5a:4e:a7:03:e0:48:6d:
        1a:7e:5d:af:f9:bb:5f:96:94:8d:70:ee:b7:0a:a4:4f:
        30:9b:b0:15:2e:44:2f:da:12:fc:42:5d:fc:7a:13:73:
        2b:8e:f5:7c:70:11:e1:c4:2f:bf:33:33:9c:16:22:34:
        b7:83:7d:b1:86:5f:23:bd:be:dc:7a:ef:63:4d:d8:66
    Fingerprint (MD5):
        24:C3:FA:7B:B8:87:9E:56:B4:F6:44:8E:C6:12:2F:CE
    Fingerprint (SHA1):
        44:0F:DE:39:C3:51:19:48:3B:F9:DB:9A:8B:D8:0F:D8:5A:E1:80:81

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:19:01 2012
            Not After : Tue Nov 28 16:19:01 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:02:34:c6:22:e9:c3:5e:71:e7:50:e0:14:88:76:ec:
                    b1:f5:d9:3c:84:33:7b:83:fc:f6:46:2e:89:ec:0a:28:
                    b0:68:65:15:e1:90:68:97:28:fc:4d:a3:62:5a:5f:2d:
                    b7:70:80:3c:a4:ab:77:b1:81:86:1b:57:56:d4:b0:b8:
                    e2:b0:3a:fb:52:4a:65:79:1a:3f:32:7b:65:1a:70:95:
                    27:25:b7:9f:64:fc:71:f7:57:fc:c8:2b:51:2e:59:3f:
                    9a:72:55:36:75:64:2e:cb:a6:4e:c1:04:88:cd:c2:21:
                    81:a7:84:a7:51:dd:0b:d1:ea:13:59:98:e0:2c:a7:2f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3c:bd:f7:7d:4a:07:d0:8f:85:7b:33:08:9b:e9:0b:4d:
        32:97:64:93:1e:4c:f9:67:fd:e7:30:09:c3:63:7e:53:
        2e:8f:b2:29:4c:38:c1:ec:d9:a0:a1:a7:a7:43:64:d3:
        92:8e:37:3a:5d:61:45:4a:3d:9d:a0:eb:16:fc:21:f4:
        11:72:4a:93:9b:3c:a9:79:85:34:c5:c6:ec:9b:cd:63:
        d5:3f:0b:2d:8c:38:76:f0:b5:e1:45:16:99:bd:fe:c2:
        8b:6e:52:1e:c8:ac:97:61:e7:a6:e3:7b:71:49:da:dd:
        d8:f8:97:81:a7:8c:80:78:5e:10:76:b3:f1:a2:d3:61
    Fingerprint (MD5):
        C4:19:41:C1:F0:A4:87:00:8A:A8:03:6D:35:55:15:1C
    Fingerprint (SHA1):
        EA:5D:4C:8E:49:5A:FE:58:A7:AC:8F:BC:1D:15:D4:FF:05:DA:91:A6

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
        Parameters:
            Salt:
                ac:82:74:db:7c:d9:a0:ed:67:14:32:40:98:ec:27:7a
            Iteration Count: 2000 (0x7d0)
tools.sh: #8705: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8706: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8707: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
        Parameters:
            Salt:
                30:21:ce:4a:fa:47:8e:24:7a:d5:6a:74:d3:92:06:93
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:18:03 2012
            Not After : Tue Nov 28 16:18:03 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:e9:64:95:bb:eb:65:9a:03:e1:3f:e2:a9:8a:8b:76:
                    15:cd:13:07:7a:34:c8:39:2b:31:77:67:3f:d9:20:9b:
                    d2:68:3d:31:91:b7:73:f0:f1:46:eb:8c:ca:e9:18:3c:
                    59:dc:9f:13:aa:78:18:20:93:36:ae:72:ad:d9:12:2c:
                    02:01:d8:04:6e:84:fa:e7:07:0c:0a:33:20:ff:16:4d:
                    6a:13:af:29:d9:5d:30:0d:f7:82:4c:67:51:06:d0:0f:
                    b1:66:a5:a7:f4:42:2b:85:15:4c:57:bd:20:f7:23:a7:
                    a8:ec:83:f1:18:d2:8d:b8:32:c6:6a:89:08:4e:79:81
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        35:e8:a2:8f:ac:27:ea:19:d7:df:77:ed:c7:08:e8:90:
        9d:e9:7d:ba:1f:de:07:33:28:72:89:5b:a0:70:ed:7e:
        a3:b1:24:01:13:9c:72:2b:42:37:80:4f:77:b4:43:a9:
        d5:d4:79:10:c3:33:21:ee:f0:5a:4e:a7:03:e0:48:6d:
        1a:7e:5d:af:f9:bb:5f:96:94:8d:70:ee:b7:0a:a4:4f:
        30:9b:b0:15:2e:44:2f:da:12:fc:42:5d:fc:7a:13:73:
        2b:8e:f5:7c:70:11:e1:c4:2f:bf:33:33:9c:16:22:34:
        b7:83:7d:b1:86:5f:23:bd:be:dc:7a:ef:63:4d:d8:66
    Fingerprint (MD5):
        24:C3:FA:7B:B8:87:9E:56:B4:F6:44:8E:C6:12:2F:CE
    Fingerprint (SHA1):
        44:0F:DE:39:C3:51:19:48:3B:F9:DB:9A:8B:D8:0F:D8:5A:E1:80:81

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:19:01 2012
            Not After : Tue Nov 28 16:19:01 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:02:34:c6:22:e9:c3:5e:71:e7:50:e0:14:88:76:ec:
                    b1:f5:d9:3c:84:33:7b:83:fc:f6:46:2e:89:ec:0a:28:
                    b0:68:65:15:e1:90:68:97:28:fc:4d:a3:62:5a:5f:2d:
                    b7:70:80:3c:a4:ab:77:b1:81:86:1b:57:56:d4:b0:b8:
                    e2:b0:3a:fb:52:4a:65:79:1a:3f:32:7b:65:1a:70:95:
                    27:25:b7:9f:64:fc:71:f7:57:fc:c8:2b:51:2e:59:3f:
                    9a:72:55:36:75:64:2e:cb:a6:4e:c1:04:88:cd:c2:21:
                    81:a7:84:a7:51:dd:0b:d1:ea:13:59:98:e0:2c:a7:2f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3c:bd:f7:7d:4a:07:d0:8f:85:7b:33:08:9b:e9:0b:4d:
        32:97:64:93:1e:4c:f9:67:fd:e7:30:09:c3:63:7e:53:
        2e:8f:b2:29:4c:38:c1:ec:d9:a0:a1:a7:a7:43:64:d3:
        92:8e:37:3a:5d:61:45:4a:3d:9d:a0:eb:16:fc:21:f4:
        11:72:4a:93:9b:3c:a9:79:85:34:c5:c6:ec:9b:cd:63:
        d5:3f:0b:2d:8c:38:76:f0:b5:e1:45:16:99:bd:fe:c2:
        8b:6e:52:1e:c8:ac:97:61:e7:a6:e3:7b:71:49:da:dd:
        d8:f8:97:81:a7:8c:80:78:5e:10:76:b3:f1:a2:d3:61
    Fingerprint (MD5):
        C4:19:41:C1:F0:A4:87:00:8A:A8:03:6D:35:55:15:1C
    Fingerprint (SHA1):
        EA:5D:4C:8E:49:5A:FE:58:A7:AC:8F:BC:1D:15:D4:FF:05:DA:91:A6

    Friendly Name: Alice

tools.sh: #8708: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8709: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8710: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
        Parameters:
            Salt:
                b9:6b:5b:5e:b5:df:e9:83:16:6a:fc:da:8b:a2:0b:8e
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:18:03 2012
            Not After : Tue Nov 28 16:18:03 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:e9:64:95:bb:eb:65:9a:03:e1:3f:e2:a9:8a:8b:76:
                    15:cd:13:07:7a:34:c8:39:2b:31:77:67:3f:d9:20:9b:
                    d2:68:3d:31:91:b7:73:f0:f1:46:eb:8c:ca:e9:18:3c:
                    59:dc:9f:13:aa:78:18:20:93:36:ae:72:ad:d9:12:2c:
                    02:01:d8:04:6e:84:fa:e7:07:0c:0a:33:20:ff:16:4d:
                    6a:13:af:29:d9:5d:30:0d:f7:82:4c:67:51:06:d0:0f:
                    b1:66:a5:a7:f4:42:2b:85:15:4c:57:bd:20:f7:23:a7:
                    a8:ec:83:f1:18:d2:8d:b8:32:c6:6a:89:08:4e:79:81
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        35:e8:a2:8f:ac:27:ea:19:d7:df:77:ed:c7:08:e8:90:
        9d:e9:7d:ba:1f:de:07:33:28:72:89:5b:a0:70:ed:7e:
        a3:b1:24:01:13:9c:72:2b:42:37:80:4f:77:b4:43:a9:
        d5:d4:79:10:c3:33:21:ee:f0:5a:4e:a7:03:e0:48:6d:
        1a:7e:5d:af:f9:bb:5f:96:94:8d:70:ee:b7:0a:a4:4f:
        30:9b:b0:15:2e:44:2f:da:12:fc:42:5d:fc:7a:13:73:
        2b:8e:f5:7c:70:11:e1:c4:2f:bf:33:33:9c:16:22:34:
        b7:83:7d:b1:86:5f:23:bd:be:dc:7a:ef:63:4d:d8:66
    Fingerprint (MD5):
        24:C3:FA:7B:B8:87:9E:56:B4:F6:44:8E:C6:12:2F:CE
    Fingerprint (SHA1):
        44:0F:DE:39:C3:51:19:48:3B:F9:DB:9A:8B:D8:0F:D8:5A:E1:80:81

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:19:01 2012
            Not After : Tue Nov 28 16:19:01 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:02:34:c6:22:e9:c3:5e:71:e7:50:e0:14:88:76:ec:
                    b1:f5:d9:3c:84:33:7b:83:fc:f6:46:2e:89:ec:0a:28:
                    b0:68:65:15:e1:90:68:97:28:fc:4d:a3:62:5a:5f:2d:
                    b7:70:80:3c:a4:ab:77:b1:81:86:1b:57:56:d4:b0:b8:
                    e2:b0:3a:fb:52:4a:65:79:1a:3f:32:7b:65:1a:70:95:
                    27:25:b7:9f:64:fc:71:f7:57:fc:c8:2b:51:2e:59:3f:
                    9a:72:55:36:75:64:2e:cb:a6:4e:c1:04:88:cd:c2:21:
                    81:a7:84:a7:51:dd:0b:d1:ea:13:59:98:e0:2c:a7:2f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3c:bd:f7:7d:4a:07:d0:8f:85:7b:33:08:9b:e9:0b:4d:
        32:97:64:93:1e:4c:f9:67:fd:e7:30:09:c3:63:7e:53:
        2e:8f:b2:29:4c:38:c1:ec:d9:a0:a1:a7:a7:43:64:d3:
        92:8e:37:3a:5d:61:45:4a:3d:9d:a0:eb:16:fc:21:f4:
        11:72:4a:93:9b:3c:a9:79:85:34:c5:c6:ec:9b:cd:63:
        d5:3f:0b:2d:8c:38:76:f0:b5:e1:45:16:99:bd:fe:c2:
        8b:6e:52:1e:c8:ac:97:61:e7:a6:e3:7b:71:49:da:dd:
        d8:f8:97:81:a7:8c:80:78:5e:10:76:b3:f1:a2:d3:61
    Fingerprint (MD5):
        C4:19:41:C1:F0:A4:87:00:8A:A8:03:6D:35:55:15:1C
    Fingerprint (SHA1):
        EA:5D:4C:8E:49:5A:FE:58:A7:AC:8F:BC:1D:15:D4:FF:05:DA:91:A6

    Friendly Name: Alice

tools.sh: #8711: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8712: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8713: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
        Parameters:
            Salt:
                93:bb:bf:cf:0c:a5:dc:8e:68:fb:28:a7:88:8f:48:ae
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:18:03 2012
            Not After : Tue Nov 28 16:18:03 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:e9:64:95:bb:eb:65:9a:03:e1:3f:e2:a9:8a:8b:76:
                    15:cd:13:07:7a:34:c8:39:2b:31:77:67:3f:d9:20:9b:
                    d2:68:3d:31:91:b7:73:f0:f1:46:eb:8c:ca:e9:18:3c:
                    59:dc:9f:13:aa:78:18:20:93:36:ae:72:ad:d9:12:2c:
                    02:01:d8:04:6e:84:fa:e7:07:0c:0a:33:20:ff:16:4d:
                    6a:13:af:29:d9:5d:30:0d:f7:82:4c:67:51:06:d0:0f:
                    b1:66:a5:a7:f4:42:2b:85:15:4c:57:bd:20:f7:23:a7:
                    a8:ec:83:f1:18:d2:8d:b8:32:c6:6a:89:08:4e:79:81
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        35:e8:a2:8f:ac:27:ea:19:d7:df:77:ed:c7:08:e8:90:
        9d:e9:7d:ba:1f:de:07:33:28:72:89:5b:a0:70:ed:7e:
        a3:b1:24:01:13:9c:72:2b:42:37:80:4f:77:b4:43:a9:
        d5:d4:79:10:c3:33:21:ee:f0:5a:4e:a7:03:e0:48:6d:
        1a:7e:5d:af:f9:bb:5f:96:94:8d:70:ee:b7:0a:a4:4f:
        30:9b:b0:15:2e:44:2f:da:12:fc:42:5d:fc:7a:13:73:
        2b:8e:f5:7c:70:11:e1:c4:2f:bf:33:33:9c:16:22:34:
        b7:83:7d:b1:86:5f:23:bd:be:dc:7a:ef:63:4d:d8:66
    Fingerprint (MD5):
        24:C3:FA:7B:B8:87:9E:56:B4:F6:44:8E:C6:12:2F:CE
    Fingerprint (SHA1):
        44:0F:DE:39:C3:51:19:48:3B:F9:DB:9A:8B:D8:0F:D8:5A:E1:80:81

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:19:01 2012
            Not After : Tue Nov 28 16:19:01 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:02:34:c6:22:e9:c3:5e:71:e7:50:e0:14:88:76:ec:
                    b1:f5:d9:3c:84:33:7b:83:fc:f6:46:2e:89:ec:0a:28:
                    b0:68:65:15:e1:90:68:97:28:fc:4d:a3:62:5a:5f:2d:
                    b7:70:80:3c:a4:ab:77:b1:81:86:1b:57:56:d4:b0:b8:
                    e2:b0:3a:fb:52:4a:65:79:1a:3f:32:7b:65:1a:70:95:
                    27:25:b7:9f:64:fc:71:f7:57:fc:c8:2b:51:2e:59:3f:
                    9a:72:55:36:75:64:2e:cb:a6:4e:c1:04:88:cd:c2:21:
                    81:a7:84:a7:51:dd:0b:d1:ea:13:59:98:e0:2c:a7:2f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3c:bd:f7:7d:4a:07:d0:8f:85:7b:33:08:9b:e9:0b:4d:
        32:97:64:93:1e:4c:f9:67:fd:e7:30:09:c3:63:7e:53:
        2e:8f:b2:29:4c:38:c1:ec:d9:a0:a1:a7:a7:43:64:d3:
        92:8e:37:3a:5d:61:45:4a:3d:9d:a0:eb:16:fc:21:f4:
        11:72:4a:93:9b:3c:a9:79:85:34:c5:c6:ec:9b:cd:63:
        d5:3f:0b:2d:8c:38:76:f0:b5:e1:45:16:99:bd:fe:c2:
        8b:6e:52:1e:c8:ac:97:61:e7:a6:e3:7b:71:49:da:dd:
        d8:f8:97:81:a7:8c:80:78:5e:10:76:b3:f1:a2:d3:61
    Fingerprint (MD5):
        C4:19:41:C1:F0:A4:87:00:8A:A8:03:6D:35:55:15:1C
    Fingerprint (SHA1):
        EA:5D:4C:8E:49:5A:FE:58:A7:AC:8F:BC:1D:15:D4:FF:05:DA:91:A6

    Friendly Name: Alice

tools.sh: #8714: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8715: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8716: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
        Parameters:
            Salt:
                fd:7c:1e:88:87:0b:cb:9e:ff:53:2f:cc:36:da:a7:05
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:18:03 2012
            Not After : Tue Nov 28 16:18:03 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:e9:64:95:bb:eb:65:9a:03:e1:3f:e2:a9:8a:8b:76:
                    15:cd:13:07:7a:34:c8:39:2b:31:77:67:3f:d9:20:9b:
                    d2:68:3d:31:91:b7:73:f0:f1:46:eb:8c:ca:e9:18:3c:
                    59:dc:9f:13:aa:78:18:20:93:36:ae:72:ad:d9:12:2c:
                    02:01:d8:04:6e:84:fa:e7:07:0c:0a:33:20:ff:16:4d:
                    6a:13:af:29:d9:5d:30:0d:f7:82:4c:67:51:06:d0:0f:
                    b1:66:a5:a7:f4:42:2b:85:15:4c:57:bd:20:f7:23:a7:
                    a8:ec:83:f1:18:d2:8d:b8:32:c6:6a:89:08:4e:79:81
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        35:e8:a2:8f:ac:27:ea:19:d7:df:77:ed:c7:08:e8:90:
        9d:e9:7d:ba:1f:de:07:33:28:72:89:5b:a0:70:ed:7e:
        a3:b1:24:01:13:9c:72:2b:42:37:80:4f:77:b4:43:a9:
        d5:d4:79:10:c3:33:21:ee:f0:5a:4e:a7:03:e0:48:6d:
        1a:7e:5d:af:f9:bb:5f:96:94:8d:70:ee:b7:0a:a4:4f:
        30:9b:b0:15:2e:44:2f:da:12:fc:42:5d:fc:7a:13:73:
        2b:8e:f5:7c:70:11:e1:c4:2f:bf:33:33:9c:16:22:34:
        b7:83:7d:b1:86:5f:23:bd:be:dc:7a:ef:63:4d:d8:66
    Fingerprint (MD5):
        24:C3:FA:7B:B8:87:9E:56:B4:F6:44:8E:C6:12:2F:CE
    Fingerprint (SHA1):
        44:0F:DE:39:C3:51:19:48:3B:F9:DB:9A:8B:D8:0F:D8:5A:E1:80:81

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:19:01 2012
            Not After : Tue Nov 28 16:19:01 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:02:34:c6:22:e9:c3:5e:71:e7:50:e0:14:88:76:ec:
                    b1:f5:d9:3c:84:33:7b:83:fc:f6:46:2e:89:ec:0a:28:
                    b0:68:65:15:e1:90:68:97:28:fc:4d:a3:62:5a:5f:2d:
                    b7:70:80:3c:a4:ab:77:b1:81:86:1b:57:56:d4:b0:b8:
                    e2:b0:3a:fb:52:4a:65:79:1a:3f:32:7b:65:1a:70:95:
                    27:25:b7:9f:64:fc:71:f7:57:fc:c8:2b:51:2e:59:3f:
                    9a:72:55:36:75:64:2e:cb:a6:4e:c1:04:88:cd:c2:21:
                    81:a7:84:a7:51:dd:0b:d1:ea:13:59:98:e0:2c:a7:2f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3c:bd:f7:7d:4a:07:d0:8f:85:7b:33:08:9b:e9:0b:4d:
        32:97:64:93:1e:4c:f9:67:fd:e7:30:09:c3:63:7e:53:
        2e:8f:b2:29:4c:38:c1:ec:d9:a0:a1:a7:a7:43:64:d3:
        92:8e:37:3a:5d:61:45:4a:3d:9d:a0:eb:16:fc:21:f4:
        11:72:4a:93:9b:3c:a9:79:85:34:c5:c6:ec:9b:cd:63:
        d5:3f:0b:2d:8c:38:76:f0:b5:e1:45:16:99:bd:fe:c2:
        8b:6e:52:1e:c8:ac:97:61:e7:a6:e3:7b:71:49:da:dd:
        d8:f8:97:81:a7:8c:80:78:5e:10:76:b3:f1:a2:d3:61
    Fingerprint (MD5):
        C4:19:41:C1:F0:A4:87:00:8A:A8:03:6D:35:55:15:1C
    Fingerprint (SHA1):
        EA:5D:4C:8E:49:5A:FE:58:A7:AC:8F:BC:1D:15:D4:FF:05:DA:91:A6

    Friendly Name: Alice

tools.sh: #8717: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8718: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8719: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:18:03 2012
            Not After : Tue Nov 28 16:18:03 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:e9:64:95:bb:eb:65:9a:03:e1:3f:e2:a9:8a:8b:76:
                    15:cd:13:07:7a:34:c8:39:2b:31:77:67:3f:d9:20:9b:
                    d2:68:3d:31:91:b7:73:f0:f1:46:eb:8c:ca:e9:18:3c:
                    59:dc:9f:13:aa:78:18:20:93:36:ae:72:ad:d9:12:2c:
                    02:01:d8:04:6e:84:fa:e7:07:0c:0a:33:20:ff:16:4d:
                    6a:13:af:29:d9:5d:30:0d:f7:82:4c:67:51:06:d0:0f:
                    b1:66:a5:a7:f4:42:2b:85:15:4c:57:bd:20:f7:23:a7:
                    a8:ec:83:f1:18:d2:8d:b8:32:c6:6a:89:08:4e:79:81
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        35:e8:a2:8f:ac:27:ea:19:d7:df:77:ed:c7:08:e8:90:
        9d:e9:7d:ba:1f:de:07:33:28:72:89:5b:a0:70:ed:7e:
        a3:b1:24:01:13:9c:72:2b:42:37:80:4f:77:b4:43:a9:
        d5:d4:79:10:c3:33:21:ee:f0:5a:4e:a7:03:e0:48:6d:
        1a:7e:5d:af:f9:bb:5f:96:94:8d:70:ee:b7:0a:a4:4f:
        30:9b:b0:15:2e:44:2f:da:12:fc:42:5d:fc:7a:13:73:
        2b:8e:f5:7c:70:11:e1:c4:2f:bf:33:33:9c:16:22:34:
        b7:83:7d:b1:86:5f:23:bd:be:dc:7a:ef:63:4d:d8:66
    Fingerprint (MD5):
        24:C3:FA:7B:B8:87:9E:56:B4:F6:44:8E:C6:12:2F:CE
    Fingerprint (SHA1):
        44:0F:DE:39:C3:51:19:48:3B:F9:DB:9A:8B:D8:0F:D8:5A:E1:80:81

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:19:01 2012
            Not After : Tue Nov 28 16:19:01 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:02:34:c6:22:e9:c3:5e:71:e7:50:e0:14:88:76:ec:
                    b1:f5:d9:3c:84:33:7b:83:fc:f6:46:2e:89:ec:0a:28:
                    b0:68:65:15:e1:90:68:97:28:fc:4d:a3:62:5a:5f:2d:
                    b7:70:80:3c:a4:ab:77:b1:81:86:1b:57:56:d4:b0:b8:
                    e2:b0:3a:fb:52:4a:65:79:1a:3f:32:7b:65:1a:70:95:
                    27:25:b7:9f:64:fc:71:f7:57:fc:c8:2b:51:2e:59:3f:
                    9a:72:55:36:75:64:2e:cb:a6:4e:c1:04:88:cd:c2:21:
                    81:a7:84:a7:51:dd:0b:d1:ea:13:59:98:e0:2c:a7:2f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3c:bd:f7:7d:4a:07:d0:8f:85:7b:33:08:9b:e9:0b:4d:
        32:97:64:93:1e:4c:f9:67:fd:e7:30:09:c3:63:7e:53:
        2e:8f:b2:29:4c:38:c1:ec:d9:a0:a1:a7:a7:43:64:d3:
        92:8e:37:3a:5d:61:45:4a:3d:9d:a0:eb:16:fc:21:f4:
        11:72:4a:93:9b:3c:a9:79:85:34:c5:c6:ec:9b:cd:63:
        d5:3f:0b:2d:8c:38:76:f0:b5:e1:45:16:99:bd:fe:c2:
        8b:6e:52:1e:c8:ac:97:61:e7:a6:e3:7b:71:49:da:dd:
        d8:f8:97:81:a7:8c:80:78:5e:10:76:b3:f1:a2:d3:61
    Fingerprint (MD5):
        C4:19:41:C1:F0:A4:87:00:8A:A8:03:6D:35:55:15:1C
    Fingerprint (SHA1):
        EA:5D:4C:8E:49:5A:FE:58:A7:AC:8F:BC:1D:15:D4:FF:05:DA:91:A6

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
        Parameters:
            Salt:
                fd:f5:2f:e6:54:f5:98:b4:19:b5:26:fa:b5:1d:a2:d9
            Iteration Count: 2000 (0x7d0)
tools.sh: #8720: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8721: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8722: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                ca:43:64:cc:4d:12:1b:e3:2c:17:52:3c:ac:10:c8:8e
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:18:03 2012
            Not After : Tue Nov 28 16:18:03 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:e9:64:95:bb:eb:65:9a:03:e1:3f:e2:a9:8a:8b:76:
                    15:cd:13:07:7a:34:c8:39:2b:31:77:67:3f:d9:20:9b:
                    d2:68:3d:31:91:b7:73:f0:f1:46:eb:8c:ca:e9:18:3c:
                    59:dc:9f:13:aa:78:18:20:93:36:ae:72:ad:d9:12:2c:
                    02:01:d8:04:6e:84:fa:e7:07:0c:0a:33:20:ff:16:4d:
                    6a:13:af:29:d9:5d:30:0d:f7:82:4c:67:51:06:d0:0f:
                    b1:66:a5:a7:f4:42:2b:85:15:4c:57:bd:20:f7:23:a7:
                    a8:ec:83:f1:18:d2:8d:b8:32:c6:6a:89:08:4e:79:81
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        35:e8:a2:8f:ac:27:ea:19:d7:df:77:ed:c7:08:e8:90:
        9d:e9:7d:ba:1f:de:07:33:28:72:89:5b:a0:70:ed:7e:
        a3:b1:24:01:13:9c:72:2b:42:37:80:4f:77:b4:43:a9:
        d5:d4:79:10:c3:33:21:ee:f0:5a:4e:a7:03:e0:48:6d:
        1a:7e:5d:af:f9:bb:5f:96:94:8d:70:ee:b7:0a:a4:4f:
        30:9b:b0:15:2e:44:2f:da:12:fc:42:5d:fc:7a:13:73:
        2b:8e:f5:7c:70:11:e1:c4:2f:bf:33:33:9c:16:22:34:
        b7:83:7d:b1:86:5f:23:bd:be:dc:7a:ef:63:4d:d8:66
    Fingerprint (MD5):
        24:C3:FA:7B:B8:87:9E:56:B4:F6:44:8E:C6:12:2F:CE
    Fingerprint (SHA1):
        44:0F:DE:39:C3:51:19:48:3B:F9:DB:9A:8B:D8:0F:D8:5A:E1:80:81

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:19:01 2012
            Not After : Tue Nov 28 16:19:01 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:02:34:c6:22:e9:c3:5e:71:e7:50:e0:14:88:76:ec:
                    b1:f5:d9:3c:84:33:7b:83:fc:f6:46:2e:89:ec:0a:28:
                    b0:68:65:15:e1:90:68:97:28:fc:4d:a3:62:5a:5f:2d:
                    b7:70:80:3c:a4:ab:77:b1:81:86:1b:57:56:d4:b0:b8:
                    e2:b0:3a:fb:52:4a:65:79:1a:3f:32:7b:65:1a:70:95:
                    27:25:b7:9f:64:fc:71:f7:57:fc:c8:2b:51:2e:59:3f:
                    9a:72:55:36:75:64:2e:cb:a6:4e:c1:04:88:cd:c2:21:
                    81:a7:84:a7:51:dd:0b:d1:ea:13:59:98:e0:2c:a7:2f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3c:bd:f7:7d:4a:07:d0:8f:85:7b:33:08:9b:e9:0b:4d:
        32:97:64:93:1e:4c:f9:67:fd:e7:30:09:c3:63:7e:53:
        2e:8f:b2:29:4c:38:c1:ec:d9:a0:a1:a7:a7:43:64:d3:
        92:8e:37:3a:5d:61:45:4a:3d:9d:a0:eb:16:fc:21:f4:
        11:72:4a:93:9b:3c:a9:79:85:34:c5:c6:ec:9b:cd:63:
        d5:3f:0b:2d:8c:38:76:f0:b5:e1:45:16:99:bd:fe:c2:
        8b:6e:52:1e:c8:ac:97:61:e7:a6:e3:7b:71:49:da:dd:
        d8:f8:97:81:a7:8c:80:78:5e:10:76:b3:f1:a2:d3:61
    Fingerprint (MD5):
        C4:19:41:C1:F0:A4:87:00:8A:A8:03:6D:35:55:15:1C
    Fingerprint (SHA1):
        EA:5D:4C:8E:49:5A:FE:58:A7:AC:8F:BC:1D:15:D4:FF:05:DA:91:A6

    Friendly Name: Alice

tools.sh: #8723: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8724: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8725: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                9e:c5:44:8c:89:ee:28:57:02:0b:a5:7e:bb:3b:0e:c5
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:18:03 2012
            Not After : Tue Nov 28 16:18:03 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:e9:64:95:bb:eb:65:9a:03:e1:3f:e2:a9:8a:8b:76:
                    15:cd:13:07:7a:34:c8:39:2b:31:77:67:3f:d9:20:9b:
                    d2:68:3d:31:91:b7:73:f0:f1:46:eb:8c:ca:e9:18:3c:
                    59:dc:9f:13:aa:78:18:20:93:36:ae:72:ad:d9:12:2c:
                    02:01:d8:04:6e:84:fa:e7:07:0c:0a:33:20:ff:16:4d:
                    6a:13:af:29:d9:5d:30:0d:f7:82:4c:67:51:06:d0:0f:
                    b1:66:a5:a7:f4:42:2b:85:15:4c:57:bd:20:f7:23:a7:
                    a8:ec:83:f1:18:d2:8d:b8:32:c6:6a:89:08:4e:79:81
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        35:e8:a2:8f:ac:27:ea:19:d7:df:77:ed:c7:08:e8:90:
        9d:e9:7d:ba:1f:de:07:33:28:72:89:5b:a0:70:ed:7e:
        a3:b1:24:01:13:9c:72:2b:42:37:80:4f:77:b4:43:a9:
        d5:d4:79:10:c3:33:21:ee:f0:5a:4e:a7:03:e0:48:6d:
        1a:7e:5d:af:f9:bb:5f:96:94:8d:70:ee:b7:0a:a4:4f:
        30:9b:b0:15:2e:44:2f:da:12:fc:42:5d:fc:7a:13:73:
        2b:8e:f5:7c:70:11:e1:c4:2f:bf:33:33:9c:16:22:34:
        b7:83:7d:b1:86:5f:23:bd:be:dc:7a:ef:63:4d:d8:66
    Fingerprint (MD5):
        24:C3:FA:7B:B8:87:9E:56:B4:F6:44:8E:C6:12:2F:CE
    Fingerprint (SHA1):
        44:0F:DE:39:C3:51:19:48:3B:F9:DB:9A:8B:D8:0F:D8:5A:E1:80:81

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:19:01 2012
            Not After : Tue Nov 28 16:19:01 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:02:34:c6:22:e9:c3:5e:71:e7:50:e0:14:88:76:ec:
                    b1:f5:d9:3c:84:33:7b:83:fc:f6:46:2e:89:ec:0a:28:
                    b0:68:65:15:e1:90:68:97:28:fc:4d:a3:62:5a:5f:2d:
                    b7:70:80:3c:a4:ab:77:b1:81:86:1b:57:56:d4:b0:b8:
                    e2:b0:3a:fb:52:4a:65:79:1a:3f:32:7b:65:1a:70:95:
                    27:25:b7:9f:64:fc:71:f7:57:fc:c8:2b:51:2e:59:3f:
                    9a:72:55:36:75:64:2e:cb:a6:4e:c1:04:88:cd:c2:21:
                    81:a7:84:a7:51:dd:0b:d1:ea:13:59:98:e0:2c:a7:2f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3c:bd:f7:7d:4a:07:d0:8f:85:7b:33:08:9b:e9:0b:4d:
        32:97:64:93:1e:4c:f9:67:fd:e7:30:09:c3:63:7e:53:
        2e:8f:b2:29:4c:38:c1:ec:d9:a0:a1:a7:a7:43:64:d3:
        92:8e:37:3a:5d:61:45:4a:3d:9d:a0:eb:16:fc:21:f4:
        11:72:4a:93:9b:3c:a9:79:85:34:c5:c6:ec:9b:cd:63:
        d5:3f:0b:2d:8c:38:76:f0:b5:e1:45:16:99:bd:fe:c2:
        8b:6e:52:1e:c8:ac:97:61:e7:a6:e3:7b:71:49:da:dd:
        d8:f8:97:81:a7:8c:80:78:5e:10:76:b3:f1:a2:d3:61
    Fingerprint (MD5):
        C4:19:41:C1:F0:A4:87:00:8A:A8:03:6D:35:55:15:1C
    Fingerprint (SHA1):
        EA:5D:4C:8E:49:5A:FE:58:A7:AC:8F:BC:1D:15:D4:FF:05:DA:91:A6

    Friendly Name: Alice

tools.sh: #8726: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8727: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8728: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                93:6c:03:c8:6c:b6:01:89:71:da:39:c1:c6:f8:36:b4
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:18:03 2012
            Not After : Tue Nov 28 16:18:03 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:e9:64:95:bb:eb:65:9a:03:e1:3f:e2:a9:8a:8b:76:
                    15:cd:13:07:7a:34:c8:39:2b:31:77:67:3f:d9:20:9b:
                    d2:68:3d:31:91:b7:73:f0:f1:46:eb:8c:ca:e9:18:3c:
                    59:dc:9f:13:aa:78:18:20:93:36:ae:72:ad:d9:12:2c:
                    02:01:d8:04:6e:84:fa:e7:07:0c:0a:33:20:ff:16:4d:
                    6a:13:af:29:d9:5d:30:0d:f7:82:4c:67:51:06:d0:0f:
                    b1:66:a5:a7:f4:42:2b:85:15:4c:57:bd:20:f7:23:a7:
                    a8:ec:83:f1:18:d2:8d:b8:32:c6:6a:89:08:4e:79:81
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        35:e8:a2:8f:ac:27:ea:19:d7:df:77:ed:c7:08:e8:90:
        9d:e9:7d:ba:1f:de:07:33:28:72:89:5b:a0:70:ed:7e:
        a3:b1:24:01:13:9c:72:2b:42:37:80:4f:77:b4:43:a9:
        d5:d4:79:10:c3:33:21:ee:f0:5a:4e:a7:03:e0:48:6d:
        1a:7e:5d:af:f9:bb:5f:96:94:8d:70:ee:b7:0a:a4:4f:
        30:9b:b0:15:2e:44:2f:da:12:fc:42:5d:fc:7a:13:73:
        2b:8e:f5:7c:70:11:e1:c4:2f:bf:33:33:9c:16:22:34:
        b7:83:7d:b1:86:5f:23:bd:be:dc:7a:ef:63:4d:d8:66
    Fingerprint (MD5):
        24:C3:FA:7B:B8:87:9E:56:B4:F6:44:8E:C6:12:2F:CE
    Fingerprint (SHA1):
        44:0F:DE:39:C3:51:19:48:3B:F9:DB:9A:8B:D8:0F:D8:5A:E1:80:81

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:19:01 2012
            Not After : Tue Nov 28 16:19:01 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:02:34:c6:22:e9:c3:5e:71:e7:50:e0:14:88:76:ec:
                    b1:f5:d9:3c:84:33:7b:83:fc:f6:46:2e:89:ec:0a:28:
                    b0:68:65:15:e1:90:68:97:28:fc:4d:a3:62:5a:5f:2d:
                    b7:70:80:3c:a4:ab:77:b1:81:86:1b:57:56:d4:b0:b8:
                    e2:b0:3a:fb:52:4a:65:79:1a:3f:32:7b:65:1a:70:95:
                    27:25:b7:9f:64:fc:71:f7:57:fc:c8:2b:51:2e:59:3f:
                    9a:72:55:36:75:64:2e:cb:a6:4e:c1:04:88:cd:c2:21:
                    81:a7:84:a7:51:dd:0b:d1:ea:13:59:98:e0:2c:a7:2f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3c:bd:f7:7d:4a:07:d0:8f:85:7b:33:08:9b:e9:0b:4d:
        32:97:64:93:1e:4c:f9:67:fd:e7:30:09:c3:63:7e:53:
        2e:8f:b2:29:4c:38:c1:ec:d9:a0:a1:a7:a7:43:64:d3:
        92:8e:37:3a:5d:61:45:4a:3d:9d:a0:eb:16:fc:21:f4:
        11:72:4a:93:9b:3c:a9:79:85:34:c5:c6:ec:9b:cd:63:
        d5:3f:0b:2d:8c:38:76:f0:b5:e1:45:16:99:bd:fe:c2:
        8b:6e:52:1e:c8:ac:97:61:e7:a6:e3:7b:71:49:da:dd:
        d8:f8:97:81:a7:8c:80:78:5e:10:76:b3:f1:a2:d3:61
    Fingerprint (MD5):
        C4:19:41:C1:F0:A4:87:00:8A:A8:03:6D:35:55:15:1C
    Fingerprint (SHA1):
        EA:5D:4C:8E:49:5A:FE:58:A7:AC:8F:BC:1D:15:D4:FF:05:DA:91:A6

    Friendly Name: Alice

tools.sh: #8729: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8730: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8731: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                4c:aa:9a:ff:92:d7:45:6d:db:c9:f8:ba:ac:d1:37:ca
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:18:03 2012
            Not After : Tue Nov 28 16:18:03 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:e9:64:95:bb:eb:65:9a:03:e1:3f:e2:a9:8a:8b:76:
                    15:cd:13:07:7a:34:c8:39:2b:31:77:67:3f:d9:20:9b:
                    d2:68:3d:31:91:b7:73:f0:f1:46:eb:8c:ca:e9:18:3c:
                    59:dc:9f:13:aa:78:18:20:93:36:ae:72:ad:d9:12:2c:
                    02:01:d8:04:6e:84:fa:e7:07:0c:0a:33:20:ff:16:4d:
                    6a:13:af:29:d9:5d:30:0d:f7:82:4c:67:51:06:d0:0f:
                    b1:66:a5:a7:f4:42:2b:85:15:4c:57:bd:20:f7:23:a7:
                    a8:ec:83:f1:18:d2:8d:b8:32:c6:6a:89:08:4e:79:81
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        35:e8:a2:8f:ac:27:ea:19:d7:df:77:ed:c7:08:e8:90:
        9d:e9:7d:ba:1f:de:07:33:28:72:89:5b:a0:70:ed:7e:
        a3:b1:24:01:13:9c:72:2b:42:37:80:4f:77:b4:43:a9:
        d5:d4:79:10:c3:33:21:ee:f0:5a:4e:a7:03:e0:48:6d:
        1a:7e:5d:af:f9:bb:5f:96:94:8d:70:ee:b7:0a:a4:4f:
        30:9b:b0:15:2e:44:2f:da:12:fc:42:5d:fc:7a:13:73:
        2b:8e:f5:7c:70:11:e1:c4:2f:bf:33:33:9c:16:22:34:
        b7:83:7d:b1:86:5f:23:bd:be:dc:7a:ef:63:4d:d8:66
    Fingerprint (MD5):
        24:C3:FA:7B:B8:87:9E:56:B4:F6:44:8E:C6:12:2F:CE
    Fingerprint (SHA1):
        44:0F:DE:39:C3:51:19:48:3B:F9:DB:9A:8B:D8:0F:D8:5A:E1:80:81

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:19:01 2012
            Not After : Tue Nov 28 16:19:01 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:02:34:c6:22:e9:c3:5e:71:e7:50:e0:14:88:76:ec:
                    b1:f5:d9:3c:84:33:7b:83:fc:f6:46:2e:89:ec:0a:28:
                    b0:68:65:15:e1:90:68:97:28:fc:4d:a3:62:5a:5f:2d:
                    b7:70:80:3c:a4:ab:77:b1:81:86:1b:57:56:d4:b0:b8:
                    e2:b0:3a:fb:52:4a:65:79:1a:3f:32:7b:65:1a:70:95:
                    27:25:b7:9f:64:fc:71:f7:57:fc:c8:2b:51:2e:59:3f:
                    9a:72:55:36:75:64:2e:cb:a6:4e:c1:04:88:cd:c2:21:
                    81:a7:84:a7:51:dd:0b:d1:ea:13:59:98:e0:2c:a7:2f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3c:bd:f7:7d:4a:07:d0:8f:85:7b:33:08:9b:e9:0b:4d:
        32:97:64:93:1e:4c:f9:67:fd:e7:30:09:c3:63:7e:53:
        2e:8f:b2:29:4c:38:c1:ec:d9:a0:a1:a7:a7:43:64:d3:
        92:8e:37:3a:5d:61:45:4a:3d:9d:a0:eb:16:fc:21:f4:
        11:72:4a:93:9b:3c:a9:79:85:34:c5:c6:ec:9b:cd:63:
        d5:3f:0b:2d:8c:38:76:f0:b5:e1:45:16:99:bd:fe:c2:
        8b:6e:52:1e:c8:ac:97:61:e7:a6:e3:7b:71:49:da:dd:
        d8:f8:97:81:a7:8c:80:78:5e:10:76:b3:f1:a2:d3:61
    Fingerprint (MD5):
        C4:19:41:C1:F0:A4:87:00:8A:A8:03:6D:35:55:15:1C
    Fingerprint (SHA1):
        EA:5D:4C:8E:49:5A:FE:58:A7:AC:8F:BC:1D:15:D4:FF:05:DA:91:A6

    Friendly Name: Alice

tools.sh: #8732: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8733: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [default:null]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8734: Exporting with [default:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:18:03 2012
            Not After : Tue Nov 28 16:18:03 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:e9:64:95:bb:eb:65:9a:03:e1:3f:e2:a9:8a:8b:76:
                    15:cd:13:07:7a:34:c8:39:2b:31:77:67:3f:d9:20:9b:
                    d2:68:3d:31:91:b7:73:f0:f1:46:eb:8c:ca:e9:18:3c:
                    59:dc:9f:13:aa:78:18:20:93:36:ae:72:ad:d9:12:2c:
                    02:01:d8:04:6e:84:fa:e7:07:0c:0a:33:20:ff:16:4d:
                    6a:13:af:29:d9:5d:30:0d:f7:82:4c:67:51:06:d0:0f:
                    b1:66:a5:a7:f4:42:2b:85:15:4c:57:bd:20:f7:23:a7:
                    a8:ec:83:f1:18:d2:8d:b8:32:c6:6a:89:08:4e:79:81
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        35:e8:a2:8f:ac:27:ea:19:d7:df:77:ed:c7:08:e8:90:
        9d:e9:7d:ba:1f:de:07:33:28:72:89:5b:a0:70:ed:7e:
        a3:b1:24:01:13:9c:72:2b:42:37:80:4f:77:b4:43:a9:
        d5:d4:79:10:c3:33:21:ee:f0:5a:4e:a7:03:e0:48:6d:
        1a:7e:5d:af:f9:bb:5f:96:94:8d:70:ee:b7:0a:a4:4f:
        30:9b:b0:15:2e:44:2f:da:12:fc:42:5d:fc:7a:13:73:
        2b:8e:f5:7c:70:11:e1:c4:2f:bf:33:33:9c:16:22:34:
        b7:83:7d:b1:86:5f:23:bd:be:dc:7a:ef:63:4d:d8:66
    Fingerprint (MD5):
        24:C3:FA:7B:B8:87:9E:56:B4:F6:44:8E:C6:12:2F:CE
    Fingerprint (SHA1):
        44:0F:DE:39:C3:51:19:48:3B:F9:DB:9A:8B:D8:0F:D8:5A:E1:80:81

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:19:01 2012
            Not After : Tue Nov 28 16:19:01 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:02:34:c6:22:e9:c3:5e:71:e7:50:e0:14:88:76:ec:
                    b1:f5:d9:3c:84:33:7b:83:fc:f6:46:2e:89:ec:0a:28:
                    b0:68:65:15:e1:90:68:97:28:fc:4d:a3:62:5a:5f:2d:
                    b7:70:80:3c:a4:ab:77:b1:81:86:1b:57:56:d4:b0:b8:
                    e2:b0:3a:fb:52:4a:65:79:1a:3f:32:7b:65:1a:70:95:
                    27:25:b7:9f:64:fc:71:f7:57:fc:c8:2b:51:2e:59:3f:
                    9a:72:55:36:75:64:2e:cb:a6:4e:c1:04:88:cd:c2:21:
                    81:a7:84:a7:51:dd:0b:d1:ea:13:59:98:e0:2c:a7:2f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3c:bd:f7:7d:4a:07:d0:8f:85:7b:33:08:9b:e9:0b:4d:
        32:97:64:93:1e:4c:f9:67:fd:e7:30:09:c3:63:7e:53:
        2e:8f:b2:29:4c:38:c1:ec:d9:a0:a1:a7:a7:43:64:d3:
        92:8e:37:3a:5d:61:45:4a:3d:9d:a0:eb:16:fc:21:f4:
        11:72:4a:93:9b:3c:a9:79:85:34:c5:c6:ec:9b:cd:63:
        d5:3f:0b:2d:8c:38:76:f0:b5:e1:45:16:99:bd:fe:c2:
        8b:6e:52:1e:c8:ac:97:61:e7:a6:e3:7b:71:49:da:dd:
        d8:f8:97:81:a7:8c:80:78:5e:10:76:b3:f1:a2:d3:61
    Fingerprint (MD5):
        C4:19:41:C1:F0:A4:87:00:8A:A8:03:6D:35:55:15:1C
    Fingerprint (SHA1):
        EA:5D:4C:8E:49:5A:FE:58:A7:AC:8F:BC:1D:15:D4:FF:05:DA:91:A6

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                74:d7:21:fb:42:5b:fe:30:d3:71:99:97:36:73:d5:90
            Iteration Count: 2000 (0x7d0)
tools.sh: #8735: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8736: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8737: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                86:56:10:1d:44:ca:db:09:90:e2:71:12:62:67:bd:ca
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:18:03 2012
            Not After : Tue Nov 28 16:18:03 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:e9:64:95:bb:eb:65:9a:03:e1:3f:e2:a9:8a:8b:76:
                    15:cd:13:07:7a:34:c8:39:2b:31:77:67:3f:d9:20:9b:
                    d2:68:3d:31:91:b7:73:f0:f1:46:eb:8c:ca:e9:18:3c:
                    59:dc:9f:13:aa:78:18:20:93:36:ae:72:ad:d9:12:2c:
                    02:01:d8:04:6e:84:fa:e7:07:0c:0a:33:20:ff:16:4d:
                    6a:13:af:29:d9:5d:30:0d:f7:82:4c:67:51:06:d0:0f:
                    b1:66:a5:a7:f4:42:2b:85:15:4c:57:bd:20:f7:23:a7:
                    a8:ec:83:f1:18:d2:8d:b8:32:c6:6a:89:08:4e:79:81
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        35:e8:a2:8f:ac:27:ea:19:d7:df:77:ed:c7:08:e8:90:
        9d:e9:7d:ba:1f:de:07:33:28:72:89:5b:a0:70:ed:7e:
        a3:b1:24:01:13:9c:72:2b:42:37:80:4f:77:b4:43:a9:
        d5:d4:79:10:c3:33:21:ee:f0:5a:4e:a7:03:e0:48:6d:
        1a:7e:5d:af:f9:bb:5f:96:94:8d:70:ee:b7:0a:a4:4f:
        30:9b:b0:15:2e:44:2f:da:12:fc:42:5d:fc:7a:13:73:
        2b:8e:f5:7c:70:11:e1:c4:2f:bf:33:33:9c:16:22:34:
        b7:83:7d:b1:86:5f:23:bd:be:dc:7a:ef:63:4d:d8:66
    Fingerprint (MD5):
        24:C3:FA:7B:B8:87:9E:56:B4:F6:44:8E:C6:12:2F:CE
    Fingerprint (SHA1):
        44:0F:DE:39:C3:51:19:48:3B:F9:DB:9A:8B:D8:0F:D8:5A:E1:80:81

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:19:01 2012
            Not After : Tue Nov 28 16:19:01 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:02:34:c6:22:e9:c3:5e:71:e7:50:e0:14:88:76:ec:
                    b1:f5:d9:3c:84:33:7b:83:fc:f6:46:2e:89:ec:0a:28:
                    b0:68:65:15:e1:90:68:97:28:fc:4d:a3:62:5a:5f:2d:
                    b7:70:80:3c:a4:ab:77:b1:81:86:1b:57:56:d4:b0:b8:
                    e2:b0:3a:fb:52:4a:65:79:1a:3f:32:7b:65:1a:70:95:
                    27:25:b7:9f:64:fc:71:f7:57:fc:c8:2b:51:2e:59:3f:
                    9a:72:55:36:75:64:2e:cb:a6:4e:c1:04:88:cd:c2:21:
                    81:a7:84:a7:51:dd:0b:d1:ea:13:59:98:e0:2c:a7:2f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3c:bd:f7:7d:4a:07:d0:8f:85:7b:33:08:9b:e9:0b:4d:
        32:97:64:93:1e:4c:f9:67:fd:e7:30:09:c3:63:7e:53:
        2e:8f:b2:29:4c:38:c1:ec:d9:a0:a1:a7:a7:43:64:d3:
        92:8e:37:3a:5d:61:45:4a:3d:9d:a0:eb:16:fc:21:f4:
        11:72:4a:93:9b:3c:a9:79:85:34:c5:c6:ec:9b:cd:63:
        d5:3f:0b:2d:8c:38:76:f0:b5:e1:45:16:99:bd:fe:c2:
        8b:6e:52:1e:c8:ac:97:61:e7:a6:e3:7b:71:49:da:dd:
        d8:f8:97:81:a7:8c:80:78:5e:10:76:b3:f1:a2:d3:61
    Fingerprint (MD5):
        C4:19:41:C1:F0:A4:87:00:8A:A8:03:6D:35:55:15:1C
    Fingerprint (SHA1):
        EA:5D:4C:8E:49:5A:FE:58:A7:AC:8F:BC:1D:15:D4:FF:05:DA:91:A6

    Friendly Name: Alice

tools.sh: #8738: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8739: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8740: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                24:86:bb:91:43:c4:f9:34:5d:ae:39:60:41:e6:e9:50
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:18:03 2012
            Not After : Tue Nov 28 16:18:03 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:e9:64:95:bb:eb:65:9a:03:e1:3f:e2:a9:8a:8b:76:
                    15:cd:13:07:7a:34:c8:39:2b:31:77:67:3f:d9:20:9b:
                    d2:68:3d:31:91:b7:73:f0:f1:46:eb:8c:ca:e9:18:3c:
                    59:dc:9f:13:aa:78:18:20:93:36:ae:72:ad:d9:12:2c:
                    02:01:d8:04:6e:84:fa:e7:07:0c:0a:33:20:ff:16:4d:
                    6a:13:af:29:d9:5d:30:0d:f7:82:4c:67:51:06:d0:0f:
                    b1:66:a5:a7:f4:42:2b:85:15:4c:57:bd:20:f7:23:a7:
                    a8:ec:83:f1:18:d2:8d:b8:32:c6:6a:89:08:4e:79:81
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        35:e8:a2:8f:ac:27:ea:19:d7:df:77:ed:c7:08:e8:90:
        9d:e9:7d:ba:1f:de:07:33:28:72:89:5b:a0:70:ed:7e:
        a3:b1:24:01:13:9c:72:2b:42:37:80:4f:77:b4:43:a9:
        d5:d4:79:10:c3:33:21:ee:f0:5a:4e:a7:03:e0:48:6d:
        1a:7e:5d:af:f9:bb:5f:96:94:8d:70:ee:b7:0a:a4:4f:
        30:9b:b0:15:2e:44:2f:da:12:fc:42:5d:fc:7a:13:73:
        2b:8e:f5:7c:70:11:e1:c4:2f:bf:33:33:9c:16:22:34:
        b7:83:7d:b1:86:5f:23:bd:be:dc:7a:ef:63:4d:d8:66
    Fingerprint (MD5):
        24:C3:FA:7B:B8:87:9E:56:B4:F6:44:8E:C6:12:2F:CE
    Fingerprint (SHA1):
        44:0F:DE:39:C3:51:19:48:3B:F9:DB:9A:8B:D8:0F:D8:5A:E1:80:81

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:19:01 2012
            Not After : Tue Nov 28 16:19:01 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:02:34:c6:22:e9:c3:5e:71:e7:50:e0:14:88:76:ec:
                    b1:f5:d9:3c:84:33:7b:83:fc:f6:46:2e:89:ec:0a:28:
                    b0:68:65:15:e1:90:68:97:28:fc:4d:a3:62:5a:5f:2d:
                    b7:70:80:3c:a4:ab:77:b1:81:86:1b:57:56:d4:b0:b8:
                    e2:b0:3a:fb:52:4a:65:79:1a:3f:32:7b:65:1a:70:95:
                    27:25:b7:9f:64:fc:71:f7:57:fc:c8:2b:51:2e:59:3f:
                    9a:72:55:36:75:64:2e:cb:a6:4e:c1:04:88:cd:c2:21:
                    81:a7:84:a7:51:dd:0b:d1:ea:13:59:98:e0:2c:a7:2f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3c:bd:f7:7d:4a:07:d0:8f:85:7b:33:08:9b:e9:0b:4d:
        32:97:64:93:1e:4c:f9:67:fd:e7:30:09:c3:63:7e:53:
        2e:8f:b2:29:4c:38:c1:ec:d9:a0:a1:a7:a7:43:64:d3:
        92:8e:37:3a:5d:61:45:4a:3d:9d:a0:eb:16:fc:21:f4:
        11:72:4a:93:9b:3c:a9:79:85:34:c5:c6:ec:9b:cd:63:
        d5:3f:0b:2d:8c:38:76:f0:b5:e1:45:16:99:bd:fe:c2:
        8b:6e:52:1e:c8:ac:97:61:e7:a6:e3:7b:71:49:da:dd:
        d8:f8:97:81:a7:8c:80:78:5e:10:76:b3:f1:a2:d3:61
    Fingerprint (MD5):
        C4:19:41:C1:F0:A4:87:00:8A:A8:03:6D:35:55:15:1C
    Fingerprint (SHA1):
        EA:5D:4C:8E:49:5A:FE:58:A7:AC:8F:BC:1D:15:D4:FF:05:DA:91:A6

    Friendly Name: Alice

tools.sh: #8741: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8742: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8743: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                f4:3c:be:f9:0c:9f:d9:7c:79:23:70:a0:23:5d:8b:ed
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:18:03 2012
            Not After : Tue Nov 28 16:18:03 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:e9:64:95:bb:eb:65:9a:03:e1:3f:e2:a9:8a:8b:76:
                    15:cd:13:07:7a:34:c8:39:2b:31:77:67:3f:d9:20:9b:
                    d2:68:3d:31:91:b7:73:f0:f1:46:eb:8c:ca:e9:18:3c:
                    59:dc:9f:13:aa:78:18:20:93:36:ae:72:ad:d9:12:2c:
                    02:01:d8:04:6e:84:fa:e7:07:0c:0a:33:20:ff:16:4d:
                    6a:13:af:29:d9:5d:30:0d:f7:82:4c:67:51:06:d0:0f:
                    b1:66:a5:a7:f4:42:2b:85:15:4c:57:bd:20:f7:23:a7:
                    a8:ec:83:f1:18:d2:8d:b8:32:c6:6a:89:08:4e:79:81
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        35:e8:a2:8f:ac:27:ea:19:d7:df:77:ed:c7:08:e8:90:
        9d:e9:7d:ba:1f:de:07:33:28:72:89:5b:a0:70:ed:7e:
        a3:b1:24:01:13:9c:72:2b:42:37:80:4f:77:b4:43:a9:
        d5:d4:79:10:c3:33:21:ee:f0:5a:4e:a7:03:e0:48:6d:
        1a:7e:5d:af:f9:bb:5f:96:94:8d:70:ee:b7:0a:a4:4f:
        30:9b:b0:15:2e:44:2f:da:12:fc:42:5d:fc:7a:13:73:
        2b:8e:f5:7c:70:11:e1:c4:2f:bf:33:33:9c:16:22:34:
        b7:83:7d:b1:86:5f:23:bd:be:dc:7a:ef:63:4d:d8:66
    Fingerprint (MD5):
        24:C3:FA:7B:B8:87:9E:56:B4:F6:44:8E:C6:12:2F:CE
    Fingerprint (SHA1):
        44:0F:DE:39:C3:51:19:48:3B:F9:DB:9A:8B:D8:0F:D8:5A:E1:80:81

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:19:01 2012
            Not After : Tue Nov 28 16:19:01 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:02:34:c6:22:e9:c3:5e:71:e7:50:e0:14:88:76:ec:
                    b1:f5:d9:3c:84:33:7b:83:fc:f6:46:2e:89:ec:0a:28:
                    b0:68:65:15:e1:90:68:97:28:fc:4d:a3:62:5a:5f:2d:
                    b7:70:80:3c:a4:ab:77:b1:81:86:1b:57:56:d4:b0:b8:
                    e2:b0:3a:fb:52:4a:65:79:1a:3f:32:7b:65:1a:70:95:
                    27:25:b7:9f:64:fc:71:f7:57:fc:c8:2b:51:2e:59:3f:
                    9a:72:55:36:75:64:2e:cb:a6:4e:c1:04:88:cd:c2:21:
                    81:a7:84:a7:51:dd:0b:d1:ea:13:59:98:e0:2c:a7:2f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3c:bd:f7:7d:4a:07:d0:8f:85:7b:33:08:9b:e9:0b:4d:
        32:97:64:93:1e:4c:f9:67:fd:e7:30:09:c3:63:7e:53:
        2e:8f:b2:29:4c:38:c1:ec:d9:a0:a1:a7:a7:43:64:d3:
        92:8e:37:3a:5d:61:45:4a:3d:9d:a0:eb:16:fc:21:f4:
        11:72:4a:93:9b:3c:a9:79:85:34:c5:c6:ec:9b:cd:63:
        d5:3f:0b:2d:8c:38:76:f0:b5:e1:45:16:99:bd:fe:c2:
        8b:6e:52:1e:c8:ac:97:61:e7:a6:e3:7b:71:49:da:dd:
        d8:f8:97:81:a7:8c:80:78:5e:10:76:b3:f1:a2:d3:61
    Fingerprint (MD5):
        C4:19:41:C1:F0:A4:87:00:8A:A8:03:6D:35:55:15:1C
    Fingerprint (SHA1):
        EA:5D:4C:8E:49:5A:FE:58:A7:AC:8F:BC:1D:15:D4:FF:05:DA:91:A6

    Friendly Name: Alice

tools.sh: #8744: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8745: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8746: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                55:d2:1d:4d:72:3a:86:da:67:75:f1:e8:89:fc:75:74
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:18:03 2012
            Not After : Tue Nov 28 16:18:03 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:e9:64:95:bb:eb:65:9a:03:e1:3f:e2:a9:8a:8b:76:
                    15:cd:13:07:7a:34:c8:39:2b:31:77:67:3f:d9:20:9b:
                    d2:68:3d:31:91:b7:73:f0:f1:46:eb:8c:ca:e9:18:3c:
                    59:dc:9f:13:aa:78:18:20:93:36:ae:72:ad:d9:12:2c:
                    02:01:d8:04:6e:84:fa:e7:07:0c:0a:33:20:ff:16:4d:
                    6a:13:af:29:d9:5d:30:0d:f7:82:4c:67:51:06:d0:0f:
                    b1:66:a5:a7:f4:42:2b:85:15:4c:57:bd:20:f7:23:a7:
                    a8:ec:83:f1:18:d2:8d:b8:32:c6:6a:89:08:4e:79:81
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        35:e8:a2:8f:ac:27:ea:19:d7:df:77:ed:c7:08:e8:90:
        9d:e9:7d:ba:1f:de:07:33:28:72:89:5b:a0:70:ed:7e:
        a3:b1:24:01:13:9c:72:2b:42:37:80:4f:77:b4:43:a9:
        d5:d4:79:10:c3:33:21:ee:f0:5a:4e:a7:03:e0:48:6d:
        1a:7e:5d:af:f9:bb:5f:96:94:8d:70:ee:b7:0a:a4:4f:
        30:9b:b0:15:2e:44:2f:da:12:fc:42:5d:fc:7a:13:73:
        2b:8e:f5:7c:70:11:e1:c4:2f:bf:33:33:9c:16:22:34:
        b7:83:7d:b1:86:5f:23:bd:be:dc:7a:ef:63:4d:d8:66
    Fingerprint (MD5):
        24:C3:FA:7B:B8:87:9E:56:B4:F6:44:8E:C6:12:2F:CE
    Fingerprint (SHA1):
        44:0F:DE:39:C3:51:19:48:3B:F9:DB:9A:8B:D8:0F:D8:5A:E1:80:81

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:19:01 2012
            Not After : Tue Nov 28 16:19:01 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:02:34:c6:22:e9:c3:5e:71:e7:50:e0:14:88:76:ec:
                    b1:f5:d9:3c:84:33:7b:83:fc:f6:46:2e:89:ec:0a:28:
                    b0:68:65:15:e1:90:68:97:28:fc:4d:a3:62:5a:5f:2d:
                    b7:70:80:3c:a4:ab:77:b1:81:86:1b:57:56:d4:b0:b8:
                    e2:b0:3a:fb:52:4a:65:79:1a:3f:32:7b:65:1a:70:95:
                    27:25:b7:9f:64:fc:71:f7:57:fc:c8:2b:51:2e:59:3f:
                    9a:72:55:36:75:64:2e:cb:a6:4e:c1:04:88:cd:c2:21:
                    81:a7:84:a7:51:dd:0b:d1:ea:13:59:98:e0:2c:a7:2f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3c:bd:f7:7d:4a:07:d0:8f:85:7b:33:08:9b:e9:0b:4d:
        32:97:64:93:1e:4c:f9:67:fd:e7:30:09:c3:63:7e:53:
        2e:8f:b2:29:4c:38:c1:ec:d9:a0:a1:a7:a7:43:64:d3:
        92:8e:37:3a:5d:61:45:4a:3d:9d:a0:eb:16:fc:21:f4:
        11:72:4a:93:9b:3c:a9:79:85:34:c5:c6:ec:9b:cd:63:
        d5:3f:0b:2d:8c:38:76:f0:b5:e1:45:16:99:bd:fe:c2:
        8b:6e:52:1e:c8:ac:97:61:e7:a6:e3:7b:71:49:da:dd:
        d8:f8:97:81:a7:8c:80:78:5e:10:76:b3:f1:a2:d3:61
    Fingerprint (MD5):
        C4:19:41:C1:F0:A4:87:00:8A:A8:03:6D:35:55:15:1C
    Fingerprint (SHA1):
        EA:5D:4C:8E:49:5A:FE:58:A7:AC:8F:BC:1D:15:D4:FF:05:DA:91:A6

    Friendly Name: Alice

tools.sh: #8747: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8748: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8749: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                fa:54:d5:61:52:57:02:e6:ba:c5:19:65:d0:50:3c:eb
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:18:03 2012
            Not After : Tue Nov 28 16:18:03 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:e9:64:95:bb:eb:65:9a:03:e1:3f:e2:a9:8a:8b:76:
                    15:cd:13:07:7a:34:c8:39:2b:31:77:67:3f:d9:20:9b:
                    d2:68:3d:31:91:b7:73:f0:f1:46:eb:8c:ca:e9:18:3c:
                    59:dc:9f:13:aa:78:18:20:93:36:ae:72:ad:d9:12:2c:
                    02:01:d8:04:6e:84:fa:e7:07:0c:0a:33:20:ff:16:4d:
                    6a:13:af:29:d9:5d:30:0d:f7:82:4c:67:51:06:d0:0f:
                    b1:66:a5:a7:f4:42:2b:85:15:4c:57:bd:20:f7:23:a7:
                    a8:ec:83:f1:18:d2:8d:b8:32:c6:6a:89:08:4e:79:81
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        35:e8:a2:8f:ac:27:ea:19:d7:df:77:ed:c7:08:e8:90:
        9d:e9:7d:ba:1f:de:07:33:28:72:89:5b:a0:70:ed:7e:
        a3:b1:24:01:13:9c:72:2b:42:37:80:4f:77:b4:43:a9:
        d5:d4:79:10:c3:33:21:ee:f0:5a:4e:a7:03:e0:48:6d:
        1a:7e:5d:af:f9:bb:5f:96:94:8d:70:ee:b7:0a:a4:4f:
        30:9b:b0:15:2e:44:2f:da:12:fc:42:5d:fc:7a:13:73:
        2b:8e:f5:7c:70:11:e1:c4:2f:bf:33:33:9c:16:22:34:
        b7:83:7d:b1:86:5f:23:bd:be:dc:7a:ef:63:4d:d8:66
    Fingerprint (MD5):
        24:C3:FA:7B:B8:87:9E:56:B4:F6:44:8E:C6:12:2F:CE
    Fingerprint (SHA1):
        44:0F:DE:39:C3:51:19:48:3B:F9:DB:9A:8B:D8:0F:D8:5A:E1:80:81

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:19:01 2012
            Not After : Tue Nov 28 16:19:01 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:02:34:c6:22:e9:c3:5e:71:e7:50:e0:14:88:76:ec:
                    b1:f5:d9:3c:84:33:7b:83:fc:f6:46:2e:89:ec:0a:28:
                    b0:68:65:15:e1:90:68:97:28:fc:4d:a3:62:5a:5f:2d:
                    b7:70:80:3c:a4:ab:77:b1:81:86:1b:57:56:d4:b0:b8:
                    e2:b0:3a:fb:52:4a:65:79:1a:3f:32:7b:65:1a:70:95:
                    27:25:b7:9f:64:fc:71:f7:57:fc:c8:2b:51:2e:59:3f:
                    9a:72:55:36:75:64:2e:cb:a6:4e:c1:04:88:cd:c2:21:
                    81:a7:84:a7:51:dd:0b:d1:ea:13:59:98:e0:2c:a7:2f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3c:bd:f7:7d:4a:07:d0:8f:85:7b:33:08:9b:e9:0b:4d:
        32:97:64:93:1e:4c:f9:67:fd:e7:30:09:c3:63:7e:53:
        2e:8f:b2:29:4c:38:c1:ec:d9:a0:a1:a7:a7:43:64:d3:
        92:8e:37:3a:5d:61:45:4a:3d:9d:a0:eb:16:fc:21:f4:
        11:72:4a:93:9b:3c:a9:79:85:34:c5:c6:ec:9b:cd:63:
        d5:3f:0b:2d:8c:38:76:f0:b5:e1:45:16:99:bd:fe:c2:
        8b:6e:52:1e:c8:ac:97:61:e7:a6:e3:7b:71:49:da:dd:
        d8:f8:97:81:a7:8c:80:78:5e:10:76:b3:f1:a2:d3:61
    Fingerprint (MD5):
        C4:19:41:C1:F0:A4:87:00:8A:A8:03:6D:35:55:15:1C
    Fingerprint (SHA1):
        EA:5D:4C:8E:49:5A:FE:58:A7:AC:8F:BC:1D:15:D4:FF:05:DA:91:A6

    Friendly Name: Alice

tools.sh: #8750: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8751: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8752: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                71:2b:82:8a:08:55:c1:94:ce:2c:ae:e9:6f:03:0c:df
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:18:03 2012
            Not After : Tue Nov 28 16:18:03 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:e9:64:95:bb:eb:65:9a:03:e1:3f:e2:a9:8a:8b:76:
                    15:cd:13:07:7a:34:c8:39:2b:31:77:67:3f:d9:20:9b:
                    d2:68:3d:31:91:b7:73:f0:f1:46:eb:8c:ca:e9:18:3c:
                    59:dc:9f:13:aa:78:18:20:93:36:ae:72:ad:d9:12:2c:
                    02:01:d8:04:6e:84:fa:e7:07:0c:0a:33:20:ff:16:4d:
                    6a:13:af:29:d9:5d:30:0d:f7:82:4c:67:51:06:d0:0f:
                    b1:66:a5:a7:f4:42:2b:85:15:4c:57:bd:20:f7:23:a7:
                    a8:ec:83:f1:18:d2:8d:b8:32:c6:6a:89:08:4e:79:81
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        35:e8:a2:8f:ac:27:ea:19:d7:df:77:ed:c7:08:e8:90:
        9d:e9:7d:ba:1f:de:07:33:28:72:89:5b:a0:70:ed:7e:
        a3:b1:24:01:13:9c:72:2b:42:37:80:4f:77:b4:43:a9:
        d5:d4:79:10:c3:33:21:ee:f0:5a:4e:a7:03:e0:48:6d:
        1a:7e:5d:af:f9:bb:5f:96:94:8d:70:ee:b7:0a:a4:4f:
        30:9b:b0:15:2e:44:2f:da:12:fc:42:5d:fc:7a:13:73:
        2b:8e:f5:7c:70:11:e1:c4:2f:bf:33:33:9c:16:22:34:
        b7:83:7d:b1:86:5f:23:bd:be:dc:7a:ef:63:4d:d8:66
    Fingerprint (MD5):
        24:C3:FA:7B:B8:87:9E:56:B4:F6:44:8E:C6:12:2F:CE
    Fingerprint (SHA1):
        44:0F:DE:39:C3:51:19:48:3B:F9:DB:9A:8B:D8:0F:D8:5A:E1:80:81

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:19:01 2012
            Not After : Tue Nov 28 16:19:01 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:02:34:c6:22:e9:c3:5e:71:e7:50:e0:14:88:76:ec:
                    b1:f5:d9:3c:84:33:7b:83:fc:f6:46:2e:89:ec:0a:28:
                    b0:68:65:15:e1:90:68:97:28:fc:4d:a3:62:5a:5f:2d:
                    b7:70:80:3c:a4:ab:77:b1:81:86:1b:57:56:d4:b0:b8:
                    e2:b0:3a:fb:52:4a:65:79:1a:3f:32:7b:65:1a:70:95:
                    27:25:b7:9f:64:fc:71:f7:57:fc:c8:2b:51:2e:59:3f:
                    9a:72:55:36:75:64:2e:cb:a6:4e:c1:04:88:cd:c2:21:
                    81:a7:84:a7:51:dd:0b:d1:ea:13:59:98:e0:2c:a7:2f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3c:bd:f7:7d:4a:07:d0:8f:85:7b:33:08:9b:e9:0b:4d:
        32:97:64:93:1e:4c:f9:67:fd:e7:30:09:c3:63:7e:53:
        2e:8f:b2:29:4c:38:c1:ec:d9:a0:a1:a7:a7:43:64:d3:
        92:8e:37:3a:5d:61:45:4a:3d:9d:a0:eb:16:fc:21:f4:
        11:72:4a:93:9b:3c:a9:79:85:34:c5:c6:ec:9b:cd:63:
        d5:3f:0b:2d:8c:38:76:f0:b5:e1:45:16:99:bd:fe:c2:
        8b:6e:52:1e:c8:ac:97:61:e7:a6:e3:7b:71:49:da:dd:
        d8:f8:97:81:a7:8c:80:78:5e:10:76:b3:f1:a2:d3:61
    Fingerprint (MD5):
        C4:19:41:C1:F0:A4:87:00:8A:A8:03:6D:35:55:15:1C
    Fingerprint (SHA1):
        EA:5D:4C:8E:49:5A:FE:58:A7:AC:8F:BC:1D:15:D4:FF:05:DA:91:A6

    Friendly Name: Alice

tools.sh: #8753: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8754: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8755: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                24:26:ae:ea:a0:e6:74:27:dd:89:8c:42:14:ee:82:81
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:18:03 2012
            Not After : Tue Nov 28 16:18:03 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:e9:64:95:bb:eb:65:9a:03:e1:3f:e2:a9:8a:8b:76:
                    15:cd:13:07:7a:34:c8:39:2b:31:77:67:3f:d9:20:9b:
                    d2:68:3d:31:91:b7:73:f0:f1:46:eb:8c:ca:e9:18:3c:
                    59:dc:9f:13:aa:78:18:20:93:36:ae:72:ad:d9:12:2c:
                    02:01:d8:04:6e:84:fa:e7:07:0c:0a:33:20:ff:16:4d:
                    6a:13:af:29:d9:5d:30:0d:f7:82:4c:67:51:06:d0:0f:
                    b1:66:a5:a7:f4:42:2b:85:15:4c:57:bd:20:f7:23:a7:
                    a8:ec:83:f1:18:d2:8d:b8:32:c6:6a:89:08:4e:79:81
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        35:e8:a2:8f:ac:27:ea:19:d7:df:77:ed:c7:08:e8:90:
        9d:e9:7d:ba:1f:de:07:33:28:72:89:5b:a0:70:ed:7e:
        a3:b1:24:01:13:9c:72:2b:42:37:80:4f:77:b4:43:a9:
        d5:d4:79:10:c3:33:21:ee:f0:5a:4e:a7:03:e0:48:6d:
        1a:7e:5d:af:f9:bb:5f:96:94:8d:70:ee:b7:0a:a4:4f:
        30:9b:b0:15:2e:44:2f:da:12:fc:42:5d:fc:7a:13:73:
        2b:8e:f5:7c:70:11:e1:c4:2f:bf:33:33:9c:16:22:34:
        b7:83:7d:b1:86:5f:23:bd:be:dc:7a:ef:63:4d:d8:66
    Fingerprint (MD5):
        24:C3:FA:7B:B8:87:9E:56:B4:F6:44:8E:C6:12:2F:CE
    Fingerprint (SHA1):
        44:0F:DE:39:C3:51:19:48:3B:F9:DB:9A:8B:D8:0F:D8:5A:E1:80:81

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:19:01 2012
            Not After : Tue Nov 28 16:19:01 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:02:34:c6:22:e9:c3:5e:71:e7:50:e0:14:88:76:ec:
                    b1:f5:d9:3c:84:33:7b:83:fc:f6:46:2e:89:ec:0a:28:
                    b0:68:65:15:e1:90:68:97:28:fc:4d:a3:62:5a:5f:2d:
                    b7:70:80:3c:a4:ab:77:b1:81:86:1b:57:56:d4:b0:b8:
                    e2:b0:3a:fb:52:4a:65:79:1a:3f:32:7b:65:1a:70:95:
                    27:25:b7:9f:64:fc:71:f7:57:fc:c8:2b:51:2e:59:3f:
                    9a:72:55:36:75:64:2e:cb:a6:4e:c1:04:88:cd:c2:21:
                    81:a7:84:a7:51:dd:0b:d1:ea:13:59:98:e0:2c:a7:2f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3c:bd:f7:7d:4a:07:d0:8f:85:7b:33:08:9b:e9:0b:4d:
        32:97:64:93:1e:4c:f9:67:fd:e7:30:09:c3:63:7e:53:
        2e:8f:b2:29:4c:38:c1:ec:d9:a0:a1:a7:a7:43:64:d3:
        92:8e:37:3a:5d:61:45:4a:3d:9d:a0:eb:16:fc:21:f4:
        11:72:4a:93:9b:3c:a9:79:85:34:c5:c6:ec:9b:cd:63:
        d5:3f:0b:2d:8c:38:76:f0:b5:e1:45:16:99:bd:fe:c2:
        8b:6e:52:1e:c8:ac:97:61:e7:a6:e3:7b:71:49:da:dd:
        d8:f8:97:81:a7:8c:80:78:5e:10:76:b3:f1:a2:d3:61
    Fingerprint (MD5):
        C4:19:41:C1:F0:A4:87:00:8A:A8:03:6D:35:55:15:1C
    Fingerprint (SHA1):
        EA:5D:4C:8E:49:5A:FE:58:A7:AC:8F:BC:1D:15:D4:FF:05:DA:91:A6

    Friendly Name: Alice

tools.sh: #8756: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8757: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8758: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                8d:5d:5d:57:f9:24:1b:cb:58:fb:b3:fc:93:d1:3a:90
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:18:03 2012
            Not After : Tue Nov 28 16:18:03 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:e9:64:95:bb:eb:65:9a:03:e1:3f:e2:a9:8a:8b:76:
                    15:cd:13:07:7a:34:c8:39:2b:31:77:67:3f:d9:20:9b:
                    d2:68:3d:31:91:b7:73:f0:f1:46:eb:8c:ca:e9:18:3c:
                    59:dc:9f:13:aa:78:18:20:93:36:ae:72:ad:d9:12:2c:
                    02:01:d8:04:6e:84:fa:e7:07:0c:0a:33:20:ff:16:4d:
                    6a:13:af:29:d9:5d:30:0d:f7:82:4c:67:51:06:d0:0f:
                    b1:66:a5:a7:f4:42:2b:85:15:4c:57:bd:20:f7:23:a7:
                    a8:ec:83:f1:18:d2:8d:b8:32:c6:6a:89:08:4e:79:81
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        35:e8:a2:8f:ac:27:ea:19:d7:df:77:ed:c7:08:e8:90:
        9d:e9:7d:ba:1f:de:07:33:28:72:89:5b:a0:70:ed:7e:
        a3:b1:24:01:13:9c:72:2b:42:37:80:4f:77:b4:43:a9:
        d5:d4:79:10:c3:33:21:ee:f0:5a:4e:a7:03:e0:48:6d:
        1a:7e:5d:af:f9:bb:5f:96:94:8d:70:ee:b7:0a:a4:4f:
        30:9b:b0:15:2e:44:2f:da:12:fc:42:5d:fc:7a:13:73:
        2b:8e:f5:7c:70:11:e1:c4:2f:bf:33:33:9c:16:22:34:
        b7:83:7d:b1:86:5f:23:bd:be:dc:7a:ef:63:4d:d8:66
    Fingerprint (MD5):
        24:C3:FA:7B:B8:87:9E:56:B4:F6:44:8E:C6:12:2F:CE
    Fingerprint (SHA1):
        44:0F:DE:39:C3:51:19:48:3B:F9:DB:9A:8B:D8:0F:D8:5A:E1:80:81

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:19:01 2012
            Not After : Tue Nov 28 16:19:01 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:02:34:c6:22:e9:c3:5e:71:e7:50:e0:14:88:76:ec:
                    b1:f5:d9:3c:84:33:7b:83:fc:f6:46:2e:89:ec:0a:28:
                    b0:68:65:15:e1:90:68:97:28:fc:4d:a3:62:5a:5f:2d:
                    b7:70:80:3c:a4:ab:77:b1:81:86:1b:57:56:d4:b0:b8:
                    e2:b0:3a:fb:52:4a:65:79:1a:3f:32:7b:65:1a:70:95:
                    27:25:b7:9f:64:fc:71:f7:57:fc:c8:2b:51:2e:59:3f:
                    9a:72:55:36:75:64:2e:cb:a6:4e:c1:04:88:cd:c2:21:
                    81:a7:84:a7:51:dd:0b:d1:ea:13:59:98:e0:2c:a7:2f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3c:bd:f7:7d:4a:07:d0:8f:85:7b:33:08:9b:e9:0b:4d:
        32:97:64:93:1e:4c:f9:67:fd:e7:30:09:c3:63:7e:53:
        2e:8f:b2:29:4c:38:c1:ec:d9:a0:a1:a7:a7:43:64:d3:
        92:8e:37:3a:5d:61:45:4a:3d:9d:a0:eb:16:fc:21:f4:
        11:72:4a:93:9b:3c:a9:79:85:34:c5:c6:ec:9b:cd:63:
        d5:3f:0b:2d:8c:38:76:f0:b5:e1:45:16:99:bd:fe:c2:
        8b:6e:52:1e:c8:ac:97:61:e7:a6:e3:7b:71:49:da:dd:
        d8:f8:97:81:a7:8c:80:78:5e:10:76:b3:f1:a2:d3:61
    Fingerprint (MD5):
        C4:19:41:C1:F0:A4:87:00:8A:A8:03:6D:35:55:15:1C
    Fingerprint (SHA1):
        EA:5D:4C:8E:49:5A:FE:58:A7:AC:8F:BC:1D:15:D4:FF:05:DA:91:A6

    Friendly Name: Alice

tools.sh: #8759: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8760: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8761: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                d5:ec:20:5a:c0:41:08:ad:da:e9:0c:82:ef:34:5e:92
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:18:03 2012
            Not After : Tue Nov 28 16:18:03 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:e9:64:95:bb:eb:65:9a:03:e1:3f:e2:a9:8a:8b:76:
                    15:cd:13:07:7a:34:c8:39:2b:31:77:67:3f:d9:20:9b:
                    d2:68:3d:31:91:b7:73:f0:f1:46:eb:8c:ca:e9:18:3c:
                    59:dc:9f:13:aa:78:18:20:93:36:ae:72:ad:d9:12:2c:
                    02:01:d8:04:6e:84:fa:e7:07:0c:0a:33:20:ff:16:4d:
                    6a:13:af:29:d9:5d:30:0d:f7:82:4c:67:51:06:d0:0f:
                    b1:66:a5:a7:f4:42:2b:85:15:4c:57:bd:20:f7:23:a7:
                    a8:ec:83:f1:18:d2:8d:b8:32:c6:6a:89:08:4e:79:81
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        35:e8:a2:8f:ac:27:ea:19:d7:df:77:ed:c7:08:e8:90:
        9d:e9:7d:ba:1f:de:07:33:28:72:89:5b:a0:70:ed:7e:
        a3:b1:24:01:13:9c:72:2b:42:37:80:4f:77:b4:43:a9:
        d5:d4:79:10:c3:33:21:ee:f0:5a:4e:a7:03:e0:48:6d:
        1a:7e:5d:af:f9:bb:5f:96:94:8d:70:ee:b7:0a:a4:4f:
        30:9b:b0:15:2e:44:2f:da:12:fc:42:5d:fc:7a:13:73:
        2b:8e:f5:7c:70:11:e1:c4:2f:bf:33:33:9c:16:22:34:
        b7:83:7d:b1:86:5f:23:bd:be:dc:7a:ef:63:4d:d8:66
    Fingerprint (MD5):
        24:C3:FA:7B:B8:87:9E:56:B4:F6:44:8E:C6:12:2F:CE
    Fingerprint (SHA1):
        44:0F:DE:39:C3:51:19:48:3B:F9:DB:9A:8B:D8:0F:D8:5A:E1:80:81

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:19:01 2012
            Not After : Tue Nov 28 16:19:01 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:02:34:c6:22:e9:c3:5e:71:e7:50:e0:14:88:76:ec:
                    b1:f5:d9:3c:84:33:7b:83:fc:f6:46:2e:89:ec:0a:28:
                    b0:68:65:15:e1:90:68:97:28:fc:4d:a3:62:5a:5f:2d:
                    b7:70:80:3c:a4:ab:77:b1:81:86:1b:57:56:d4:b0:b8:
                    e2:b0:3a:fb:52:4a:65:79:1a:3f:32:7b:65:1a:70:95:
                    27:25:b7:9f:64:fc:71:f7:57:fc:c8:2b:51:2e:59:3f:
                    9a:72:55:36:75:64:2e:cb:a6:4e:c1:04:88:cd:c2:21:
                    81:a7:84:a7:51:dd:0b:d1:ea:13:59:98:e0:2c:a7:2f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3c:bd:f7:7d:4a:07:d0:8f:85:7b:33:08:9b:e9:0b:4d:
        32:97:64:93:1e:4c:f9:67:fd:e7:30:09:c3:63:7e:53:
        2e:8f:b2:29:4c:38:c1:ec:d9:a0:a1:a7:a7:43:64:d3:
        92:8e:37:3a:5d:61:45:4a:3d:9d:a0:eb:16:fc:21:f4:
        11:72:4a:93:9b:3c:a9:79:85:34:c5:c6:ec:9b:cd:63:
        d5:3f:0b:2d:8c:38:76:f0:b5:e1:45:16:99:bd:fe:c2:
        8b:6e:52:1e:c8:ac:97:61:e7:a6:e3:7b:71:49:da:dd:
        d8:f8:97:81:a7:8c:80:78:5e:10:76:b3:f1:a2:d3:61
    Fingerprint (MD5):
        C4:19:41:C1:F0:A4:87:00:8A:A8:03:6D:35:55:15:1C
    Fingerprint (SHA1):
        EA:5D:4C:8E:49:5A:FE:58:A7:AC:8F:BC:1D:15:D4:FF:05:DA:91:A6

    Friendly Name: Alice

tools.sh: #8762: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8763: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8764: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                a4:0f:7c:03:01:be:26:c8:70:a1:a0:c2:98:9e:03:2d
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:18:03 2012
            Not After : Tue Nov 28 16:18:03 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:e9:64:95:bb:eb:65:9a:03:e1:3f:e2:a9:8a:8b:76:
                    15:cd:13:07:7a:34:c8:39:2b:31:77:67:3f:d9:20:9b:
                    d2:68:3d:31:91:b7:73:f0:f1:46:eb:8c:ca:e9:18:3c:
                    59:dc:9f:13:aa:78:18:20:93:36:ae:72:ad:d9:12:2c:
                    02:01:d8:04:6e:84:fa:e7:07:0c:0a:33:20:ff:16:4d:
                    6a:13:af:29:d9:5d:30:0d:f7:82:4c:67:51:06:d0:0f:
                    b1:66:a5:a7:f4:42:2b:85:15:4c:57:bd:20:f7:23:a7:
                    a8:ec:83:f1:18:d2:8d:b8:32:c6:6a:89:08:4e:79:81
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        35:e8:a2:8f:ac:27:ea:19:d7:df:77:ed:c7:08:e8:90:
        9d:e9:7d:ba:1f:de:07:33:28:72:89:5b:a0:70:ed:7e:
        a3:b1:24:01:13:9c:72:2b:42:37:80:4f:77:b4:43:a9:
        d5:d4:79:10:c3:33:21:ee:f0:5a:4e:a7:03:e0:48:6d:
        1a:7e:5d:af:f9:bb:5f:96:94:8d:70:ee:b7:0a:a4:4f:
        30:9b:b0:15:2e:44:2f:da:12:fc:42:5d:fc:7a:13:73:
        2b:8e:f5:7c:70:11:e1:c4:2f:bf:33:33:9c:16:22:34:
        b7:83:7d:b1:86:5f:23:bd:be:dc:7a:ef:63:4d:d8:66
    Fingerprint (MD5):
        24:C3:FA:7B:B8:87:9E:56:B4:F6:44:8E:C6:12:2F:CE
    Fingerprint (SHA1):
        44:0F:DE:39:C3:51:19:48:3B:F9:DB:9A:8B:D8:0F:D8:5A:E1:80:81

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:19:01 2012
            Not After : Tue Nov 28 16:19:01 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:02:34:c6:22:e9:c3:5e:71:e7:50:e0:14:88:76:ec:
                    b1:f5:d9:3c:84:33:7b:83:fc:f6:46:2e:89:ec:0a:28:
                    b0:68:65:15:e1:90:68:97:28:fc:4d:a3:62:5a:5f:2d:
                    b7:70:80:3c:a4:ab:77:b1:81:86:1b:57:56:d4:b0:b8:
                    e2:b0:3a:fb:52:4a:65:79:1a:3f:32:7b:65:1a:70:95:
                    27:25:b7:9f:64:fc:71:f7:57:fc:c8:2b:51:2e:59:3f:
                    9a:72:55:36:75:64:2e:cb:a6:4e:c1:04:88:cd:c2:21:
                    81:a7:84:a7:51:dd:0b:d1:ea:13:59:98:e0:2c:a7:2f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3c:bd:f7:7d:4a:07:d0:8f:85:7b:33:08:9b:e9:0b:4d:
        32:97:64:93:1e:4c:f9:67:fd:e7:30:09:c3:63:7e:53:
        2e:8f:b2:29:4c:38:c1:ec:d9:a0:a1:a7:a7:43:64:d3:
        92:8e:37:3a:5d:61:45:4a:3d:9d:a0:eb:16:fc:21:f4:
        11:72:4a:93:9b:3c:a9:79:85:34:c5:c6:ec:9b:cd:63:
        d5:3f:0b:2d:8c:38:76:f0:b5:e1:45:16:99:bd:fe:c2:
        8b:6e:52:1e:c8:ac:97:61:e7:a6:e3:7b:71:49:da:dd:
        d8:f8:97:81:a7:8c:80:78:5e:10:76:b3:f1:a2:d3:61
    Fingerprint (MD5):
        C4:19:41:C1:F0:A4:87:00:8A:A8:03:6D:35:55:15:1C
    Fingerprint (SHA1):
        EA:5D:4C:8E:49:5A:FE:58:A7:AC:8F:BC:1D:15:D4:FF:05:DA:91:A6

    Friendly Name: Alice

tools.sh: #8765: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8766: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c null
pk12util: Algorithm: "null": security library: invalid algorithm.
tools.sh: #8767: Exporting with [null:default] (pk12util -o)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8768: Exporting with [default:null] (pk12util -o)  - PASSED
tools.sh: Create objsign cert -------------------------------
signtool -G "objectsigner" -d ../tools/signdir -p "nss"

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit the browser before continuing this operation. Enter 
"y" to continue, or anything else to abort: 

Enter certificate information.  All fields are optional. Acceptable
characters are numbers, letters, spaces, and apostrophes.
certificate common name: organization: organization unit: state or province: country (must be exactly 2 characters): username: email address: generated public/private key pair
certificate request generated
certificate has been signed
certificate "objsigner" added to database
Exported certificate to x509.raw and x509.cacert.
tools.sh: #8769: Create objsign cert (signtool -G)  - PASSED
tools.sh: Signing a jar of files ----------------------------
signtool -Z nojs.jar -d ../tools/signdir -p "nss" -k objsigner \
         ../tools/html
Generating ../tools/html/META-INF/manifest.mf file..
--> signjs.html
adding ../tools/html/signjs.html to nojs.jar...(deflated 28%)
--> sign.html
adding ../tools/html/sign.html to nojs.jar...(deflated 26%)
Generating zigbert.sf file..
adding ../tools/html/META-INF/manifest.mf to nojs.jar...(deflated 30%)
adding ../tools/html/META-INF/zigbert.sf to nojs.jar...(deflated 36%)
adding ../tools/html/META-INF/zigbert.rsa to nojs.jar...(deflated 33%)
tree "../tools/html" signed successfully
tools.sh: #8770: Signing a jar of files (signtool -Z)  - PASSED
tools.sh: Listing signed files in jar ----------------------
signtool -v nojs.jar -d ../tools/signdir -p nss -k objsigner
archive "nojs.jar" has passed crypto verification.
found a MF master manifest file: META-INF/manifest.mf
found a SF signature manifest file: META-INF/zigbert.sf
  md5 digest on global metainfo: match
  sha digest on global metainfo: match
found a RSA signature file: META-INF/zigbert.rsa

          status   path
    ------------   -------------------
        verified   signjs.html
        verified   sign.html
tools.sh: #8771: Listing signed files in jar (signtool -v)  - PASSED
tools.sh: Show who signed jar ------------------------------
signtool -w nojs.jar -d ../tools/signdir

Signer information:

nickname: objsigner
subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org
issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org
tools.sh: #8772: Show who signed jar (signtool -w)  - PASSED
tools.sh: Signing a xpi of files ----------------------------
signtool -Z nojs.xpi -X -d ../tools/signdir -p "nss" -k objsigner \
         ../tools/html
Generating ../tools/html/META-INF/manifest.mf file..
--> signjs.html
--> sign.html
Generating zigbert.sf file..
Creating XPI Compatible Archive 
adding ../tools/html/META-INF/zigbert.rsa to nojs.xpi...(deflated 33%)
--> signjs.html
adding ../tools/html/signjs.html to nojs.xpi...(deflated 28%)
--> sign.html
adding ../tools/html/sign.html to nojs.xpi...(deflated 26%)
adding ../tools/html/META-INF/manifest.mf to nojs.xpi...(deflated 30%)
adding ../tools/html/META-INF/zigbert.sf to nojs.xpi...(deflated 36%)
tree "../tools/html" signed successfully
tools.sh: #8773: Signing a xpi of files (signtool -Z -X)  - PASSED
tools.sh: Listing signed files in xpi ----------------------
signtool -v nojs.xpi -d ../tools/signdir -p nss -k objsigner
archive "nojs.xpi" has passed crypto verification.
found a RSA signature file: META-INF/zigbert.rsa
found a MF master manifest file: META-INF/manifest.mf
found a SF signature manifest file: META-INF/zigbert.sf
  md5 digest on global metainfo: match
  sha digest on global metainfo: match

          status   path
    ------------   -------------------
        verified   signjs.html
        verified   sign.html
tools.sh: #8774: Listing signed files in xpi (signtool -v)  - PASSED
tools.sh: Show who signed xpi ------------------------------
signtool -w nojs.xpi -d ../tools/signdir

Signer information:

nickname: objsigner
subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org
issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org
tools.sh: #8775: Show who signed xpi (signtool -w)  - PASSED
TIMESTAMP tools END: Wed Nov 28 11:23:47 EST 2012
Running tests for fips
TIMESTAMP fips BEGIN: Wed Nov 28 11:23:47 EST 2012
fips.sh: FIPS 140 Compliance Tests ===============================
fips.sh: Verify this module is in FIPS mode  -----------------
modutil -dbdir ../fips -list

Listing of PKCS #11 Modules
-----------------------------------------------------------
  1. NSS Internal FIPS PKCS #11 Module
 slots: 1 slot attached
status: loaded

 slot: NSS FIPS 140-2 User Private Key Services
token: NSS FIPS 140-2 Certificate DB

  2. RootCerts
library name: /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so
 slots: 1 slot attached
status: loaded

 slot: NSS Builtin Objects
token: Builtin Object Token
-----------------------------------------------------------
FIPS mode enabled.
fips.sh: #8776: Verify this module is in FIPS mode (modutil -chkfips true) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

FIPS_PUB_140_Test_Certificate                                Cu,Cu,Cu
fips.sh: #8777: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: List the FIPS module keys -------------------------
certutil -d ../fips -K -f ../tests.fipspw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
< 0> dsa      57ff9eb474f822f419d06d013ba77ccb2f110335   NSS FIPS 140-2 Certificate DB:FIPS_PUB_140_Test_Certificate
fips.sh: #8778: List the FIPS module keys (certutil -K) . - PASSED
fips.sh: Attempt to list FIPS module keys with incorrect password
certutil -d ../fips -K -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests.fipsbadpw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
Incorrect password/PIN entered.
certutil: could not authenticate to token NSS FIPS 140-2 Certificate DB.: The security password entered is incorrect.
fips.sh: #8779: Attempt to list FIPS module keys with incorrect password (certutil -K) . - PASSED
certutil -K returned 255
fips.sh: Validate the certificate --------------------------
certutil -d ../fips -V -n FIPS_PUB_140_Test_Certificate -u SR -e -f ../tests.fipspw
certutil: certificate is valid
fips.sh: #8780: Validate the certificate (certutil -V -e) . - PASSED
fips.sh: Export the certificate and key as a PKCS#12 file --
pk12util -d ../fips -o fips140.p12 -n FIPS_PUB_140_Test_Certificate -w ../tests.fipsp12pw -k ../tests.fipspw
pk12util: PKCS12 EXPORT SUCCESSFUL
fips.sh: #8781: Export the certificate and key as a PKCS#12 file (pk12util -o) . - PASSED
fips.sh: Export the certificate as a DER-encoded file ------
certutil -d ../fips -L -n FIPS_PUB_140_Test_Certificate -r -o fips140.crt
fips.sh: #8782: Export the certificate as a DER (certutil -L -r) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

FIPS_PUB_140_Test_Certificate                                Cu,Cu,Cu
fips.sh: #8783: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: Delete the certificate and key from the FIPS module
certutil -d ../fips -F -n FIPS_PUB_140_Test_Certificate -f ../tests.fipspw
fips.sh: #8784: Delete the certificate and key from the FIPS module (certutil -F) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI
fips.sh: #8785: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: List the FIPS module keys.
certutil -d ../fips -K -f ../tests.fipspw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
certutil: no keys found
fips.sh: #8786: List the FIPS module keys (certutil -K) . - PASSED
fips.sh: Import the certificate and key from the PKCS#12 file
pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw
pk12util: PKCS12 IMPORT SUCCESSFUL
fips.sh: #8787: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

FIPS_PUB_140_Test_Certificate                                u,u,u
fips.sh: #8788: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: List the FIPS module keys --------------------------
certutil -d ../fips -K -f ../tests.fipspw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
< 0> dsa      57ff9eb474f822f419d06d013ba77ccb2f110335   FIPS_PUB_140_Test_Certificate
fips.sh: #8789: List the FIPS module keys (certutil -K) . - PASSED
fips.sh: Delete the certificate from the FIPS module
certutil -d ../fips -D -n FIPS_PUB_140_Test_Certificate
fips.sh: #8790: Delete the certificate from the FIPS module (certutil -D) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI
fips.sh: #8791: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: Import the certificate and key from the PKCS#12 file
pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw
pk12util: PKCS12 IMPORT SUCCESSFUL
fips.sh: #8792: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

FIPS_PUB_140_Test_Certificate                                u,u,u
fips.sh: #8793: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: List the FIPS module keys --------------------------
certutil -d ../fips -K -f ../tests.fipspw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
< 0> dsa      57ff9eb474f822f419d06d013ba77ccb2f110335   FIPS_PUB_140_Test_Certificate
fips.sh: #8794: List the FIPS module keys (certutil -K) . - PASSED
fips.sh: Run PK11MODE in FIPSMODE  -----------------
pk11mode -d ../fips -p fips- -f ../tests.fipspw
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
**** Total number of TESTS ran in FIPS MODE is 106. ****
**** ALL TESTS PASSED ****
fips.sh: #8795: Run PK11MODE in FIPS mode (pk11mode) . - PASSED
fips.sh: Run PK11MODE in Non FIPSMODE  -----------------
pk11mode -d ../fips -p nonfips- -f ../tests.fipspw -n
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
**** Total number of TESTS ran in NON FIPS MODE is 104. ****
**** ALL TESTS PASSED ****
fips.sh: #8796: Run PK11MODE in Non FIPS mode (pk11mode -n) . - PASSED
mkdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libcertdb.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libcerthi.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libcrmf.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libcryptohi.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libdbm.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libfreebl3.chk /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libfreebl3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libfreebl.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libjar.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnspr4.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnspr4.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnss3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnss.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssb.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckfw.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssdbm3.chk /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssdbm3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssdbm.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssdev.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnsspki.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnsssysinit.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnsssysinit.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssutil3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libnssutil.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkcs12.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkcs7.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixparams.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixpki.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixresults.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixstore.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixtop.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixutil.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libplc4.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libplc4.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libplds4.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libplds4.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsmime3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsmime.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsoftokn3.chk /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsoftokn3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsoftokn.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsqlite3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libsqlite.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libssl3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/lib/libssl.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
fips.sh: Detect mangled softoken--------------------------
mangling /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle/libsoftokn3.so
mangle -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle/libsoftokn3.so -o -8 -b 5
Changing byte 0x0004e9cd (321997): from 5f (95) to 7f (127)
LD_LIBRARY_PATH=/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle dbtest -r -d ../fips
fips.sh: #8797: Init NSS with a corrupted library (dbtest -r) . - PASSED
fips.sh done
TIMESTAMP fips END: Wed Nov 28 11:24:18 EST 2012
Running tests for crmf
TIMESTAMP crmf BEGIN: Wed Nov 28 11:24:18 EST 2012
crmf.sh: CRMF/CMMF Tests ===============================
crmf.sh: CRMF/CMMF Tests ------------------------------
crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss crmf decode

crmftest v1.0
Generating CRMF request
Decoding CRMF request
crmftest: Processing cert request 0
crmftest: Processing cert request 1
Exiting successfully!!!

crmf.sh: #8798: CRMF test . - PASSED
crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss cmmf

crmftest v1.0
Doing CMMF Stuff
Exiting successfully!!!

crmf.sh: #8799: CMMF test . - PASSED
TIMESTAMP crmf END: Wed Nov 28 11:24:19 EST 2012
Running tests for smime
TIMESTAMP smime BEGIN: Wed Nov 28 11:24:19 EST 2012
smime.sh: S/MIME Tests with ECC ===============================
smime.sh: Signing Detached Message {SHA1} ------------------
cmsutil -S -T -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA1
smime.sh: #8800: Create Detached Signature Alice (SHA1) . - PASSED
cmsutil -D -i alice.dsig.SHA1 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #8801: Verifying Alice's Detached Signature (SHA1) . - PASSED
smime.sh: Signing Attached Message (SHA1) ------------------
cmsutil -S -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA1
smime.sh: #8802: Create Attached Signature Alice (SHA1) . - PASSED
cmsutil -D -i alice.sig.SHA1 -d ../bobdir -o alice.data.SHA1
smime.sh: #8803: Decode Alice's Attached Signature (SHA1) . - PASSED
diff alice.txt alice.data.SHA1
smime.sh: #8804: Compare Attached Signed Data and Original (SHA1) . - PASSED
smime.sh: Signing Detached Message ECDSA w/ {SHA1} ------------------
cmsutil -S -T -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA1
smime.sh: #8805: Create Detached Signature Alice (ECDSA w/ SHA1) . - PASSED
cmsutil -D -i alice-ec.dsig.SHA1 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #8806: Verifying Alice's Detached Signature (ECDSA w/ SHA1) . - PASSED
smime.sh: Signing Attached Message (ECDSA w/ SHA1) ------------------
cmsutil -S -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA1
smime.sh: #8807: Create Attached Signature Alice (ECDSA w/ SHA1) . - PASSED
cmsutil -D -i alice-ec.sig.SHA1 -d ../bobdir -o alice-ec.data.SHA1
smime.sh: #8808: Decode Alice's Attached Signature (ECDSA w/ SHA1) . - PASSED
diff alice.txt alice-ec.data.SHA1
smime.sh: #8809: Compare Attached Signed Data and Original (ECDSA w/ SHA1) . - PASSED
smime.sh: Signing Detached Message {SHA256} ------------------
cmsutil -S -T -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA256
smime.sh: #8810: Create Detached Signature Alice (SHA256) . - PASSED
cmsutil -D -i alice.dsig.SHA256 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #8811: Verifying Alice's Detached Signature (SHA256) . - PASSED
smime.sh: Signing Attached Message (SHA256) ------------------
cmsutil -S -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA256
smime.sh: #8812: Create Attached Signature Alice (SHA256) . - PASSED
cmsutil -D -i alice.sig.SHA256 -d ../bobdir -o alice.data.SHA256
smime.sh: #8813: Decode Alice's Attached Signature (SHA256) . - PASSED
diff alice.txt alice.data.SHA256
smime.sh: #8814: Compare Attached Signed Data and Original (SHA256) . - PASSED
smime.sh: Signing Detached Message ECDSA w/ {SHA256} ------------------
cmsutil -S -T -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA256
smime.sh: #8815: Create Detached Signature Alice (ECDSA w/ SHA256) . - PASSED
cmsutil -D -i alice-ec.dsig.SHA256 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #8816: Verifying Alice's Detached Signature (ECDSA w/ SHA256) . - PASSED
smime.sh: Signing Attached Message (ECDSA w/ SHA256) ------------------
cmsutil -S -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA256
smime.sh: #8817: Create Attached Signature Alice (ECDSA w/ SHA256) . - PASSED
cmsutil -D -i alice-ec.sig.SHA256 -d ../bobdir -o alice-ec.data.SHA256
smime.sh: #8818: Decode Alice's Attached Signature (ECDSA w/ SHA256) . - PASSED
diff alice.txt alice-ec.data.SHA256
smime.sh: #8819: Compare Attached Signed Data and Original (ECDSA w/ SHA256) . - PASSED
smime.sh: Signing Detached Message {SHA384} ------------------
cmsutil -S -T -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA384
smime.sh: #8820: Create Detached Signature Alice (SHA384) . - PASSED
cmsutil -D -i alice.dsig.SHA384 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #8821: Verifying Alice's Detached Signature (SHA384) . - PASSED
smime.sh: Signing Attached Message (SHA384) ------------------
cmsutil -S -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA384
smime.sh: #8822: Create Attached Signature Alice (SHA384) . - PASSED
cmsutil -D -i alice.sig.SHA384 -d ../bobdir -o alice.data.SHA384
smime.sh: #8823: Decode Alice's Attached Signature (SHA384) . - PASSED
diff alice.txt alice.data.SHA384
smime.sh: #8824: Compare Attached Signed Data and Original (SHA384) . - PASSED
smime.sh: Signing Detached Message ECDSA w/ {SHA384} ------------------
cmsutil -S -T -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA384
smime.sh: #8825: Create Detached Signature Alice (ECDSA w/ SHA384) . - PASSED
cmsutil -D -i alice-ec.dsig.SHA384 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #8826: Verifying Alice's Detached Signature (ECDSA w/ SHA384) . - PASSED
smime.sh: Signing Attached Message (ECDSA w/ SHA384) ------------------
cmsutil -S -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA384
smime.sh: #8827: Create Attached Signature Alice (ECDSA w/ SHA384) . - PASSED
cmsutil -D -i alice-ec.sig.SHA384 -d ../bobdir -o alice-ec.data.SHA384
smime.sh: #8828: Decode Alice's Attached Signature (ECDSA w/ SHA384) . - PASSED
diff alice.txt alice-ec.data.SHA384
smime.sh: #8829: Compare Attached Signed Data and Original (ECDSA w/ SHA384) . - PASSED
smime.sh: Signing Detached Message {SHA512} ------------------
cmsutil -S -T -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA512
smime.sh: #8830: Create Detached Signature Alice (SHA512) . - PASSED
cmsutil -D -i alice.dsig.SHA512 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #8831: Verifying Alice's Detached Signature (SHA512) . - PASSED
smime.sh: Signing Attached Message (SHA512) ------------------
cmsutil -S -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA512
smime.sh: #8832: Create Attached Signature Alice (SHA512) . - PASSED
cmsutil -D -i alice.sig.SHA512 -d ../bobdir -o alice.data.SHA512
smime.sh: #8833: Decode Alice's Attached Signature (SHA512) . - PASSED
diff alice.txt alice.data.SHA512
smime.sh: #8834: Compare Attached Signed Data and Original (SHA512) . - PASSED
smime.sh: Signing Detached Message ECDSA w/ {SHA512} ------------------
cmsutil -S -T -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA512
smime.sh: #8835: Create Detached Signature Alice (ECDSA w/ SHA512) . - PASSED
cmsutil -D -i alice-ec.dsig.SHA512 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #8836: Verifying Alice's Detached Signature (ECDSA w/ SHA512) . - PASSED
smime.sh: Signing Attached Message (ECDSA w/ SHA512) ------------------
cmsutil -S -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA512
smime.sh: #8837: Create Attached Signature Alice (ECDSA w/ SHA512) . - PASSED
cmsutil -D -i alice-ec.sig.SHA512 -d ../bobdir -o alice-ec.data.SHA512
smime.sh: #8838: Decode Alice's Attached Signature (ECDSA w/ SHA512) . - PASSED
diff alice.txt alice-ec.data.SHA512
smime.sh: #8839: Compare Attached Signed Data and Original (ECDSA w/ SHA512) . - PASSED
smime.sh: Enveloped Data Tests ------------------------------
cmsutil -E -r bob@bogus.com -i alice.txt -d ../alicedir -p nss \
        -o alice.env
smime.sh: #8840: Create Enveloped Data Alice . - PASSED
cmsutil -D -i alice.env -d ../bobdir -p nss -o alice.data1
smime.sh: #8841: Decode Enveloped Data Alice . - PASSED
diff alice.txt alice.data1
smime.sh: #8842: Compare Decoded Enveloped Data and Original . - PASSED
smime.sh: Testing multiple recipients ------------------------------
cmsutil -E -i alice.txt -d ../alicedir -o alicecc.env \
        -r bob@bogus.com,dave@bogus.com
smime.sh: #8843: Create Multiple Recipients Enveloped Data Alice . - PASSED
smime.sh: Testing multiple email addrs ------------------------------
cmsutil -E -i alice.txt -d ../alicedir -o aliceve.env \
        -r eve@bogus.net
smime.sh: #8844: Encrypt to a Multiple Email cert . - PASSED
cmsutil -D -i alicecc.env -d ../bobdir -p nss -o alice.data2
smime.sh: #8845: Decode Multiple Recipients Enveloped Data Alice by Bob . - PASSED
cmsutil -D -i alicecc.env -d ../dave -p nss -o alice.data3
smime.sh: #8846: Decode Multiple Recipients Enveloped Data Alice by Dave . - PASSED
cmsutil -D -i aliceve.env -d ../eve -p nss -o alice.data4
smime.sh: #8847: Decrypt with a Multiple Email cert . - PASSED
smime.sh: #8848: Compare Decoded Mult. Recipients Enveloped Data Alice/Bob . - PASSED
smime.sh: #8849: Compare Decoded Mult. Recipients Enveloped Data Alice/Dave . - PASSED
smime.sh: #8850: Compare Decoded with Multiple Email cert . - PASSED
smime.sh: Sending CERTS-ONLY Message ------------------------------
cmsutil -O -r "Alice,bob@bogus.com,dave@bogus.com" \
        -d ../alicedir > co.der
smime.sh: #8851: Create Certs-Only Alice . - PASSED
cmsutil -D -i co.der -d ../bobdir
smime.sh: #8852: Verify Certs-Only by CA . - PASSED
smime.sh: Encrypted-Data Message ---------------------------------
cmsutil -C -i alice.txt -e alicehello.env -d ../alicedir \
        -r "bob@bogus.com" > alice.enc
smime.sh: #8853: Create Encrypted-Data . - PASSED
cmsutil -D -i alice.enc -d ../bobdir -e alicehello.env -p nss \
        -o alice.data2
smime.sh: #8854: Decode Encrypted-Data . - PASSED
smime.sh: #8855: Compare Decoded and Original Data . - PASSED
smime.sh: p7 util Data Tests ------------------------------
p7env -d ../alicedir -r Alice -i alice.txt -o alice_p7.env
smime.sh: #8856: Creating envelope for user Alice . - PASSED
p7content -d ../alicedir -i alice.env -o alice_p7.data
smime.sh: #8857: Verifying file delivered to user Alice . - PASSED
diff alice.txt alice_p7.data.sed
smime.sh: #8858: Compare Decoded Enveloped Data and Original . - PASSED
p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e
smime.sh: #8859: Signing file for user Alice . - PASSED
p7verify -d ../alicedir -c alice.txt -s alice.sig
Signature is valid.
smime.sh: #8860: Verifying file delivered to user Alice . - PASSED
TIMESTAMP smime END: Wed Nov 28 11:24:26 EST 2012
Running tests for ssl
TIMESTAMP ssl BEGIN: Wed Nov 28 11:24:26 EST 2012
ssl.sh: SSL tests ===============================
ssl.sh: CRL SSL Client Tests   - with ECC ===============================
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:24:26 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:26 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 5867 >/dev/null 2>/dev/null
selfserv with PID 5867 found at Wed Nov 28 11:24:26 EST 2012
selfserv with PID 5867 started at Wed Nov 28 11:24:26 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8861: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 5867 at Wed Nov 28 11:24:26 EST 2012
kill -USR1 5867
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 5867 killed at Wed Nov 28 11:24:26 EST 2012
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:24:26 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:26 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 5925 >/dev/null 2>/dev/null
selfserv with PID 5925 found at Wed Nov 28 11:24:26 EST 2012
selfserv with PID 5925 started at Wed Nov 28 11:24:26 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8862: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 5925 at Wed Nov 28 11:24:26 EST 2012
kill -USR1 5925
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 5925 killed at Wed Nov 28 11:24:27 EST 2012
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:24:27 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:27 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 5983 >/dev/null 2>/dev/null
selfserv with PID 5983 found at Wed Nov 28 11:24:27 EST 2012
selfserv with PID 5983 started at Wed Nov 28 11:24:27 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8863: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 5983 at Wed Nov 28 11:24:27 EST 2012
kill -USR1 5983
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 5983 killed at Wed Nov 28 11:24:27 EST 2012
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Wed Nov 28 11:24:27 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:27 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 6053 >/dev/null 2>/dev/null
selfserv with PID 6053 found at Wed Nov 28 11:24:27 EST 2012
selfserv with PID 6053 started at Wed Nov 28 11:24:27 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8864: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 6053 at Wed Nov 28 11:24:27 EST 2012
kill -USR1 6053
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 6053 killed at Wed Nov 28 11:24:27 EST 2012
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Wed Nov 28 11:24:27 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:27 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 6111 >/dev/null 2>/dev/null
selfserv with PID 6111 found at Wed Nov 28 11:24:27 EST 2012
selfserv with PID 6111 started at Wed Nov 28 11:24:27 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8865: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 6111 at Wed Nov 28 11:24:28 EST 2012
kill -USR1 6111
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 6111 killed at Wed Nov 28 11:24:28 EST 2012
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Wed Nov 28 11:24:28 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:28 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 6170 >/dev/null 2>/dev/null
selfserv with PID 6170 found at Wed Nov 28 11:24:28 EST 2012
selfserv with PID 6170 started at Wed Nov 28 11:24:28 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8866: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 6170 at Wed Nov 28 11:24:28 EST 2012
kill -USR1 6170
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 6170 killed at Wed Nov 28 11:24:28 EST 2012
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Wed Nov 28 11:24:28 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:28 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 6240 >/dev/null 2>/dev/null
selfserv with PID 6240 found at Wed Nov 28 11:24:28 EST 2012
selfserv with PID 6240 started at Wed Nov 28 11:24:28 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #8867: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 6240 at Wed Nov 28 11:24:28 EST 2012
kill -USR1 6240
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 6240 killed at Wed Nov 28 11:24:28 EST 2012
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Wed Nov 28 11:24:28 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:28 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 6298 >/dev/null 2>/dev/null
selfserv with PID 6298 found at Wed Nov 28 11:24:28 EST 2012
selfserv with PID 6298 started at Wed Nov 28 11:24:28 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8868: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 6298 at Wed Nov 28 11:24:29 EST 2012
kill -USR1 6298
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 6298 killed at Wed Nov 28 11:24:29 EST 2012
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Wed Nov 28 11:24:29 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:29 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 6356 >/dev/null 2>/dev/null
selfserv with PID 6356 found at Wed Nov 28 11:24:29 EST 2012
selfserv with PID 6356 started at Wed Nov 28 11:24:29 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #8869: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 6356 at Wed Nov 28 11:24:29 EST 2012
kill -USR1 6356
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 6356 killed at Wed Nov 28 11:24:29 EST 2012
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:24:29 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:29 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 6426 >/dev/null 2>/dev/null
selfserv with PID 6426 found at Wed Nov 28 11:24:29 EST 2012
selfserv with PID 6426 started at Wed Nov 28 11:24:29 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #8870: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 6426 at Wed Nov 28 11:24:29 EST 2012
kill -USR1 6426
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 6426 killed at Wed Nov 28 11:24:29 EST 2012
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:24:29 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:29 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 6484 >/dev/null 2>/dev/null
selfserv with PID 6484 found at Wed Nov 28 11:24:29 EST 2012
selfserv with PID 6484 started at Wed Nov 28 11:24:29 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #8871: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 6484 at Wed Nov 28 11:24:30 EST 2012
kill -USR1 6484
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 6484 killed at Wed Nov 28 11:24:30 EST 2012
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:24:30 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:30 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 6542 >/dev/null 2>/dev/null
selfserv with PID 6542 found at Wed Nov 28 11:24:30 EST 2012
selfserv with PID 6542 started at Wed Nov 28 11:24:30 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #8872: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 6542 at Wed Nov 28 11:24:30 EST 2012
kill -USR1 6542
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 6542 killed at Wed Nov 28 11:24:30 EST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Wed Nov 28 11:24:30 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:30 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 6612 >/dev/null 2>/dev/null
selfserv with PID 6612 found at Wed Nov 28 11:24:30 EST 2012
selfserv with PID 6612 started at Wed Nov 28 11:24:30 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #8873: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 6612 at Wed Nov 28 11:24:30 EST 2012
kill -USR1 6612
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 6612 killed at Wed Nov 28 11:24:30 EST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Wed Nov 28 11:24:30 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:30 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 6670 >/dev/null 2>/dev/null
selfserv with PID 6670 found at Wed Nov 28 11:24:30 EST 2012
selfserv with PID 6670 started at Wed Nov 28 11:24:30 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #8874: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 6670 at Wed Nov 28 11:24:31 EST 2012
kill -USR1 6670
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 6670 killed at Wed Nov 28 11:24:31 EST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Wed Nov 28 11:24:31 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:31 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 6728 >/dev/null 2>/dev/null
selfserv with PID 6728 found at Wed Nov 28 11:24:31 EST 2012
selfserv with PID 6728 started at Wed Nov 28 11:24:31 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #8875: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 6728 at Wed Nov 28 11:24:31 EST 2012
kill -USR1 6728
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 6728 killed at Wed Nov 28 11:24:31 EST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Wed Nov 28 11:24:31 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:31 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 6798 >/dev/null 2>/dev/null
selfserv with PID 6798 found at Wed Nov 28 11:24:31 EST 2012
selfserv with PID 6798 started at Wed Nov 28 11:24:31 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #8876: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 6798 at Wed Nov 28 11:24:31 EST 2012
kill -USR1 6798
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 6798 killed at Wed Nov 28 11:24:31 EST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Wed Nov 28 11:24:31 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:31 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 6856 >/dev/null 2>/dev/null
selfserv with PID 6856 found at Wed Nov 28 11:24:31 EST 2012
selfserv with PID 6856 started at Wed Nov 28 11:24:31 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8877: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 6856 at Wed Nov 28 11:24:32 EST 2012
kill -USR1 6856
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 6856 killed at Wed Nov 28 11:24:32 EST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Wed Nov 28 11:24:32 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:32 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 6914 >/dev/null 2>/dev/null
selfserv with PID 6914 found at Wed Nov 28 11:24:32 EST 2012
selfserv with PID 6914 started at Wed Nov 28 11:24:32 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #8878: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 6914 at Wed Nov 28 11:24:32 EST 2012
kill -USR1 6914
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 6914 killed at Wed Nov 28 11:24:32 EST 2012
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:24:32 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:32 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 6984 >/dev/null 2>/dev/null
selfserv with PID 6984 found at Wed Nov 28 11:24:32 EST 2012
selfserv with PID 6984 started at Wed Nov 28 11:24:32 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8879: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 6984 at Wed Nov 28 11:24:32 EST 2012
kill -USR1 6984
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 6984 killed at Wed Nov 28 11:24:32 EST 2012
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:24:32 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:32 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 7042 >/dev/null 2>/dev/null
selfserv with PID 7042 found at Wed Nov 28 11:24:32 EST 2012
selfserv with PID 7042 started at Wed Nov 28 11:24:32 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8880: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 7042 at Wed Nov 28 11:24:33 EST 2012
kill -USR1 7042
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 7042 killed at Wed Nov 28 11:24:33 EST 2012
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:24:33 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:33 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 7100 >/dev/null 2>/dev/null
selfserv with PID 7100 found at Wed Nov 28 11:24:33 EST 2012
selfserv with PID 7100 started at Wed Nov 28 11:24:33 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8881: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 7100 at Wed Nov 28 11:24:33 EST 2012
kill -USR1 7100
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 7100 killed at Wed Nov 28 11:24:33 EST 2012
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Wed Nov 28 11:24:33 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:33 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 7170 >/dev/null 2>/dev/null
selfserv with PID 7170 found at Wed Nov 28 11:24:33 EST 2012
selfserv with PID 7170 started at Wed Nov 28 11:24:33 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8882: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 7170 at Wed Nov 28 11:24:33 EST 2012
kill -USR1 7170
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 7170 killed at Wed Nov 28 11:24:33 EST 2012
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Wed Nov 28 11:24:33 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:33 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 7228 >/dev/null 2>/dev/null
selfserv with PID 7228 found at Wed Nov 28 11:24:33 EST 2012
selfserv with PID 7228 started at Wed Nov 28 11:24:33 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8883: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 7228 at Wed Nov 28 11:24:34 EST 2012
kill -USR1 7228
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 7228 killed at Wed Nov 28 11:24:34 EST 2012
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Wed Nov 28 11:24:34 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:34 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 7286 >/dev/null 2>/dev/null
selfserv with PID 7286 found at Wed Nov 28 11:24:34 EST 2012
selfserv with PID 7286 started at Wed Nov 28 11:24:34 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8884: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 7286 at Wed Nov 28 11:24:34 EST 2012
kill -USR1 7286
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 7286 killed at Wed Nov 28 11:24:34 EST 2012
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Wed Nov 28 11:24:34 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:34 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 7356 >/dev/null 2>/dev/null
selfserv with PID 7356 found at Wed Nov 28 11:24:34 EST 2012
selfserv with PID 7356 started at Wed Nov 28 11:24:34 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #8885: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 7356 at Wed Nov 28 11:24:34 EST 2012
kill -USR1 7356
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 7356 killed at Wed Nov 28 11:24:34 EST 2012
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Wed Nov 28 11:24:35 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:35 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 7414 >/dev/null 2>/dev/null
selfserv with PID 7414 found at Wed Nov 28 11:24:35 EST 2012
selfserv with PID 7414 started at Wed Nov 28 11:24:35 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8886: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 7414 at Wed Nov 28 11:24:35 EST 2012
kill -USR1 7414
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 7414 killed at Wed Nov 28 11:24:35 EST 2012
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Wed Nov 28 11:24:35 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:35 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 7472 >/dev/null 2>/dev/null
selfserv with PID 7472 found at Wed Nov 28 11:24:35 EST 2012
selfserv with PID 7472 started at Wed Nov 28 11:24:35 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #8887: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 7472 at Wed Nov 28 11:24:35 EST 2012
kill -USR1 7472
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 7472 killed at Wed Nov 28 11:24:35 EST 2012
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:24:35 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:35 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 7542 >/dev/null 2>/dev/null
selfserv with PID 7542 found at Wed Nov 28 11:24:35 EST 2012
selfserv with PID 7542 started at Wed Nov 28 11:24:35 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #8888: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 7542 at Wed Nov 28 11:24:36 EST 2012
kill -USR1 7542
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 7542 killed at Wed Nov 28 11:24:36 EST 2012
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:24:36 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:36 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 7600 >/dev/null 2>/dev/null
selfserv with PID 7600 found at Wed Nov 28 11:24:36 EST 2012
selfserv with PID 7600 started at Wed Nov 28 11:24:36 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #8889: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 7600 at Wed Nov 28 11:24:36 EST 2012
kill -USR1 7600
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 7600 killed at Wed Nov 28 11:24:36 EST 2012
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:24:36 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:36 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 7658 >/dev/null 2>/dev/null
selfserv with PID 7658 found at Wed Nov 28 11:24:36 EST 2012
selfserv with PID 7658 started at Wed Nov 28 11:24:36 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #8890: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 7658 at Wed Nov 28 11:24:36 EST 2012
kill -USR1 7658
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 7658 killed at Wed Nov 28 11:24:36 EST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Wed Nov 28 11:24:36 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:36 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 7728 >/dev/null 2>/dev/null
selfserv with PID 7728 found at Wed Nov 28 11:24:36 EST 2012
selfserv with PID 7728 started at Wed Nov 28 11:24:36 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #8891: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 7728 at Wed Nov 28 11:24:36 EST 2012
kill -USR1 7728
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 7728 killed at Wed Nov 28 11:24:36 EST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Wed Nov 28 11:24:37 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 7786 >/dev/null 2>/dev/null
selfserv with PID 7786 found at Wed Nov 28 11:24:37 EST 2012
selfserv with PID 7786 started at Wed Nov 28 11:24:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #8892: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 7786 at Wed Nov 28 11:24:37 EST 2012
kill -USR1 7786
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 7786 killed at Wed Nov 28 11:24:37 EST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Wed Nov 28 11:24:37 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 7844 >/dev/null 2>/dev/null
selfserv with PID 7844 found at Wed Nov 28 11:24:37 EST 2012
selfserv with PID 7844 started at Wed Nov 28 11:24:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #8893: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 7844 at Wed Nov 28 11:24:37 EST 2012
kill -USR1 7844
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 7844 killed at Wed Nov 28 11:24:37 EST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Wed Nov 28 11:24:37 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 7914 >/dev/null 2>/dev/null
selfserv with PID 7914 found at Wed Nov 28 11:24:37 EST 2012
selfserv with PID 7914 started at Wed Nov 28 11:24:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #8894: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 7914 at Wed Nov 28 11:24:38 EST 2012
kill -USR1 7914
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 7914 killed at Wed Nov 28 11:24:38 EST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Wed Nov 28 11:24:38 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 7972 >/dev/null 2>/dev/null
selfserv with PID 7972 found at Wed Nov 28 11:24:38 EST 2012
selfserv with PID 7972 started at Wed Nov 28 11:24:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8895: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 7972 at Wed Nov 28 11:24:38 EST 2012
kill -USR1 7972
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 7972 killed at Wed Nov 28 11:24:38 EST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Wed Nov 28 11:24:38 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 8030 >/dev/null 2>/dev/null
selfserv with PID 8030 found at Wed Nov 28 11:24:38 EST 2012
selfserv with PID 8030 started at Wed Nov 28 11:24:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #8896: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 8030 at Wed Nov 28 11:24:38 EST 2012
kill -USR1 8030
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 8030 killed at Wed Nov 28 11:24:38 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:24:38 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 8100 >/dev/null 2>/dev/null
selfserv with PID 8100 found at Wed Nov 28 11:24:38 EST 2012
selfserv with PID 8100 started at Wed Nov 28 11:24:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8897: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 8100 at Wed Nov 28 11:24:39 EST 2012
kill -USR1 8100
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 8100 killed at Wed Nov 28 11:24:39 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:24:39 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 8158 >/dev/null 2>/dev/null
selfserv with PID 8158 found at Wed Nov 28 11:24:39 EST 2012
selfserv with PID 8158 started at Wed Nov 28 11:24:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8898: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 8158 at Wed Nov 28 11:24:39 EST 2012
kill -USR1 8158
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 8158 killed at Wed Nov 28 11:24:39 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:24:39 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 8216 >/dev/null 2>/dev/null
selfserv with PID 8216 found at Wed Nov 28 11:24:39 EST 2012
selfserv with PID 8216 started at Wed Nov 28 11:24:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8899: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 8216 at Wed Nov 28 11:24:39 EST 2012
kill -USR1 8216
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 8216 killed at Wed Nov 28 11:24:39 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:24:39 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 8286 >/dev/null 2>/dev/null
selfserv with PID 8286 found at Wed Nov 28 11:24:39 EST 2012
selfserv with PID 8286 started at Wed Nov 28 11:24:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8900: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 8286 at Wed Nov 28 11:24:40 EST 2012
kill -USR1 8286
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 8286 killed at Wed Nov 28 11:24:40 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:24:40 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 8344 >/dev/null 2>/dev/null
selfserv with PID 8344 found at Wed Nov 28 11:24:40 EST 2012
selfserv with PID 8344 started at Wed Nov 28 11:24:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8901: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 8344 at Wed Nov 28 11:24:40 EST 2012
kill -USR1 8344
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 8344 killed at Wed Nov 28 11:24:40 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:24:40 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 8402 >/dev/null 2>/dev/null
selfserv with PID 8402 found at Wed Nov 28 11:24:40 EST 2012
selfserv with PID 8402 started at Wed Nov 28 11:24:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8902: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 8402 at Wed Nov 28 11:24:40 EST 2012
kill -USR1 8402
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 8402 killed at Wed Nov 28 11:24:40 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:24:40 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Wed Nov 28 11:24:41 EST 2012
selfserv with PID 8472 started at Wed Nov 28 11:24:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #8903: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 8472 at Wed Nov 28 11:24:41 EST 2012
kill -USR1 8472
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 8472 killed at Wed Nov 28 11:24:41 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:24:41 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 8531 >/dev/null 2>/dev/null
selfserv with PID 8531 found at Wed Nov 28 11:24:41 EST 2012
selfserv with PID 8531 started at Wed Nov 28 11:24:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8904: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 8531 at Wed Nov 28 11:24:41 EST 2012
kill -USR1 8531
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 8531 killed at Wed Nov 28 11:24:41 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:24:41 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 8589 >/dev/null 2>/dev/null
selfserv with PID 8589 found at Wed Nov 28 11:24:41 EST 2012
selfserv with PID 8589 started at Wed Nov 28 11:24:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #8905: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 8589 at Wed Nov 28 11:24:42 EST 2012
kill -USR1 8589
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 8589 killed at Wed Nov 28 11:24:42 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:24:42 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 8659 >/dev/null 2>/dev/null
selfserv with PID 8659 found at Wed Nov 28 11:24:42 EST 2012
selfserv with PID 8659 started at Wed Nov 28 11:24:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #8906: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 8659 at Wed Nov 28 11:24:42 EST 2012
kill -USR1 8659
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 8659 killed at Wed Nov 28 11:24:42 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:24:42 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 8717 >/dev/null 2>/dev/null
selfserv with PID 8717 found at Wed Nov 28 11:24:42 EST 2012
selfserv with PID 8717 started at Wed Nov 28 11:24:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #8907: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 8717 at Wed Nov 28 11:24:42 EST 2012
kill -USR1 8717
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 8717 killed at Wed Nov 28 11:24:42 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:24:42 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 8775 >/dev/null 2>/dev/null
selfserv with PID 8775 found at Wed Nov 28 11:24:42 EST 2012
selfserv with PID 8775 started at Wed Nov 28 11:24:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #8908: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 8775 at Wed Nov 28 11:24:43 EST 2012
kill -USR1 8775
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 8775 killed at Wed Nov 28 11:24:43 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:24:43 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 8845 >/dev/null 2>/dev/null
selfserv with PID 8845 found at Wed Nov 28 11:24:43 EST 2012
selfserv with PID 8845 started at Wed Nov 28 11:24:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #8909: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 8845 at Wed Nov 28 11:24:43 EST 2012
kill -USR1 8845
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 8845 killed at Wed Nov 28 11:24:43 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:24:43 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 8903 >/dev/null 2>/dev/null
selfserv with PID 8903 found at Wed Nov 28 11:24:43 EST 2012
selfserv with PID 8903 started at Wed Nov 28 11:24:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #8910: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 8903 at Wed Nov 28 11:24:43 EST 2012
kill -USR1 8903
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 8903 killed at Wed Nov 28 11:24:43 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:24:43 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 8962 >/dev/null 2>/dev/null
selfserv with PID 8962 found at Wed Nov 28 11:24:43 EST 2012
selfserv with PID 8962 started at Wed Nov 28 11:24:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #8911: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 8962 at Wed Nov 28 11:24:44 EST 2012
kill -USR1 8962
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 8962 killed at Wed Nov 28 11:24:44 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:24:44 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 9032 >/dev/null 2>/dev/null
selfserv with PID 9032 found at Wed Nov 28 11:24:44 EST 2012
selfserv with PID 9032 started at Wed Nov 28 11:24:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #8912: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 9032 at Wed Nov 28 11:24:44 EST 2012
kill -USR1 9032
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 9032 killed at Wed Nov 28 11:24:44 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:24:44 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 9090 >/dev/null 2>/dev/null
selfserv with PID 9090 found at Wed Nov 28 11:24:44 EST 2012
selfserv with PID 9090 started at Wed Nov 28 11:24:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8913: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9090 at Wed Nov 28 11:24:44 EST 2012
kill -USR1 9090
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 9090 killed at Wed Nov 28 11:24:44 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:24:44 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 9148 >/dev/null 2>/dev/null
selfserv with PID 9148 found at Wed Nov 28 11:24:44 EST 2012
selfserv with PID 9148 started at Wed Nov 28 11:24:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #8914: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 9148 at Wed Nov 28 11:24:45 EST 2012
kill -USR1 9148
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 9148 killed at Wed Nov 28 11:24:45 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:24:45 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:45 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 9218 >/dev/null 2>/dev/null
selfserv with PID 9218 found at Wed Nov 28 11:24:45 EST 2012
selfserv with PID 9218 started at Wed Nov 28 11:24:45 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8915: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9218 at Wed Nov 28 11:24:45 EST 2012
kill -USR1 9218
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 9218 killed at Wed Nov 28 11:24:45 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:24:45 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:45 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 9276 >/dev/null 2>/dev/null
selfserv with PID 9276 found at Wed Nov 28 11:24:45 EST 2012
selfserv with PID 9276 started at Wed Nov 28 11:24:45 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8916: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9276 at Wed Nov 28 11:24:45 EST 2012
kill -USR1 9276
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 9276 killed at Wed Nov 28 11:24:45 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:24:45 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:45 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 9334 >/dev/null 2>/dev/null
selfserv with PID 9334 found at Wed Nov 28 11:24:45 EST 2012
selfserv with PID 9334 started at Wed Nov 28 11:24:45 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8917: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9334 at Wed Nov 28 11:24:46 EST 2012
kill -USR1 9334
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 9334 killed at Wed Nov 28 11:24:46 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:24:46 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 9404 >/dev/null 2>/dev/null
selfserv with PID 9404 found at Wed Nov 28 11:24:46 EST 2012
selfserv with PID 9404 started at Wed Nov 28 11:24:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8918: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9404 at Wed Nov 28 11:24:46 EST 2012
kill -USR1 9404
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 9404 killed at Wed Nov 28 11:24:46 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:24:46 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 9462 >/dev/null 2>/dev/null
selfserv with PID 9462 found at Wed Nov 28 11:24:46 EST 2012
selfserv with PID 9462 started at Wed Nov 28 11:24:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8919: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9462 at Wed Nov 28 11:24:46 EST 2012
kill -USR1 9462
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 9462 killed at Wed Nov 28 11:24:46 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:24:46 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 9520 >/dev/null 2>/dev/null
selfserv with PID 9520 found at Wed Nov 28 11:24:47 EST 2012
selfserv with PID 9520 started at Wed Nov 28 11:24:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8920: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9520 at Wed Nov 28 11:24:47 EST 2012
kill -USR1 9520
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 9520 killed at Wed Nov 28 11:24:47 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:24:47 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 9590 >/dev/null 2>/dev/null
selfserv with PID 9590 found at Wed Nov 28 11:24:47 EST 2012
selfserv with PID 9590 started at Wed Nov 28 11:24:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #8921: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 9590 at Wed Nov 28 11:24:47 EST 2012
kill -USR1 9590
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 9590 killed at Wed Nov 28 11:24:47 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:24:47 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 9648 >/dev/null 2>/dev/null
selfserv with PID 9648 found at Wed Nov 28 11:24:47 EST 2012
selfserv with PID 9648 started at Wed Nov 28 11:24:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8922: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9648 at Wed Nov 28 11:24:48 EST 2012
kill -USR1 9648
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 9648 killed at Wed Nov 28 11:24:48 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:24:48 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 9706 >/dev/null 2>/dev/null
selfserv with PID 9706 found at Wed Nov 28 11:24:48 EST 2012
selfserv with PID 9706 started at Wed Nov 28 11:24:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #8923: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 9706 at Wed Nov 28 11:24:48 EST 2012
kill -USR1 9706
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 9706 killed at Wed Nov 28 11:24:48 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:24:48 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 9776 >/dev/null 2>/dev/null
selfserv with PID 9776 found at Wed Nov 28 11:24:48 EST 2012
selfserv with PID 9776 started at Wed Nov 28 11:24:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #8924: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 9776 at Wed Nov 28 11:24:48 EST 2012
kill -USR1 9776
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 9776 killed at Wed Nov 28 11:24:48 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:24:48 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 9834 >/dev/null 2>/dev/null
selfserv with PID 9834 found at Wed Nov 28 11:24:48 EST 2012
selfserv with PID 9834 started at Wed Nov 28 11:24:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #8925: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 9834 at Wed Nov 28 11:24:49 EST 2012
kill -USR1 9834
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 9834 killed at Wed Nov 28 11:24:49 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:24:49 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:49 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Wed Nov 28 11:24:49 EST 2012
selfserv with PID 9892 started at Wed Nov 28 11:24:49 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #8926: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 9892 at Wed Nov 28 11:24:49 EST 2012
kill -USR1 9892
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 9892 killed at Wed Nov 28 11:24:49 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:24:49 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:49 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 9962 >/dev/null 2>/dev/null
selfserv with PID 9962 found at Wed Nov 28 11:24:49 EST 2012
selfserv with PID 9962 started at Wed Nov 28 11:24:49 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #8927: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 9962 at Wed Nov 28 11:24:49 EST 2012
kill -USR1 9962
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 9962 killed at Wed Nov 28 11:24:49 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:24:49 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:49 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 10020 >/dev/null 2>/dev/null
selfserv with PID 10020 found at Wed Nov 28 11:24:49 EST 2012
selfserv with PID 10020 started at Wed Nov 28 11:24:49 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #8928: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 10020 at Wed Nov 28 11:24:50 EST 2012
kill -USR1 10020
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 10020 killed at Wed Nov 28 11:24:50 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:24:50 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:50 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 10078 >/dev/null 2>/dev/null
selfserv with PID 10078 found at Wed Nov 28 11:24:50 EST 2012
selfserv with PID 10078 started at Wed Nov 28 11:24:50 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #8929: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 10078 at Wed Nov 28 11:24:50 EST 2012
kill -USR1 10078
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 10078 killed at Wed Nov 28 11:24:50 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:24:50 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:50 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 10148 >/dev/null 2>/dev/null
selfserv with PID 10148 found at Wed Nov 28 11:24:50 EST 2012
selfserv with PID 10148 started at Wed Nov 28 11:24:50 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #8930: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 10148 at Wed Nov 28 11:24:50 EST 2012
kill -USR1 10148
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 10148 killed at Wed Nov 28 11:24:50 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:24:50 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:50 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 10206 >/dev/null 2>/dev/null
selfserv with PID 10206 found at Wed Nov 28 11:24:50 EST 2012
selfserv with PID 10206 started at Wed Nov 28 11:24:50 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8931: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10206 at Wed Nov 28 11:24:51 EST 2012
kill -USR1 10206
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 10206 killed at Wed Nov 28 11:24:51 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:24:51 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:51 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 10264 >/dev/null 2>/dev/null
selfserv with PID 10264 found at Wed Nov 28 11:24:51 EST 2012
selfserv with PID 10264 started at Wed Nov 28 11:24:51 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #8932: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 10264 at Wed Nov 28 11:24:51 EST 2012
kill -USR1 10264
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 10264 killed at Wed Nov 28 11:24:51 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:24:51 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:51 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 10334 >/dev/null 2>/dev/null
selfserv with PID 10334 found at Wed Nov 28 11:24:51 EST 2012
selfserv with PID 10334 started at Wed Nov 28 11:24:51 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8933: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10334 at Wed Nov 28 11:24:51 EST 2012
kill -USR1 10334
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 10334 killed at Wed Nov 28 11:24:51 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:24:51 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:51 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 10392 >/dev/null 2>/dev/null
selfserv with PID 10392 found at Wed Nov 28 11:24:51 EST 2012
selfserv with PID 10392 started at Wed Nov 28 11:24:51 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8934: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10392 at Wed Nov 28 11:24:52 EST 2012
kill -USR1 10392
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 10392 killed at Wed Nov 28 11:24:52 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:24:52 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:52 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 10450 >/dev/null 2>/dev/null
selfserv with PID 10450 found at Wed Nov 28 11:24:52 EST 2012
selfserv with PID 10450 started at Wed Nov 28 11:24:52 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8935: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10450 at Wed Nov 28 11:24:52 EST 2012
kill -USR1 10450
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 10450 killed at Wed Nov 28 11:24:52 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:24:52 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:52 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 10520 >/dev/null 2>/dev/null
selfserv with PID 10520 found at Wed Nov 28 11:24:52 EST 2012
selfserv with PID 10520 started at Wed Nov 28 11:24:52 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8936: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10520 at Wed Nov 28 11:24:52 EST 2012
kill -USR1 10520
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 10520 killed at Wed Nov 28 11:24:52 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:24:52 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:52 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 10578 >/dev/null 2>/dev/null
selfserv with PID 10578 found at Wed Nov 28 11:24:52 EST 2012
selfserv with PID 10578 started at Wed Nov 28 11:24:52 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8937: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10578 at Wed Nov 28 11:24:53 EST 2012
kill -USR1 10578
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 10578 killed at Wed Nov 28 11:24:53 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:24:53 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:53 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 10636 >/dev/null 2>/dev/null
selfserv with PID 10636 found at Wed Nov 28 11:24:53 EST 2012
selfserv with PID 10636 started at Wed Nov 28 11:24:53 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8938: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10636 at Wed Nov 28 11:24:53 EST 2012
kill -USR1 10636
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 10636 killed at Wed Nov 28 11:24:53 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:24:53 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:53 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 10706 >/dev/null 2>/dev/null
selfserv with PID 10706 found at Wed Nov 28 11:24:53 EST 2012
selfserv with PID 10706 started at Wed Nov 28 11:24:53 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #8939: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 10706 at Wed Nov 28 11:24:54 EST 2012
kill -USR1 10706
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 10706 killed at Wed Nov 28 11:24:54 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:24:54 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:54 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 10764 >/dev/null 2>/dev/null
selfserv with PID 10764 found at Wed Nov 28 11:24:54 EST 2012
selfserv with PID 10764 started at Wed Nov 28 11:24:54 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8940: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10764 at Wed Nov 28 11:24:54 EST 2012
kill -USR1 10764
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 10764 killed at Wed Nov 28 11:24:54 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:24:54 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:54 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 10822 >/dev/null 2>/dev/null
selfserv with PID 10822 found at Wed Nov 28 11:24:54 EST 2012
selfserv with PID 10822 started at Wed Nov 28 11:24:54 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #8941: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 10822 at Wed Nov 28 11:24:55 EST 2012
kill -USR1 10822
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 10822 killed at Wed Nov 28 11:24:55 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:24:55 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:55 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 10893 >/dev/null 2>/dev/null
selfserv with PID 10893 found at Wed Nov 28 11:24:55 EST 2012
selfserv with PID 10893 started at Wed Nov 28 11:24:55 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #8942: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 10893 at Wed Nov 28 11:24:55 EST 2012
kill -USR1 10893
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 10893 killed at Wed Nov 28 11:24:55 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:24:55 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:55 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 10951 >/dev/null 2>/dev/null
selfserv with PID 10951 found at Wed Nov 28 11:24:55 EST 2012
selfserv with PID 10951 started at Wed Nov 28 11:24:55 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #8943: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 10951 at Wed Nov 28 11:24:55 EST 2012
kill -USR1 10951
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 10951 killed at Wed Nov 28 11:24:55 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed Nov 28 11:24:55 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:55 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 11011 >/dev/null 2>/dev/null
selfserv with PID 11011 found at Wed Nov 28 11:24:55 EST 2012
selfserv with PID 11011 started at Wed Nov 28 11:24:55 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #8944: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 11011 at Wed Nov 28 11:24:56 EST 2012
kill -USR1 11011
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 11011 killed at Wed Nov 28 11:24:56 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:24:56 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:56 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 11081 >/dev/null 2>/dev/null
selfserv with PID 11081 found at Wed Nov 28 11:24:56 EST 2012
selfserv with PID 11081 started at Wed Nov 28 11:24:56 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #8945: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 11081 at Wed Nov 28 11:24:56 EST 2012
kill -USR1 11081
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 11081 killed at Wed Nov 28 11:24:56 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:24:56 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:56 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 11139 >/dev/null 2>/dev/null
selfserv with PID 11139 found at Wed Nov 28 11:24:56 EST 2012
selfserv with PID 11139 started at Wed Nov 28 11:24:56 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #8946: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 11139 at Wed Nov 28 11:24:56 EST 2012
kill -USR1 11139
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 11139 killed at Wed Nov 28 11:24:56 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed Nov 28 11:24:56 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:56 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 11197 >/dev/null 2>/dev/null
selfserv with PID 11197 found at Wed Nov 28 11:24:57 EST 2012
selfserv with PID 11197 started at Wed Nov 28 11:24:57 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #8947: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 11197 at Wed Nov 28 11:24:57 EST 2012
kill -USR1 11197
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 11197 killed at Wed Nov 28 11:24:57 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:24:57 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:57 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 11267 >/dev/null 2>/dev/null
selfserv with PID 11267 found at Wed Nov 28 11:24:57 EST 2012
selfserv with PID 11267 started at Wed Nov 28 11:24:57 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #8948: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 11267 at Wed Nov 28 11:24:57 EST 2012
kill -USR1 11267
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 11267 killed at Wed Nov 28 11:24:57 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:24:57 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:57 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 11325 >/dev/null 2>/dev/null
selfserv with PID 11325 found at Wed Nov 28 11:24:57 EST 2012
selfserv with PID 11325 started at Wed Nov 28 11:24:57 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8949: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11325 at Wed Nov 28 11:24:58 EST 2012
kill -USR1 11325
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 11325 killed at Wed Nov 28 11:24:58 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:24:58 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:58 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 11383 >/dev/null 2>/dev/null
selfserv with PID 11383 found at Wed Nov 28 11:24:58 EST 2012
selfserv with PID 11383 started at Wed Nov 28 11:24:58 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #8950: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 11383 at Wed Nov 28 11:24:58 EST 2012
kill -USR1 11383
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 11383 killed at Wed Nov 28 11:24:58 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:24:58 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:58 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 11462 >/dev/null 2>/dev/null
selfserv with PID 11462 found at Wed Nov 28 11:24:58 EST 2012
selfserv with PID 11462 started at Wed Nov 28 11:24:58 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8951: TLS Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11462 at Wed Nov 28 11:24:58 EST 2012
kill -USR1 11462
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 11462 killed at Wed Nov 28 11:24:58 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:24:58 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:58 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 11520 >/dev/null 2>/dev/null
selfserv with PID 11520 found at Wed Nov 28 11:24:58 EST 2012
selfserv with PID 11520 started at Wed Nov 28 11:24:58 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8952: TLS Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11520 at Wed Nov 28 11:24:59 EST 2012
kill -USR1 11520
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 11520 killed at Wed Nov 28 11:24:59 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:24:59 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:59 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 11578 >/dev/null 2>/dev/null
selfserv with PID 11578 found at Wed Nov 28 11:24:59 EST 2012
selfserv with PID 11578 started at Wed Nov 28 11:24:59 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8953: TLS Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11578 at Wed Nov 28 11:24:59 EST 2012
kill -USR1 11578
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 11578 killed at Wed Nov 28 11:24:59 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:24:59 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:59 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 11650 >/dev/null 2>/dev/null
selfserv with PID 11650 found at Wed Nov 28 11:24:59 EST 2012
selfserv with PID 11650 started at Wed Nov 28 11:24:59 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #8954: TLS Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 11650 at Wed Nov 28 11:24:59 EST 2012
kill -USR1 11650
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 11650 killed at Wed Nov 28 11:24:59 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:24:59 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:24:59 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 11708 >/dev/null 2>/dev/null
selfserv with PID 11708 found at Wed Nov 28 11:24:59 EST 2012
selfserv with PID 11708 started at Wed Nov 28 11:24:59 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8955: TLS Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11708 at Wed Nov 28 11:25:00 EST 2012
kill -USR1 11708
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 11708 killed at Wed Nov 28 11:25:00 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:25:00 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:25:00 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 11768 >/dev/null 2>/dev/null
selfserv with PID 11768 found at Wed Nov 28 11:25:00 EST 2012
selfserv with PID 11768 started at Wed Nov 28 11:25:00 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #8956: TLS Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 11768 at Wed Nov 28 11:25:00 EST 2012
kill -USR1 11768
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 11768 killed at Wed Nov 28 11:25:00 EST 2012
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:25:00 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:25:00 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 11838 >/dev/null 2>/dev/null
selfserv with PID 11838 found at Wed Nov 28 11:25:00 EST 2012
selfserv with PID 11838 started at Wed Nov 28 11:25:00 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #8957: TLS Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 11838 at Wed Nov 28 11:25:00 EST 2012
kill -USR1 11838
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 11838 killed at Wed Nov 28 11:25:00 EST 2012
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:25:00 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:25:00 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 11896 >/dev/null 2>/dev/null
selfserv with PID 11896 found at Wed Nov 28 11:25:00 EST 2012
selfserv with PID 11896 started at Wed Nov 28 11:25:00 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #8958: TLS Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 11896 at Wed Nov 28 11:25:01 EST 2012
kill -USR1 11896
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 11896 killed at Wed Nov 28 11:25:01 EST 2012
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:25:01 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:25:01 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 11954 >/dev/null 2>/dev/null
selfserv with PID 11954 found at Wed Nov 28 11:25:01 EST 2012
selfserv with PID 11954 started at Wed Nov 28 11:25:01 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #8959: TLS Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 11954 at Wed Nov 28 11:25:01 EST 2012
kill -USR1 11954
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 11954 killed at Wed Nov 28 11:25:01 EST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:25:01 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:25:01 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 12024 >/dev/null 2>/dev/null
selfserv with PID 12024 found at Wed Nov 28 11:25:01 EST 2012
selfserv with PID 12024 started at Wed Nov 28 11:25:01 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #8960: TLS Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 12024 at Wed Nov 28 11:25:01 EST 2012
kill -USR1 12024
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 12024 killed at Wed Nov 28 11:25:01 EST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:25:01 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:25:01 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 12082 >/dev/null 2>/dev/null
selfserv with PID 12082 found at Wed Nov 28 11:25:02 EST 2012
selfserv with PID 12082 started at Wed Nov 28 11:25:02 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8961: TLS Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12082 at Wed Nov 28 11:25:02 EST 2012
kill -USR1 12082
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 12082 killed at Wed Nov 28 11:25:02 EST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:25:02 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:25:02 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 12140 >/dev/null 2>/dev/null
selfserv with PID 12140 found at Wed Nov 28 11:25:02 EST 2012
selfserv with PID 12140 started at Wed Nov 28 11:25:02 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #8962: TLS Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 12140 at Wed Nov 28 11:25:02 EST 2012
kill -USR1 12140
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 12140 killed at Wed Nov 28 11:25:02 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:25:02 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:25:02 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 12210 >/dev/null 2>/dev/null
selfserv with PID 12210 found at Wed Nov 28 11:25:02 EST 2012
selfserv with PID 12210 started at Wed Nov 28 11:25:02 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8963: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12210 at Wed Nov 28 11:25:03 EST 2012
kill -USR1 12210
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 12210 killed at Wed Nov 28 11:25:03 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:25:03 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:25:03 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 12268 >/dev/null 2>/dev/null
selfserv with PID 12268 found at Wed Nov 28 11:25:03 EST 2012
selfserv with PID 12268 started at Wed Nov 28 11:25:03 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8964: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12268 at Wed Nov 28 11:25:03 EST 2012
kill -USR1 12268
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 12268 killed at Wed Nov 28 11:25:03 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:25:03 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:25:03 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 12326 >/dev/null 2>/dev/null
selfserv with PID 12326 found at Wed Nov 28 11:25:03 EST 2012
selfserv with PID 12326 started at Wed Nov 28 11:25:03 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8965: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12326 at Wed Nov 28 11:25:03 EST 2012
kill -USR1 12326
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 12326 killed at Wed Nov 28 11:25:03 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:25:03 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:25:03 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 12396 >/dev/null 2>/dev/null
selfserv with PID 12396 found at Wed Nov 28 11:25:03 EST 2012
selfserv with PID 12396 started at Wed Nov 28 11:25:03 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #8966: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 12396 at Wed Nov 28 11:25:04 EST 2012
kill -USR1 12396
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 12396 killed at Wed Nov 28 11:25:04 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:25:04 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:25:04 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 12454 >/dev/null 2>/dev/null
selfserv with PID 12454 found at Wed Nov 28 11:25:04 EST 2012
selfserv with PID 12454 started at Wed Nov 28 11:25:04 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8967: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12454 at Wed Nov 28 11:25:04 EST 2012
kill -USR1 12454
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 12454 killed at Wed Nov 28 11:25:04 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:25:04 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:25:04 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 12512 >/dev/null 2>/dev/null
selfserv with PID 12512 found at Wed Nov 28 11:25:04 EST 2012
selfserv with PID 12512 started at Wed Nov 28 11:25:04 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #8968: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 12512 at Wed Nov 28 11:25:04 EST 2012
kill -USR1 12512
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 12512 killed at Wed Nov 28 11:25:05 EST 2012
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:25:05 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:25:05 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 12582 >/dev/null 2>/dev/null
selfserv with PID 12582 found at Wed Nov 28 11:25:05 EST 2012
selfserv with PID 12582 started at Wed Nov 28 11:25:05 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #8969: SSL3 Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 12582 at Wed Nov 28 11:25:05 EST 2012
kill -USR1 12582
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 12582 killed at Wed Nov 28 11:25:05 EST 2012
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:25:05 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:25:05 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 12640 >/dev/null 2>/dev/null
selfserv with PID 12640 found at Wed Nov 28 11:25:05 EST 2012
selfserv with PID 12640 started at Wed Nov 28 11:25:05 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #8970: SSL3 Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 12640 at Wed Nov 28 11:25:05 EST 2012
kill -USR1 12640
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 12640 killed at Wed Nov 28 11:25:05 EST 2012
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:25:05 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:25:05 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 12698 >/dev/null 2>/dev/null
selfserv with PID 12698 found at Wed Nov 28 11:25:05 EST 2012
selfserv with PID 12698 started at Wed Nov 28 11:25:05 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #8971: SSL3 Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 12698 at Wed Nov 28 11:25:06 EST 2012
kill -USR1 12698
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 12698 killed at Wed Nov 28 11:25:06 EST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:25:06 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:25:06 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 12768 >/dev/null 2>/dev/null
selfserv with PID 12768 found at Wed Nov 28 11:25:06 EST 2012
selfserv with PID 12768 started at Wed Nov 28 11:25:06 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #8972: SSL3 Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 12768 at Wed Nov 28 11:25:06 EST 2012
kill -USR1 12768
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 12768 killed at Wed Nov 28 11:25:06 EST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:25:06 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:25:06 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 12826 >/dev/null 2>/dev/null
selfserv with PID 12826 found at Wed Nov 28 11:25:06 EST 2012
selfserv with PID 12826 started at Wed Nov 28 11:25:06 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8973: SSL3 Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12826 at Wed Nov 28 11:25:06 EST 2012
kill -USR1 12826
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 12826 killed at Wed Nov 28 11:25:06 EST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:25:06 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:25:06 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 12884 >/dev/null 2>/dev/null
selfserv with PID 12884 found at Wed Nov 28 11:25:06 EST 2012
selfserv with PID 12884 started at Wed Nov 28 11:25:06 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #8974: SSL3 Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 12884 at Wed Nov 28 11:25:07 EST 2012
kill -USR1 12884
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 12884 killed at Wed Nov 28 11:25:07 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:25:07 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:25:07 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 12954 >/dev/null 2>/dev/null
selfserv with PID 12954 found at Wed Nov 28 11:25:07 EST 2012
selfserv with PID 12954 started at Wed Nov 28 11:25:07 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8975: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12954 at Wed Nov 28 11:25:07 EST 2012
kill -USR1 12954
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 12954 killed at Wed Nov 28 11:25:07 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:25:07 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:25:07 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 13012 >/dev/null 2>/dev/null
selfserv with PID 13012 found at Wed Nov 28 11:25:07 EST 2012
selfserv with PID 13012 started at Wed Nov 28 11:25:07 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8976: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 13012 at Wed Nov 28 11:25:07 EST 2012
kill -USR1 13012
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 13012 killed at Wed Nov 28 11:25:07 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:25:07 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:25:07 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 13070 >/dev/null 2>/dev/null
selfserv with PID 13070 found at Wed Nov 28 11:25:07 EST 2012
selfserv with PID 13070 started at Wed Nov 28 11:25:07 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8977: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 13070 at Wed Nov 28 11:25:08 EST 2012
kill -USR1 13070
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 13070 killed at Wed Nov 28 11:25:08 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:25:08 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:25:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 13140 >/dev/null 2>/dev/null
selfserv with PID 13140 found at Wed Nov 28 11:25:08 EST 2012
selfserv with PID 13140 started at Wed Nov 28 11:25:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #8978: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 13140 at Wed Nov 28 11:25:08 EST 2012
kill -USR1 13140
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 13140 killed at Wed Nov 28 11:25:08 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:25:08 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:25:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 13198 >/dev/null 2>/dev/null
selfserv with PID 13198 found at Wed Nov 28 11:25:08 EST 2012
selfserv with PID 13198 started at Wed Nov 28 11:25:08 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8979: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 13198 at Wed Nov 28 11:25:09 EST 2012
kill -USR1 13198
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 13198 killed at Wed Nov 28 11:25:09 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:25:09 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:25:09 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 13256 >/dev/null 2>/dev/null
selfserv with PID 13256 found at Wed Nov 28 11:25:09 EST 2012
selfserv with PID 13256 started at Wed Nov 28 11:25:09 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #8980: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 13256 at Wed Nov 28 11:25:09 EST 2012
kill -USR1 13256
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 13256 killed at Wed Nov 28 11:25:09 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:25:09 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:25:09 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 13326 >/dev/null 2>/dev/null
selfserv with PID 13326 found at Wed Nov 28 11:25:09 EST 2012
selfserv with PID 13326 started at Wed Nov 28 11:25:09 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #8981: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 13326 at Wed Nov 28 11:25:09 EST 2012
kill -USR1 13326
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 13326 killed at Wed Nov 28 11:25:09 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:25:09 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:25:09 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 13384 >/dev/null 2>/dev/null
selfserv with PID 13384 found at Wed Nov 28 11:25:09 EST 2012
selfserv with PID 13384 started at Wed Nov 28 11:25:09 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #8982: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 13384 at Wed Nov 28 11:25:10 EST 2012
kill -USR1 13384
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 13384 killed at Wed Nov 28 11:25:10 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:25:10 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:25:10 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 13442 >/dev/null 2>/dev/null
selfserv with PID 13442 found at Wed Nov 28 11:25:10 EST 2012
selfserv with PID 13442 started at Wed Nov 28 11:25:10 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #8983: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 13442 at Wed Nov 28 11:25:10 EST 2012
kill -USR1 13442
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 13442 killed at Wed Nov 28 11:25:10 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:25:10 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:25:10 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 13512 >/dev/null 2>/dev/null
selfserv with PID 13512 found at Wed Nov 28 11:25:10 EST 2012
selfserv with PID 13512 started at Wed Nov 28 11:25:10 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x09 for socket out_flags.
tstclnt: PR_Poll returned 0x09 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #8984: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 13512 at Wed Nov 28 11:25:10 EST 2012
kill -USR1 13512
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 13512 killed at Wed Nov 28 11:25:10 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:25:10 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:25:10 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 13571 >/dev/null 2>/dev/null
selfserv with PID 13571 found at Wed Nov 28 11:25:10 EST 2012
selfserv with PID 13571 started at Wed Nov 28 11:25:10 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8985: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 13571 at Wed Nov 28 11:25:11 EST 2012
kill -USR1 13571
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 13571 killed at Wed Nov 28 11:25:11 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:25:11 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:25:11 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 13629 >/dev/null 2>/dev/null
selfserv with PID 13629 found at Wed Nov 28 11:25:11 EST 2012
selfserv with PID 13629 started at Wed Nov 28 11:25:11 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #8986: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 13629 at Wed Nov 28 11:25:11 EST 2012
kill -USR1 13629
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 13629 killed at Wed Nov 28 11:25:11 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:25:11 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:25:11 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 13699 >/dev/null 2>/dev/null
selfserv with PID 13699 found at Wed Nov 28 11:25:11 EST 2012
selfserv with PID 13699 started at Wed Nov 28 11:25:11 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8987: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 13699 at Wed Nov 28 11:25:11 EST 2012
kill -USR1 13699
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 13699 killed at Wed Nov 28 11:25:12 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:25:12 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:25:12 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 13757 >/dev/null 2>/dev/null
selfserv with PID 13757 found at Wed Nov 28 11:25:12 EST 2012
selfserv with PID 13757 started at Wed Nov 28 11:25:12 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8988: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 13757 at Wed Nov 28 11:25:12 EST 2012
kill -USR1 13757
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 13757 killed at Wed Nov 28 11:25:12 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:25:12 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:25:12 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 13815 >/dev/null 2>/dev/null
selfserv with PID 13815 found at Wed Nov 28 11:25:12 EST 2012
selfserv with PID 13815 started at Wed Nov 28 11:25:12 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8989: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 13815 at Wed Nov 28 11:25:12 EST 2012
kill -USR1 13815
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 13815 killed at Wed Nov 28 11:25:12 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:25:12 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:25:12 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 13886 >/dev/null 2>/dev/null
selfserv with PID 13886 found at Wed Nov 28 11:25:12 EST 2012
selfserv with PID 13886 started at Wed Nov 28 11:25:12 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #8990: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 13886 at Wed Nov 28 11:25:13 EST 2012
kill -USR1 13886
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 13886 killed at Wed Nov 28 11:25:13 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:25:13 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:25:13 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 13944 >/dev/null 2>/dev/null
selfserv with PID 13944 found at Wed Nov 28 11:25:13 EST 2012
selfserv with PID 13944 started at Wed Nov 28 11:25:13 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8991: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 13944 at Wed Nov 28 11:25:13 EST 2012
kill -USR1 13944
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 13944 killed at Wed Nov 28 11:25:13 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:25:13 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:25:13 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 14002 >/dev/null 2>/dev/null
selfserv with PID 14002 found at Wed Nov 28 11:25:13 EST 2012
selfserv with PID 14002 started at Wed Nov 28 11:25:13 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #8992: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 14002 at Wed Nov 28 11:25:13 EST 2012
kill -USR1 14002
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 14002 killed at Wed Nov 28 11:25:13 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:25:13 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:25:13 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 14072 >/dev/null 2>/dev/null
selfserv with PID 14072 found at Wed Nov 28 11:25:13 EST 2012
selfserv with PID 14072 started at Wed Nov 28 11:25:13 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #8993: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 14072 at Wed Nov 28 11:25:14 EST 2012
kill -USR1 14072
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 14072 killed at Wed Nov 28 11:25:14 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:25:14 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:25:14 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 14130 >/dev/null 2>/dev/null
selfserv with PID 14130 found at Wed Nov 28 11:25:14 EST 2012
selfserv with PID 14130 started at Wed Nov 28 11:25:14 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #8994: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 14130 at Wed Nov 28 11:25:14 EST 2012
kill -USR1 14130
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 14130 killed at Wed Nov 28 11:25:14 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:25:14 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:25:14 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 14188 >/dev/null 2>/dev/null
selfserv with PID 14188 found at Wed Nov 28 11:25:14 EST 2012
selfserv with PID 14188 started at Wed Nov 28 11:25:14 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #8995: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 14188 at Wed Nov 28 11:25:14 EST 2012
kill -USR1 14188
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 14188 killed at Wed Nov 28 11:25:14 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:25:14 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:25:14 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 14258 >/dev/null 2>/dev/null
selfserv with PID 14258 found at Wed Nov 28 11:25:14 EST 2012
selfserv with PID 14258 started at Wed Nov 28 11:25:14 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #8996: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 14258 at Wed Nov 28 11:25:15 EST 2012
kill -USR1 14258
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 14258 killed at Wed Nov 28 11:25:15 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:25:15 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:25:15 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 14316 >/dev/null 2>/dev/null
selfserv with PID 14316 found at Wed Nov 28 11:25:15 EST 2012
selfserv with PID 14316 started at Wed Nov 28 11:25:15 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8997: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 14316 at Wed Nov 28 11:25:15 EST 2012
kill -USR1 14316
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 14316 killed at Wed Nov 28 11:25:15 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:25:15 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:25:15 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 14374 >/dev/null 2>/dev/null
selfserv with PID 14374 found at Wed Nov 28 11:25:15 EST 2012
selfserv with PID 14374 started at Wed Nov 28 11:25:15 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #8998: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 14374 at Wed Nov 28 11:25:16 EST 2012
kill -USR1 14374
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 14374 killed at Wed Nov 28 11:25:16 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:25:16 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:25:16 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 14444 >/dev/null 2>/dev/null
selfserv with PID 14444 found at Wed Nov 28 11:25:16 EST 2012
selfserv with PID 14444 started at Wed Nov 28 11:25:16 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8999: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 14444 at Wed Nov 28 11:25:16 EST 2012
kill -USR1 14444
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 14444 killed at Wed Nov 28 11:25:16 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:25:16 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:25:16 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 14502 >/dev/null 2>/dev/null
selfserv with PID 14502 found at Wed Nov 28 11:25:16 EST 2012
selfserv with PID 14502 started at Wed Nov 28 11:25:16 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #9000: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 14502 at Wed Nov 28 11:25:16 EST 2012
kill -USR1 14502
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 14502 killed at Wed Nov 28 11:25:16 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:25:16 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:25:16 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 14560 >/dev/null 2>/dev/null
selfserv with PID 14560 found at Wed Nov 28 11:25:16 EST 2012
selfserv with PID 14560 started at Wed Nov 28 11:25:16 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #9001: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 14560 at Wed Nov 28 11:25:17 EST 2012
kill -USR1 14560
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 14560 killed at Wed Nov 28 11:25:17 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:25:17 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:25:17 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 14630 >/dev/null 2>/dev/null
selfserv with PID 14630 found at Wed Nov 28 11:25:17 EST 2012
selfserv with PID 14630 started at Wed Nov 28 11:25:17 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #9002: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 14630 at Wed Nov 28 11:25:17 EST 2012
kill -USR1 14630
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 14630 killed at Wed Nov 28 11:25:17 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:25:17 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:25:17 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 14688 >/dev/null 2>/dev/null
selfserv with PID 14688 found at Wed Nov 28 11:25:17 EST 2012
selfserv with PID 14688 started at Wed Nov 28 11:25:17 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #9003: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 14688 at Wed Nov 28 11:25:17 EST 2012
kill -USR1 14688
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 14688 killed at Wed Nov 28 11:25:17 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:25:17 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:25:17 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 14746 >/dev/null 2>/dev/null
selfserv with PID 14746 found at Wed Nov 28 11:25:17 EST 2012
selfserv with PID 14746 started at Wed Nov 28 11:25:17 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #9004: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 14746 at Wed Nov 28 11:25:18 EST 2012
kill -USR1 14746
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 14746 killed at Wed Nov 28 11:25:18 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:25:18 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:25:18 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 14816 >/dev/null 2>/dev/null
selfserv with PID 14816 found at Wed Nov 28 11:25:18 EST 2012
selfserv with PID 14816 started at Wed Nov 28 11:25:18 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #9005: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 14816 at Wed Nov 28 11:25:18 EST 2012
kill -USR1 14816
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 14816 killed at Wed Nov 28 11:25:18 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:25:18 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:25:18 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 14874 >/dev/null 2>/dev/null
selfserv with PID 14874 found at Wed Nov 28 11:25:18 EST 2012
selfserv with PID 14874 started at Wed Nov 28 11:25:18 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #9006: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 14874 at Wed Nov 28 11:25:18 EST 2012
kill -USR1 14874
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 14874 killed at Wed Nov 28 11:25:18 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed Nov 28 11:25:18 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:25:18 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 14932 >/dev/null 2>/dev/null
selfserv with PID 14932 found at Wed Nov 28 11:25:18 EST 2012
selfserv with PID 14932 started at Wed Nov 28 11:25:18 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #9007: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 14932 at Wed Nov 28 11:25:19 EST 2012
kill -USR1 14932
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 14932 killed at Wed Nov 28 11:25:19 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:25:19 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:25:19 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 15002 >/dev/null 2>/dev/null
selfserv with PID 15002 found at Wed Nov 28 11:25:19 EST 2012
selfserv with PID 15002 started at Wed Nov 28 11:25:19 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #9008: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 15002 at Wed Nov 28 11:25:19 EST 2012
kill -USR1 15002
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 15002 killed at Wed Nov 28 11:25:19 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:25:19 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:25:19 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 15060 >/dev/null 2>/dev/null
selfserv with PID 15060 found at Wed Nov 28 11:25:19 EST 2012
selfserv with PID 15060 started at Wed Nov 28 11:25:19 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #9009: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 15060 at Wed Nov 28 11:25:20 EST 2012
kill -USR1 15060
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 15060 killed at Wed Nov 28 11:25:20 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:25:20 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:25:20 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 15118 >/dev/null 2>/dev/null
selfserv with PID 15118 found at Wed Nov 28 11:25:20 EST 2012
selfserv with PID 15118 started at Wed Nov 28 11:25:20 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #9010: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 15118 at Wed Nov 28 11:25:20 EST 2012
kill -USR1 15118
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 15118 killed at Wed Nov 28 11:25:20 EST 2012
ssl.sh: Cache CRL SSL Client Tests   - with ECC ===============================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/authin.tl.tmp
0
selfserv starting at Wed Nov 28 11:25:20 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:25:20 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 15183 >/dev/null 2>/dev/null
selfserv with PID 15183 found at Wed Nov 28 11:25:20 EST 2012
selfserv with PID 15183 started at Wed Nov 28 11:25:20 EST 2012
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 15183 >/dev/null 2>/dev/null
selfserv with PID 15183 found at Wed Nov 28 11:25:20 EST 2012
ssl.sh: #9011: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15183 >/dev/null 2>/dev/null
selfserv with PID 15183 found at Wed Nov 28 11:25:20 EST 2012
ssl.sh: #9012: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 15183 >/dev/null 2>/dev/null
selfserv with PID 15183 found at Wed Nov 28 11:25:21 EST 2012
ssl.sh: #9013: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser43   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15183 >/dev/null 2>/dev/null
selfserv with PID 15183 found at Wed Nov 28 11:25:21 EST 2012
ssl.sh: #9014: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser44   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15183 >/dev/null 2>/dev/null
selfserv with PID 15183 found at Wed Nov 28 11:25:21 EST 2012
ssl.sh: #9015: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser45   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15183 >/dev/null 2>/dev/null
selfserv with PID 15183 found at Wed Nov 28 11:25:21 EST 2012
ssl.sh: #9016: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser46   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15183 >/dev/null 2>/dev/null
selfserv with PID 15183 found at Wed Nov 28 11:25:21 EST 2012
ssl.sh: #9017: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser47   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15183 >/dev/null 2>/dev/null
selfserv with PID 15183 found at Wed Nov 28 11:25:22 EST 2012
ssl.sh: #9018: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser48   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15183 >/dev/null 2>/dev/null
selfserv with PID 15183 found at Wed Nov 28 11:25:22 EST 2012
ssl.sh: #9019: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser49   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15183 >/dev/null 2>/dev/null
selfserv with PID 15183 found at Wed Nov 28 11:25:22 EST 2012
ssl.sh: #9020: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser50   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15183 >/dev/null 2>/dev/null
selfserv with PID 15183 found at Wed Nov 28 11:25:22 EST 2012
ssl.sh: #9021: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser51   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15183 >/dev/null 2>/dev/null
selfserv with PID 15183 found at Wed Nov 28 11:25:22 EST 2012
ssl.sh: #9022: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser52   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15183 >/dev/null 2>/dev/null
selfserv with PID 15183 found at Wed Nov 28 11:25:22 EST 2012
ssl.sh: #9023: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/server/root.crl_43-48

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 159 bytes
tstclnt: Writing 159 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15183 >/dev/null 2>/dev/null
selfserv with PID 15183 found at Wed Nov 28 11:25:23 EST 2012
================= CRL Reloaded =============
ssl.sh: #9024: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 15183 >/dev/null 2>/dev/null
selfserv with PID 15183 found at Wed Nov 28 11:25:23 EST 2012
ssl.sh: #9025: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15183 >/dev/null 2>/dev/null
selfserv with PID 15183 found at Wed Nov 28 11:25:23 EST 2012
ssl.sh: #9026: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 15183 >/dev/null 2>/dev/null
selfserv with PID 15183 found at Wed Nov 28 11:25:23 EST 2012
ssl.sh: #9027: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser43   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 15183 >/dev/null 2>/dev/null
selfserv with PID 15183 found at Wed Nov 28 11:25:23 EST 2012
ssl.sh: #9028: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser44   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 15183 >/dev/null 2>/dev/null
selfserv with PID 15183 found at Wed Nov 28 11:25:24 EST 2012
ssl.sh: #9029: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser45   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 15183 >/dev/null 2>/dev/null
selfserv with PID 15183 found at Wed Nov 28 11:25:24 EST 2012
ssl.sh: #9030: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser46   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15183 >/dev/null 2>/dev/null
selfserv with PID 15183 found at Wed Nov 28 11:25:24 EST 2012
ssl.sh: #9031: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser47   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 15183 >/dev/null 2>/dev/null
selfserv with PID 15183 found at Wed Nov 28 11:25:24 EST 2012
ssl.sh: #9032: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser48   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 15183 >/dev/null 2>/dev/null
selfserv with PID 15183 found at Wed Nov 28 11:25:24 EST 2012
ssl.sh: #9033: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser49   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15183 >/dev/null 2>/dev/null
selfserv with PID 15183 found at Wed Nov 28 11:25:24 EST 2012
ssl.sh: #9034: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser50   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15183 >/dev/null 2>/dev/null
selfserv with PID 15183 found at Wed Nov 28 11:25:25 EST 2012
ssl.sh: #9035: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser51   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15183 >/dev/null 2>/dev/null
selfserv with PID 15183 found at Wed Nov 28 11:25:25 EST 2012
ssl.sh: #9036: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser52   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15183 >/dev/null 2>/dev/null
selfserv with PID 15183 found at Wed Nov 28 11:25:25 EST 2012
ssl.sh: #9037: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/server/root.crl_49-52

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 159 bytes
tstclnt: Writing 159 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15183 >/dev/null 2>/dev/null
selfserv with PID 15183 found at Wed Nov 28 11:25:25 EST 2012
================= CRL Reloaded =============
ssl.sh: #9038: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 15183 >/dev/null 2>/dev/null
selfserv with PID 15183 found at Wed Nov 28 11:25:25 EST 2012
ssl.sh: #9039: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15183 >/dev/null 2>/dev/null
selfserv with PID 15183 found at Wed Nov 28 11:25:26 EST 2012
ssl.sh: #9040: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 15183 >/dev/null 2>/dev/null
selfserv with PID 15183 found at Wed Nov 28 11:25:26 EST 2012
ssl.sh: #9041: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser43   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 15183 >/dev/null 2>/dev/null
selfserv with PID 15183 found at Wed Nov 28 11:25:26 EST 2012
ssl.sh: #9042: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser44   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 15183 >/dev/null 2>/dev/null
selfserv with PID 15183 found at Wed Nov 28 11:25:26 EST 2012
ssl.sh: #9043: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser45   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 15183 >/dev/null 2>/dev/null
selfserv with PID 15183 found at Wed Nov 28 11:25:26 EST 2012
ssl.sh: #9044: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser46   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15183 >/dev/null 2>/dev/null
selfserv with PID 15183 found at Wed Nov 28 11:25:26 EST 2012
ssl.sh: #9045: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser47   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 15183 >/dev/null 2>/dev/null
selfserv with PID 15183 found at Wed Nov 28 11:25:27 EST 2012
ssl.sh: #9046: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser48   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 15183 >/dev/null 2>/dev/null
selfserv with PID 15183 found at Wed Nov 28 11:25:27 EST 2012
ssl.sh: #9047: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser49   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 15183 >/dev/null 2>/dev/null
selfserv with PID 15183 found at Wed Nov 28 11:25:27 EST 2012
ssl.sh: #9048: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser50   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 15183 >/dev/null 2>/dev/null
selfserv with PID 15183 found at Wed Nov 28 11:25:27 EST 2012
ssl.sh: #9049: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser51   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15183 >/dev/null 2>/dev/null
selfserv with PID 15183 found at Wed Nov 28 11:25:27 EST 2012
ssl.sh: #9050: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser52   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 15183 >/dev/null 2>/dev/null
selfserv with PID 15183 found at Wed Nov 28 11:25:28 EST 2012
ssl.sh: #9051: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 15183 at Wed Nov 28 11:25:28 EST 2012
kill -USR1 15183
selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 15183 killed at Wed Nov 28 11:25:28 EST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Wed Nov 28 11:25:28 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:25:28 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 16645 >/dev/null 2>/dev/null
selfserv with PID 16645 found at Wed Nov 28 11:25:28 EST 2012
selfserv with PID 16645 started at Wed Nov 28 11:25:28 EST 2012
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 16645 >/dev/null 2>/dev/null
selfserv with PID 16645 found at Wed Nov 28 11:25:28 EST 2012
ssl.sh: #9052: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16645 >/dev/null 2>/dev/null
selfserv with PID 16645 found at Wed Nov 28 11:25:28 EST 2012
ssl.sh: #9053: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 16645 >/dev/null 2>/dev/null
selfserv with PID 16645 found at Wed Nov 28 11:25:28 EST 2012
ssl.sh: #9054: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser43 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16645 >/dev/null 2>/dev/null
selfserv with PID 16645 found at Wed Nov 28 11:25:28 EST 2012
ssl.sh: #9055: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser44 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16645 >/dev/null 2>/dev/null
selfserv with PID 16645 found at Wed Nov 28 11:25:29 EST 2012
ssl.sh: #9056: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser45 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16645 >/dev/null 2>/dev/null
selfserv with PID 16645 found at Wed Nov 28 11:25:29 EST 2012
ssl.sh: #9057: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser46 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16645 >/dev/null 2>/dev/null
selfserv with PID 16645 found at Wed Nov 28 11:25:29 EST 2012
ssl.sh: #9058: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser47 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16645 >/dev/null 2>/dev/null
selfserv with PID 16645 found at Wed Nov 28 11:25:29 EST 2012
ssl.sh: #9059: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser48 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16645 >/dev/null 2>/dev/null
selfserv with PID 16645 found at Wed Nov 28 11:25:29 EST 2012
ssl.sh: #9060: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser49 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16645 >/dev/null 2>/dev/null
selfserv with PID 16645 found at Wed Nov 28 11:25:30 EST 2012
ssl.sh: #9061: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser50 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16645 >/dev/null 2>/dev/null
selfserv with PID 16645 found at Wed Nov 28 11:25:30 EST 2012
ssl.sh: #9062: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser51 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16645 >/dev/null 2>/dev/null
selfserv with PID 16645 found at Wed Nov 28 11:25:30 EST 2012
ssl.sh: #9063: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser52 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16645 >/dev/null 2>/dev/null
selfserv with PID 16645 found at Wed Nov 28 11:25:30 EST 2012
ssl.sh: #9064: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/server/root.crl_43-48

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 159 bytes
tstclnt: Writing 159 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16645 >/dev/null 2>/dev/null
selfserv with PID 16645 found at Wed Nov 28 11:25:30 EST 2012
================= CRL Reloaded =============
ssl.sh: #9065: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 16645 >/dev/null 2>/dev/null
selfserv with PID 16645 found at Wed Nov 28 11:25:30 EST 2012
ssl.sh: #9066: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16645 >/dev/null 2>/dev/null
selfserv with PID 16645 found at Wed Nov 28 11:25:31 EST 2012
ssl.sh: #9067: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 16645 >/dev/null 2>/dev/null
selfserv with PID 16645 found at Wed Nov 28 11:25:31 EST 2012
ssl.sh: #9068: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser43 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 16645 >/dev/null 2>/dev/null
selfserv with PID 16645 found at Wed Nov 28 11:25:31 EST 2012
ssl.sh: #9069: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser44 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 16645 >/dev/null 2>/dev/null
selfserv with PID 16645 found at Wed Nov 28 11:25:31 EST 2012
ssl.sh: #9070: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser45 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 16645 >/dev/null 2>/dev/null
selfserv with PID 16645 found at Wed Nov 28 11:25:31 EST 2012
ssl.sh: #9071: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser46 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16645 >/dev/null 2>/dev/null
selfserv with PID 16645 found at Wed Nov 28 11:25:32 EST 2012
ssl.sh: #9072: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser47 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 16645 >/dev/null 2>/dev/null
selfserv with PID 16645 found at Wed Nov 28 11:25:32 EST 2012
ssl.sh: #9073: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser48 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 16645 >/dev/null 2>/dev/null
selfserv with PID 16645 found at Wed Nov 28 11:25:32 EST 2012
ssl.sh: #9074: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser49 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16645 >/dev/null 2>/dev/null
selfserv with PID 16645 found at Wed Nov 28 11:25:32 EST 2012
ssl.sh: #9075: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser50 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16645 >/dev/null 2>/dev/null
selfserv with PID 16645 found at Wed Nov 28 11:25:32 EST 2012
ssl.sh: #9076: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser51 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16645 >/dev/null 2>/dev/null
selfserv with PID 16645 found at Wed Nov 28 11:25:32 EST 2012
ssl.sh: #9077: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser52 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16645 >/dev/null 2>/dev/null
selfserv with PID 16645 found at Wed Nov 28 11:25:33 EST 2012
ssl.sh: #9078: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/server/root.crl_49-52

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 159 bytes
tstclnt: Writing 159 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16645 >/dev/null 2>/dev/null
selfserv with PID 16645 found at Wed Nov 28 11:25:33 EST 2012
================= CRL Reloaded =============
ssl.sh: #9079: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 16645 >/dev/null 2>/dev/null
selfserv with PID 16645 found at Wed Nov 28 11:25:33 EST 2012
ssl.sh: #9080: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16645 >/dev/null 2>/dev/null
selfserv with PID 16645 found at Wed Nov 28 11:25:33 EST 2012
ssl.sh: #9081: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 16645 >/dev/null 2>/dev/null
selfserv with PID 16645 found at Wed Nov 28 11:25:33 EST 2012
ssl.sh: #9082: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser43 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 16645 >/dev/null 2>/dev/null
selfserv with PID 16645 found at Wed Nov 28 11:25:34 EST 2012
ssl.sh: #9083: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser44 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 16645 >/dev/null 2>/dev/null
selfserv with PID 16645 found at Wed Nov 28 11:25:34 EST 2012
ssl.sh: #9084: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser45 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 16645 >/dev/null 2>/dev/null
selfserv with PID 16645 found at Wed Nov 28 11:25:34 EST 2012
ssl.sh: #9085: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser46 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16645 >/dev/null 2>/dev/null
selfserv with PID 16645 found at Wed Nov 28 11:25:34 EST 2012
ssl.sh: #9086: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser47 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 16645 >/dev/null 2>/dev/null
selfserv with PID 16645 found at Wed Nov 28 11:25:34 EST 2012
ssl.sh: #9087: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser48 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 16645 >/dev/null 2>/dev/null
selfserv with PID 16645 found at Wed Nov 28 11:25:34 EST 2012
ssl.sh: #9088: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser49 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 16645 >/dev/null 2>/dev/null
selfserv with PID 16645 found at Wed Nov 28 11:25:35 EST 2012
ssl.sh: #9089: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser50 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 16645 >/dev/null 2>/dev/null
selfserv with PID 16645 found at Wed Nov 28 11:25:35 EST 2012
ssl.sh: #9090: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser51 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16645 >/dev/null 2>/dev/null
selfserv with PID 16645 found at Wed Nov 28 11:25:35 EST 2012
ssl.sh: #9091: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser52 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 16645 >/dev/null 2>/dev/null
selfserv with PID 16645 found at Wed Nov 28 11:25:35 EST 2012
ssl.sh: #9092: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 16645 at Wed Nov 28 11:25:35 EST 2012
kill -USR1 16645
selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 16645 killed at Wed Nov 28 11:25:35 EST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Wed Nov 28 11:25:35 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:25:35 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 18108 >/dev/null 2>/dev/null
selfserv with PID 18108 found at Wed Nov 28 11:25:35 EST 2012
selfserv with PID 18108 started at Wed Nov 28 11:25:35 EST 2012
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 18108 >/dev/null 2>/dev/null
selfserv with PID 18108 found at Wed Nov 28 11:25:36 EST 2012
ssl.sh: #9093: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18108 >/dev/null 2>/dev/null
selfserv with PID 18108 found at Wed Nov 28 11:25:36 EST 2012
ssl.sh: #9094: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 18108 >/dev/null 2>/dev/null
selfserv with PID 18108 found at Wed Nov 28 11:25:36 EST 2012
ssl.sh: #9095: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser43-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18108 >/dev/null 2>/dev/null
selfserv with PID 18108 found at Wed Nov 28 11:25:36 EST 2012
ssl.sh: #9096: TLS Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser44-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18108 >/dev/null 2>/dev/null
selfserv with PID 18108 found at Wed Nov 28 11:25:36 EST 2012
ssl.sh: #9097: TLS Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser45-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18108 >/dev/null 2>/dev/null
selfserv with PID 18108 found at Wed Nov 28 11:25:37 EST 2012
ssl.sh: #9098: TLS Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser46-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18108 >/dev/null 2>/dev/null
selfserv with PID 18108 found at Wed Nov 28 11:25:37 EST 2012
ssl.sh: #9099: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser47-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18108 >/dev/null 2>/dev/null
selfserv with PID 18108 found at Wed Nov 28 11:25:37 EST 2012
ssl.sh: #9100: TLS Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser48-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18108 >/dev/null 2>/dev/null
selfserv with PID 18108 found at Wed Nov 28 11:25:37 EST 2012
ssl.sh: #9101: TLS Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser49-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18108 >/dev/null 2>/dev/null
selfserv with PID 18108 found at Wed Nov 28 11:25:37 EST 2012
ssl.sh: #9102: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser50-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18108 >/dev/null 2>/dev/null
selfserv with PID 18108 found at Wed Nov 28 11:25:38 EST 2012
ssl.sh: #9103: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser51-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18108 >/dev/null 2>/dev/null
selfserv with PID 18108 found at Wed Nov 28 11:25:38 EST 2012
ssl.sh: #9104: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser52-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18108 >/dev/null 2>/dev/null
selfserv with PID 18108 found at Wed Nov 28 11:25:38 EST 2012
ssl.sh: #9105: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/server/root.crl_43-48-ec

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 162 bytes
tstclnt: Writing 162 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18108 >/dev/null 2>/dev/null
selfserv with PID 18108 found at Wed Nov 28 11:25:38 EST 2012
================= CRL Reloaded =============
ssl.sh: #9106: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 18108 >/dev/null 2>/dev/null
selfserv with PID 18108 found at Wed Nov 28 11:25:38 EST 2012
ssl.sh: #9107: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18108 >/dev/null 2>/dev/null
selfserv with PID 18108 found at Wed Nov 28 11:25:39 EST 2012
ssl.sh: #9108: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 18108 >/dev/null 2>/dev/null
selfserv with PID 18108 found at Wed Nov 28 11:25:39 EST 2012
ssl.sh: #9109: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser43-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 18108 >/dev/null 2>/dev/null
selfserv with PID 18108 found at Wed Nov 28 11:25:39 EST 2012
ssl.sh: #9110: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser44-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 18108 >/dev/null 2>/dev/null
selfserv with PID 18108 found at Wed Nov 28 11:25:39 EST 2012
ssl.sh: #9111: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser45-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 18108 >/dev/null 2>/dev/null
selfserv with PID 18108 found at Wed Nov 28 11:25:39 EST 2012
ssl.sh: #9112: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser46-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18108 >/dev/null 2>/dev/null
selfserv with PID 18108 found at Wed Nov 28 11:25:40 EST 2012
ssl.sh: #9113: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser47-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 18108 >/dev/null 2>/dev/null
selfserv with PID 18108 found at Wed Nov 28 11:25:40 EST 2012
ssl.sh: #9114: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser48-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 18108 >/dev/null 2>/dev/null
selfserv with PID 18108 found at Wed Nov 28 11:25:40 EST 2012
ssl.sh: #9115: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser49-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18108 >/dev/null 2>/dev/null
selfserv with PID 18108 found at Wed Nov 28 11:25:40 EST 2012
ssl.sh: #9116: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser50-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18108 >/dev/null 2>/dev/null
selfserv with PID 18108 found at Wed Nov 28 11:25:41 EST 2012
ssl.sh: #9117: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser51-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18108 >/dev/null 2>/dev/null
selfserv with PID 18108 found at Wed Nov 28 11:25:41 EST 2012
ssl.sh: #9118: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser52-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18108 >/dev/null 2>/dev/null
selfserv with PID 18108 found at Wed Nov 28 11:25:41 EST 2012
ssl.sh: #9119: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/server/root.crl_49-52-ec

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 162 bytes
tstclnt: Writing 162 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18108 >/dev/null 2>/dev/null
selfserv with PID 18108 found at Wed Nov 28 11:25:41 EST 2012
================= CRL Reloaded =============
ssl.sh: #9120: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 18108 >/dev/null 2>/dev/null
selfserv with PID 18108 found at Wed Nov 28 11:25:41 EST 2012
ssl.sh: #9121: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18108 >/dev/null 2>/dev/null
selfserv with PID 18108 found at Wed Nov 28 11:25:42 EST 2012
ssl.sh: #9122: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 18108 >/dev/null 2>/dev/null
selfserv with PID 18108 found at Wed Nov 28 11:25:42 EST 2012
ssl.sh: #9123: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser43-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 18108 >/dev/null 2>/dev/null
selfserv with PID 18108 found at Wed Nov 28 11:25:42 EST 2012
ssl.sh: #9124: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser44-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 18108 >/dev/null 2>/dev/null
selfserv with PID 18108 found at Wed Nov 28 11:25:42 EST 2012
ssl.sh: #9125: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser45-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 18108 >/dev/null 2>/dev/null
selfserv with PID 18108 found at Wed Nov 28 11:25:42 EST 2012
ssl.sh: #9126: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser46-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18108 >/dev/null 2>/dev/null
selfserv with PID 18108 found at Wed Nov 28 11:25:43 EST 2012
ssl.sh: #9127: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser47-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 18108 >/dev/null 2>/dev/null
selfserv with PID 18108 found at Wed Nov 28 11:25:43 EST 2012
ssl.sh: #9128: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser48-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 18108 >/dev/null 2>/dev/null
selfserv with PID 18108 found at Wed Nov 28 11:25:43 EST 2012
ssl.sh: #9129: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser49-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 18108 >/dev/null 2>/dev/null
selfserv with PID 18108 found at Wed Nov 28 11:25:43 EST 2012
ssl.sh: #9130: TLS Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser50-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 18108 >/dev/null 2>/dev/null
selfserv with PID 18108 found at Wed Nov 28 11:25:43 EST 2012
ssl.sh: #9131: TLS Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser51-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18108 >/dev/null 2>/dev/null
selfserv with PID 18108 found at Wed Nov 28 11:25:44 EST 2012
ssl.sh: #9132: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser52-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 18108 >/dev/null 2>/dev/null
selfserv with PID 18108 found at Wed Nov 28 11:25:44 EST 2012
ssl.sh: #9133: TLS Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 18108 at Wed Nov 28 11:25:44 EST 2012
kill -USR1 18108
selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 18108 killed at Wed Nov 28 11:25:44 EST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:25:44 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:25:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 19572 >/dev/null 2>/dev/null
selfserv with PID 19572 found at Wed Nov 28 11:25:44 EST 2012
selfserv with PID 19572 started at Wed Nov 28 11:25:44 EST 2012
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 19572 >/dev/null 2>/dev/null
selfserv with PID 19572 found at Wed Nov 28 11:25:44 EST 2012
ssl.sh: #9134: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19572 >/dev/null 2>/dev/null
selfserv with PID 19572 found at Wed Nov 28 11:25:44 EST 2012
ssl.sh: #9135: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 19572 >/dev/null 2>/dev/null
selfserv with PID 19572 found at Wed Nov 28 11:25:45 EST 2012
ssl.sh: #9136: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser43-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19572 >/dev/null 2>/dev/null
selfserv with PID 19572 found at Wed Nov 28 11:25:45 EST 2012
ssl.sh: #9137: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser44-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19572 >/dev/null 2>/dev/null
selfserv with PID 19572 found at Wed Nov 28 11:25:45 EST 2012
ssl.sh: #9138: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser45-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19572 >/dev/null 2>/dev/null
selfserv with PID 19572 found at Wed Nov 28 11:25:45 EST 2012
ssl.sh: #9139: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser46-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19572 >/dev/null 2>/dev/null
selfserv with PID 19572 found at Wed Nov 28 11:25:45 EST 2012
ssl.sh: #9140: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser47-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19572 >/dev/null 2>/dev/null
selfserv with PID 19572 found at Wed Nov 28 11:25:46 EST 2012
ssl.sh: #9141: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser48-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19572 >/dev/null 2>/dev/null
selfserv with PID 19572 found at Wed Nov 28 11:25:46 EST 2012
ssl.sh: #9142: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser49-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19572 >/dev/null 2>/dev/null
selfserv with PID 19572 found at Wed Nov 28 11:25:46 EST 2012
ssl.sh: #9143: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser50-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19572 >/dev/null 2>/dev/null
selfserv with PID 19572 found at Wed Nov 28 11:25:46 EST 2012
ssl.sh: #9144: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser51-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19572 >/dev/null 2>/dev/null
selfserv with PID 19572 found at Wed Nov 28 11:25:47 EST 2012
ssl.sh: #9145: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser52-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19572 >/dev/null 2>/dev/null
selfserv with PID 19572 found at Wed Nov 28 11:25:47 EST 2012
ssl.sh: #9146: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/server/root.crl_43-48-ec

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 162 bytes
tstclnt: Writing 162 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19572 >/dev/null 2>/dev/null
selfserv with PID 19572 found at Wed Nov 28 11:25:47 EST 2012
================= CRL Reloaded =============
ssl.sh: #9147: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 19572 >/dev/null 2>/dev/null
selfserv with PID 19572 found at Wed Nov 28 11:25:47 EST 2012
ssl.sh: #9148: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19572 >/dev/null 2>/dev/null
selfserv with PID 19572 found at Wed Nov 28 11:25:47 EST 2012
ssl.sh: #9149: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 19572 >/dev/null 2>/dev/null
selfserv with PID 19572 found at Wed Nov 28 11:25:48 EST 2012
ssl.sh: #9150: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser43-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 19572 >/dev/null 2>/dev/null
selfserv with PID 19572 found at Wed Nov 28 11:25:48 EST 2012
ssl.sh: #9151: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser44-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 19572 >/dev/null 2>/dev/null
selfserv with PID 19572 found at Wed Nov 28 11:25:48 EST 2012
ssl.sh: #9152: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser45-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 19572 >/dev/null 2>/dev/null
selfserv with PID 19572 found at Wed Nov 28 11:25:48 EST 2012
ssl.sh: #9153: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser46-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19572 >/dev/null 2>/dev/null
selfserv with PID 19572 found at Wed Nov 28 11:25:48 EST 2012
ssl.sh: #9154: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser47-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 19572 >/dev/null 2>/dev/null
selfserv with PID 19572 found at Wed Nov 28 11:25:49 EST 2012
ssl.sh: #9155: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser48-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 19572 >/dev/null 2>/dev/null
selfserv with PID 19572 found at Wed Nov 28 11:25:49 EST 2012
ssl.sh: #9156: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser49-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19572 >/dev/null 2>/dev/null
selfserv with PID 19572 found at Wed Nov 28 11:25:49 EST 2012
ssl.sh: #9157: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser50-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19572 >/dev/null 2>/dev/null
selfserv with PID 19572 found at Wed Nov 28 11:25:49 EST 2012
ssl.sh: #9158: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser51-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19572 >/dev/null 2>/dev/null
selfserv with PID 19572 found at Wed Nov 28 11:25:49 EST 2012
ssl.sh: #9159: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser52-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19572 >/dev/null 2>/dev/null
selfserv with PID 19572 found at Wed Nov 28 11:25:50 EST 2012
ssl.sh: #9160: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/server/root.crl_49-52-ec

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 162 bytes
tstclnt: Writing 162 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19572 >/dev/null 2>/dev/null
selfserv with PID 19572 found at Wed Nov 28 11:25:50 EST 2012
================= CRL Reloaded =============
ssl.sh: #9161: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 19572 >/dev/null 2>/dev/null
selfserv with PID 19572 found at Wed Nov 28 11:25:50 EST 2012
ssl.sh: #9162: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19572 >/dev/null 2>/dev/null
selfserv with PID 19572 found at Wed Nov 28 11:25:50 EST 2012
ssl.sh: #9163: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 19572 >/dev/null 2>/dev/null
selfserv with PID 19572 found at Wed Nov 28 11:25:50 EST 2012
ssl.sh: #9164: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser43-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 19572 >/dev/null 2>/dev/null
selfserv with PID 19572 found at Wed Nov 28 11:25:51 EST 2012
ssl.sh: #9165: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser44-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 19572 >/dev/null 2>/dev/null
selfserv with PID 19572 found at Wed Nov 28 11:25:51 EST 2012
ssl.sh: #9166: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser45-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 19572 >/dev/null 2>/dev/null
selfserv with PID 19572 found at Wed Nov 28 11:25:51 EST 2012
ssl.sh: #9167: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser46-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19572 >/dev/null 2>/dev/null
selfserv with PID 19572 found at Wed Nov 28 11:25:51 EST 2012
ssl.sh: #9168: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser47-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 19572 >/dev/null 2>/dev/null
selfserv with PID 19572 found at Wed Nov 28 11:25:52 EST 2012
ssl.sh: #9169: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser48-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 19572 >/dev/null 2>/dev/null
selfserv with PID 19572 found at Wed Nov 28 11:25:52 EST 2012
ssl.sh: #9170: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser49-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 19572 >/dev/null 2>/dev/null
selfserv with PID 19572 found at Wed Nov 28 11:25:52 EST 2012
ssl.sh: #9171: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser50-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 19572 >/dev/null 2>/dev/null
selfserv with PID 19572 found at Wed Nov 28 11:25:52 EST 2012
ssl.sh: #9172: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser51-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19572 >/dev/null 2>/dev/null
selfserv with PID 19572 found at Wed Nov 28 11:25:52 EST 2012
ssl.sh: #9173: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser52-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 19572 >/dev/null 2>/dev/null
selfserv with PID 19572 found at Wed Nov 28 11:25:53 EST 2012
ssl.sh: #9174: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 19572 at Wed Nov 28 11:25:53 EST 2012
kill -USR1 19572
selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 19572 killed at Wed Nov 28 11:25:53 EST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:25:53 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:25:53 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 21037 >/dev/null 2>/dev/null
selfserv with PID 21037 found at Wed Nov 28 11:25:53 EST 2012
selfserv with PID 21037 started at Wed Nov 28 11:25:53 EST 2012
trying to kill selfserv with PID 21037 at Wed Nov 28 11:25:53 EST 2012
kill -USR1 21037
./ssl.sh: line 173: 21037 User defined signal 1   ${PROFTOOL} ${BINDIR}/selfserv -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 21037 killed at Wed Nov 28 11:25:53 EST 2012
selfserv starting at Wed Nov 28 11:25:53 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:25:53 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 21071 >/dev/null 2>/dev/null
selfserv with PID 21071 found at Wed Nov 28 11:25:53 EST 2012
selfserv with PID 21071 started at Wed Nov 28 11:25:53 EST 2012
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21071 >/dev/null 2>/dev/null
selfserv with PID 21071 found at Wed Nov 28 11:25:53 EST 2012
ssl.sh: #9175: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21071 >/dev/null 2>/dev/null
selfserv with PID 21071 found at Wed Nov 28 11:25:53 EST 2012
ssl.sh: #9176: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21071 >/dev/null 2>/dev/null
selfserv with PID 21071 found at Wed Nov 28 11:25:53 EST 2012
ssl.sh: #9177: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21071 >/dev/null 2>/dev/null
selfserv with PID 21071 found at Wed Nov 28 11:25:54 EST 2012
ssl.sh: #9178: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21071 >/dev/null 2>/dev/null
selfserv with PID 21071 found at Wed Nov 28 11:25:54 EST 2012
ssl.sh: #9179: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21071 >/dev/null 2>/dev/null
selfserv with PID 21071 found at Wed Nov 28 11:25:54 EST 2012
ssl.sh: #9180: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21071 >/dev/null 2>/dev/null
selfserv with PID 21071 found at Wed Nov 28 11:25:54 EST 2012
ssl.sh: #9181: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21071 >/dev/null 2>/dev/null
selfserv with PID 21071 found at Wed Nov 28 11:25:54 EST 2012
ssl.sh: #9182: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21071 >/dev/null 2>/dev/null
selfserv with PID 21071 found at Wed Nov 28 11:25:55 EST 2012
ssl.sh: #9183: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21071 >/dev/null 2>/dev/null
selfserv with PID 21071 found at Wed Nov 28 11:25:55 EST 2012
ssl.sh: #9184: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21071 >/dev/null 2>/dev/null
selfserv with PID 21071 found at Wed Nov 28 11:25:55 EST 2012
ssl.sh: #9185: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21071 >/dev/null 2>/dev/null
selfserv with PID 21071 found at Wed Nov 28 11:25:55 EST 2012
ssl.sh: #9186: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21071 >/dev/null 2>/dev/null
selfserv with PID 21071 found at Wed Nov 28 11:25:55 EST 2012
ssl.sh: #9187: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/server/root.crl_43-48

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 159 bytes
tstclnt: Writing 159 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21071 >/dev/null 2>/dev/null
selfserv with PID 21071 found at Wed Nov 28 11:25:55 EST 2012
================= CRL Reloaded =============
ssl.sh: #9188: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21071 >/dev/null 2>/dev/null
selfserv with PID 21071 found at Wed Nov 28 11:25:56 EST 2012
ssl.sh: #9189: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21071 >/dev/null 2>/dev/null
selfserv with PID 21071 found at Wed Nov 28 11:25:56 EST 2012
ssl.sh: #9190: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21071 >/dev/null 2>/dev/null
selfserv with PID 21071 found at Wed Nov 28 11:25:56 EST 2012
ssl.sh: #9191: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21071 >/dev/null 2>/dev/null
selfserv with PID 21071 found at Wed Nov 28 11:25:56 EST 2012
ssl.sh: #9192: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21071 >/dev/null 2>/dev/null
selfserv with PID 21071 found at Wed Nov 28 11:25:56 EST 2012
ssl.sh: #9193: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21071 >/dev/null 2>/dev/null
selfserv with PID 21071 found at Wed Nov 28 11:25:57 EST 2012
ssl.sh: #9194: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21071 >/dev/null 2>/dev/null
selfserv with PID 21071 found at Wed Nov 28 11:25:57 EST 2012
ssl.sh: #9195: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21071 >/dev/null 2>/dev/null
selfserv with PID 21071 found at Wed Nov 28 11:25:57 EST 2012
ssl.sh: #9196: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21071 >/dev/null 2>/dev/null
selfserv with PID 21071 found at Wed Nov 28 11:25:57 EST 2012
ssl.sh: #9197: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21071 >/dev/null 2>/dev/null
selfserv with PID 21071 found at Wed Nov 28 11:25:57 EST 2012
ssl.sh: #9198: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21071 >/dev/null 2>/dev/null
selfserv with PID 21071 found at Wed Nov 28 11:25:58 EST 2012
ssl.sh: #9199: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21071 >/dev/null 2>/dev/null
selfserv with PID 21071 found at Wed Nov 28 11:25:58 EST 2012
ssl.sh: #9200: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21071 >/dev/null 2>/dev/null
selfserv with PID 21071 found at Wed Nov 28 11:25:58 EST 2012
ssl.sh: #9201: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/server/root.crl_49-52

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 159 bytes
tstclnt: Writing 159 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21071 >/dev/null 2>/dev/null
selfserv with PID 21071 found at Wed Nov 28 11:25:58 EST 2012
================= CRL Reloaded =============
ssl.sh: #9202: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21071 >/dev/null 2>/dev/null
selfserv with PID 21071 found at Wed Nov 28 11:25:58 EST 2012
ssl.sh: #9203: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21071 >/dev/null 2>/dev/null
selfserv with PID 21071 found at Wed Nov 28 11:25:59 EST 2012
ssl.sh: #9204: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21071 >/dev/null 2>/dev/null
selfserv with PID 21071 found at Wed Nov 28 11:25:59 EST 2012
ssl.sh: #9205: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21071 >/dev/null 2>/dev/null
selfserv with PID 21071 found at Wed Nov 28 11:25:59 EST 2012
ssl.sh: #9206: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21071 >/dev/null 2>/dev/null
selfserv with PID 21071 found at Wed Nov 28 11:25:59 EST 2012
ssl.sh: #9207: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21071 >/dev/null 2>/dev/null
selfserv with PID 21071 found at Wed Nov 28 11:25:59 EST 2012
ssl.sh: #9208: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21071 >/dev/null 2>/dev/null
selfserv with PID 21071 found at Wed Nov 28 11:26:00 EST 2012
ssl.sh: #9209: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21071 >/dev/null 2>/dev/null
selfserv with PID 21071 found at Wed Nov 28 11:26:00 EST 2012
ssl.sh: #9210: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21071 >/dev/null 2>/dev/null
selfserv with PID 21071 found at Wed Nov 28 11:26:00 EST 2012
ssl.sh: #9211: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21071 >/dev/null 2>/dev/null
selfserv with PID 21071 found at Wed Nov 28 11:26:00 EST 2012
ssl.sh: #9212: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21071 >/dev/null 2>/dev/null
selfserv with PID 21071 found at Wed Nov 28 11:26:00 EST 2012
ssl.sh: #9213: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21071 >/dev/null 2>/dev/null
selfserv with PID 21071 found at Wed Nov 28 11:26:00 EST 2012
ssl.sh: #9214: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21071 >/dev/null 2>/dev/null
selfserv with PID 21071 found at Wed Nov 28 11:26:01 EST 2012
ssl.sh: #9215: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 21071 at Wed Nov 28 11:26:01 EST 2012
kill -USR1 21071
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 21071 killed at Wed Nov 28 11:26:01 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:26:01 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:26:01 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 22534 >/dev/null 2>/dev/null
selfserv with PID 22534 found at Wed Nov 28 11:26:01 EST 2012
selfserv with PID 22534 started at Wed Nov 28 11:26:01 EST 2012
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22534 >/dev/null 2>/dev/null
selfserv with PID 22534 found at Wed Nov 28 11:26:01 EST 2012
ssl.sh: #9216: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22534 >/dev/null 2>/dev/null
selfserv with PID 22534 found at Wed Nov 28 11:26:01 EST 2012
ssl.sh: #9217: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22534 >/dev/null 2>/dev/null
selfserv with PID 22534 found at Wed Nov 28 11:26:01 EST 2012
ssl.sh: #9218: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22534 >/dev/null 2>/dev/null
selfserv with PID 22534 found at Wed Nov 28 11:26:02 EST 2012
ssl.sh: #9219: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22534 >/dev/null 2>/dev/null
selfserv with PID 22534 found at Wed Nov 28 11:26:02 EST 2012
ssl.sh: #9220: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22534 >/dev/null 2>/dev/null
selfserv with PID 22534 found at Wed Nov 28 11:26:02 EST 2012
ssl.sh: #9221: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22534 >/dev/null 2>/dev/null
selfserv with PID 22534 found at Wed Nov 28 11:26:02 EST 2012
ssl.sh: #9222: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22534 >/dev/null 2>/dev/null
selfserv with PID 22534 found at Wed Nov 28 11:26:02 EST 2012
ssl.sh: #9223: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22534 >/dev/null 2>/dev/null
selfserv with PID 22534 found at Wed Nov 28 11:26:03 EST 2012
ssl.sh: #9224: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22534 >/dev/null 2>/dev/null
selfserv with PID 22534 found at Wed Nov 28 11:26:03 EST 2012
ssl.sh: #9225: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22534 >/dev/null 2>/dev/null
selfserv with PID 22534 found at Wed Nov 28 11:26:03 EST 2012
ssl.sh: #9226: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22534 >/dev/null 2>/dev/null
selfserv with PID 22534 found at Wed Nov 28 11:26:03 EST 2012
ssl.sh: #9227: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22534 >/dev/null 2>/dev/null
selfserv with PID 22534 found at Wed Nov 28 11:26:03 EST 2012
ssl.sh: #9228: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/server/root.crl_43-48

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 159 bytes
tstclnt: Writing 159 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22534 >/dev/null 2>/dev/null
selfserv with PID 22534 found at Wed Nov 28 11:26:04 EST 2012
================= CRL Reloaded =============
ssl.sh: #9229: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22534 >/dev/null 2>/dev/null
selfserv with PID 22534 found at Wed Nov 28 11:26:04 EST 2012
ssl.sh: #9230: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22534 >/dev/null 2>/dev/null
selfserv with PID 22534 found at Wed Nov 28 11:26:04 EST 2012
ssl.sh: #9231: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22534 >/dev/null 2>/dev/null
selfserv with PID 22534 found at Wed Nov 28 11:26:04 EST 2012
ssl.sh: #9232: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22534 >/dev/null 2>/dev/null
selfserv with PID 22534 found at Wed Nov 28 11:26:04 EST 2012
ssl.sh: #9233: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22534 >/dev/null 2>/dev/null
selfserv with PID 22534 found at Wed Nov 28 11:26:04 EST 2012
ssl.sh: #9234: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22534 >/dev/null 2>/dev/null
selfserv with PID 22534 found at Wed Nov 28 11:26:05 EST 2012
ssl.sh: #9235: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22534 >/dev/null 2>/dev/null
selfserv with PID 22534 found at Wed Nov 28 11:26:05 EST 2012
ssl.sh: #9236: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22534 >/dev/null 2>/dev/null
selfserv with PID 22534 found at Wed Nov 28 11:26:05 EST 2012
ssl.sh: #9237: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22534 >/dev/null 2>/dev/null
selfserv with PID 22534 found at Wed Nov 28 11:26:05 EST 2012
ssl.sh: #9238: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22534 >/dev/null 2>/dev/null
selfserv with PID 22534 found at Wed Nov 28 11:26:05 EST 2012
ssl.sh: #9239: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22534 >/dev/null 2>/dev/null
selfserv with PID 22534 found at Wed Nov 28 11:26:06 EST 2012
ssl.sh: #9240: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22534 >/dev/null 2>/dev/null
selfserv with PID 22534 found at Wed Nov 28 11:26:06 EST 2012
ssl.sh: #9241: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22534 >/dev/null 2>/dev/null
selfserv with PID 22534 found at Wed Nov 28 11:26:06 EST 2012
ssl.sh: #9242: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/server/root.crl_49-52

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 159 bytes
tstclnt: Writing 159 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22534 >/dev/null 2>/dev/null
selfserv with PID 22534 found at Wed Nov 28 11:26:06 EST 2012
================= CRL Reloaded =============
ssl.sh: #9243: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22534 >/dev/null 2>/dev/null
selfserv with PID 22534 found at Wed Nov 28 11:26:06 EST 2012
ssl.sh: #9244: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22534 >/dev/null 2>/dev/null
selfserv with PID 22534 found at Wed Nov 28 11:26:06 EST 2012
ssl.sh: #9245: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22534 >/dev/null 2>/dev/null
selfserv with PID 22534 found at Wed Nov 28 11:26:07 EST 2012
ssl.sh: #9246: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22534 >/dev/null 2>/dev/null
selfserv with PID 22534 found at Wed Nov 28 11:26:07 EST 2012
ssl.sh: #9247: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22534 >/dev/null 2>/dev/null
selfserv with PID 22534 found at Wed Nov 28 11:26:07 EST 2012
ssl.sh: #9248: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22534 >/dev/null 2>/dev/null
selfserv with PID 22534 found at Wed Nov 28 11:26:07 EST 2012
ssl.sh: #9249: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22534 >/dev/null 2>/dev/null
selfserv with PID 22534 found at Wed Nov 28 11:26:07 EST 2012
ssl.sh: #9250: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22534 >/dev/null 2>/dev/null
selfserv with PID 22534 found at Wed Nov 28 11:26:08 EST 2012
ssl.sh: #9251: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22534 >/dev/null 2>/dev/null
selfserv with PID 22534 found at Wed Nov 28 11:26:08 EST 2012
ssl.sh: #9252: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22534 >/dev/null 2>/dev/null
selfserv with PID 22534 found at Wed Nov 28 11:26:08 EST 2012
ssl.sh: #9253: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22534 >/dev/null 2>/dev/null
selfserv with PID 22534 found at Wed Nov 28 11:26:08 EST 2012
ssl.sh: #9254: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22534 >/dev/null 2>/dev/null
selfserv with PID 22534 found at Wed Nov 28 11:26:08 EST 2012
ssl.sh: #9255: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22534 >/dev/null 2>/dev/null
selfserv with PID 22534 found at Wed Nov 28 11:26:09 EST 2012
ssl.sh: #9256: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 22534 at Wed Nov 28 11:26:09 EST 2012
kill -USR1 22534
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 22534 killed at Wed Nov 28 11:26:09 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:26:09 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:26:09 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 24007 >/dev/null 2>/dev/null
selfserv with PID 24007 found at Wed Nov 28 11:26:09 EST 2012
selfserv with PID 24007 started at Wed Nov 28 11:26:09 EST 2012
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24007 >/dev/null 2>/dev/null
selfserv with PID 24007 found at Wed Nov 28 11:26:09 EST 2012
ssl.sh: #9257: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24007 >/dev/null 2>/dev/null
selfserv with PID 24007 found at Wed Nov 28 11:26:09 EST 2012
ssl.sh: #9258: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24007 >/dev/null 2>/dev/null
selfserv with PID 24007 found at Wed Nov 28 11:26:09 EST 2012
ssl.sh: #9259: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24007 >/dev/null 2>/dev/null
selfserv with PID 24007 found at Wed Nov 28 11:26:10 EST 2012
ssl.sh: #9260: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24007 >/dev/null 2>/dev/null
selfserv with PID 24007 found at Wed Nov 28 11:26:10 EST 2012
ssl.sh: #9261: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24007 >/dev/null 2>/dev/null
selfserv with PID 24007 found at Wed Nov 28 11:26:10 EST 2012
ssl.sh: #9262: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24007 >/dev/null 2>/dev/null
selfserv with PID 24007 found at Wed Nov 28 11:26:10 EST 2012
ssl.sh: #9263: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24007 >/dev/null 2>/dev/null
selfserv with PID 24007 found at Wed Nov 28 11:26:10 EST 2012
ssl.sh: #9264: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24007 >/dev/null 2>/dev/null
selfserv with PID 24007 found at Wed Nov 28 11:26:10 EST 2012
ssl.sh: #9265: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24007 >/dev/null 2>/dev/null
selfserv with PID 24007 found at Wed Nov 28 11:26:11 EST 2012
ssl.sh: #9266: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24007 >/dev/null 2>/dev/null
selfserv with PID 24007 found at Wed Nov 28 11:26:11 EST 2012
ssl.sh: #9267: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24007 >/dev/null 2>/dev/null
selfserv with PID 24007 found at Wed Nov 28 11:26:11 EST 2012
ssl.sh: #9268: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24007 >/dev/null 2>/dev/null
selfserv with PID 24007 found at Wed Nov 28 11:26:11 EST 2012
ssl.sh: #9269: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/server/root.crl_43-48

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 159 bytes
tstclnt: Writing 159 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24007 >/dev/null 2>/dev/null
selfserv with PID 24007 found at Wed Nov 28 11:26:11 EST 2012
================= CRL Reloaded =============
ssl.sh: #9270: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24007 >/dev/null 2>/dev/null
selfserv with PID 24007 found at Wed Nov 28 11:26:12 EST 2012
ssl.sh: #9271: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24007 >/dev/null 2>/dev/null
selfserv with PID 24007 found at Wed Nov 28 11:26:12 EST 2012
ssl.sh: #9272: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24007 >/dev/null 2>/dev/null
selfserv with PID 24007 found at Wed Nov 28 11:26:12 EST 2012
ssl.sh: #9273: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24007 >/dev/null 2>/dev/null
selfserv with PID 24007 found at Wed Nov 28 11:26:12 EST 2012
ssl.sh: #9274: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24007 >/dev/null 2>/dev/null
selfserv with PID 24007 found at Wed Nov 28 11:26:12 EST 2012
ssl.sh: #9275: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24007 >/dev/null 2>/dev/null
selfserv with PID 24007 found at Wed Nov 28 11:26:13 EST 2012
ssl.sh: #9276: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24007 >/dev/null 2>/dev/null
selfserv with PID 24007 found at Wed Nov 28 11:26:13 EST 2012
ssl.sh: #9277: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24007 >/dev/null 2>/dev/null
selfserv with PID 24007 found at Wed Nov 28 11:26:13 EST 2012
ssl.sh: #9278: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24007 >/dev/null 2>/dev/null
selfserv with PID 24007 found at Wed Nov 28 11:26:13 EST 2012
ssl.sh: #9279: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24007 >/dev/null 2>/dev/null
selfserv with PID 24007 found at Wed Nov 28 11:26:13 EST 2012
ssl.sh: #9280: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24007 >/dev/null 2>/dev/null
selfserv with PID 24007 found at Wed Nov 28 11:26:14 EST 2012
ssl.sh: #9281: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24007 >/dev/null 2>/dev/null
selfserv with PID 24007 found at Wed Nov 28 11:26:14 EST 2012
ssl.sh: #9282: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24007 >/dev/null 2>/dev/null
selfserv with PID 24007 found at Wed Nov 28 11:26:14 EST 2012
ssl.sh: #9283: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/server/root.crl_49-52

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 159 bytes
tstclnt: Writing 159 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24007 >/dev/null 2>/dev/null
selfserv with PID 24007 found at Wed Nov 28 11:26:14 EST 2012
================= CRL Reloaded =============
ssl.sh: #9284: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24007 >/dev/null 2>/dev/null
selfserv with PID 24007 found at Wed Nov 28 11:26:14 EST 2012
ssl.sh: #9285: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24007 >/dev/null 2>/dev/null
selfserv with PID 24007 found at Wed Nov 28 11:26:15 EST 2012
ssl.sh: #9286: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24007 >/dev/null 2>/dev/null
selfserv with PID 24007 found at Wed Nov 28 11:26:15 EST 2012
ssl.sh: #9287: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24007 >/dev/null 2>/dev/null
selfserv with PID 24007 found at Wed Nov 28 11:26:15 EST 2012
ssl.sh: #9288: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24007 >/dev/null 2>/dev/null
selfserv with PID 24007 found at Wed Nov 28 11:26:15 EST 2012
ssl.sh: #9289: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24007 >/dev/null 2>/dev/null
selfserv with PID 24007 found at Wed Nov 28 11:26:15 EST 2012
ssl.sh: #9290: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24007 >/dev/null 2>/dev/null
selfserv with PID 24007 found at Wed Nov 28 11:26:15 EST 2012
ssl.sh: #9291: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24007 >/dev/null 2>/dev/null
selfserv with PID 24007 found at Wed Nov 28 11:26:16 EST 2012
ssl.sh: #9292: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24007 >/dev/null 2>/dev/null
selfserv with PID 24007 found at Wed Nov 28 11:26:16 EST 2012
ssl.sh: #9293: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24007 >/dev/null 2>/dev/null
selfserv with PID 24007 found at Wed Nov 28 11:26:16 EST 2012
ssl.sh: #9294: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24007 >/dev/null 2>/dev/null
selfserv with PID 24007 found at Wed Nov 28 11:26:16 EST 2012
ssl.sh: #9295: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24007 >/dev/null 2>/dev/null
selfserv with PID 24007 found at Wed Nov 28 11:26:16 EST 2012
ssl.sh: #9296: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24007 >/dev/null 2>/dev/null
selfserv with PID 24007 found at Wed Nov 28 11:26:17 EST 2012
ssl.sh: #9297: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24007 at Wed Nov 28 11:26:17 EST 2012
kill -USR1 24007
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 24007 killed at Wed Nov 28 11:26:17 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:26:17 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:26:17 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 25469 >/dev/null 2>/dev/null
selfserv with PID 25469 found at Wed Nov 28 11:26:17 EST 2012
selfserv with PID 25469 started at Wed Nov 28 11:26:17 EST 2012
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25469 >/dev/null 2>/dev/null
selfserv with PID 25469 found at Wed Nov 28 11:26:17 EST 2012
ssl.sh: #9298: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25469 >/dev/null 2>/dev/null
selfserv with PID 25469 found at Wed Nov 28 11:26:17 EST 2012
ssl.sh: #9299: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25469 >/dev/null 2>/dev/null
selfserv with PID 25469 found at Wed Nov 28 11:26:17 EST 2012
ssl.sh: #9300: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25469 >/dev/null 2>/dev/null
selfserv with PID 25469 found at Wed Nov 28 11:26:18 EST 2012
ssl.sh: #9301: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25469 >/dev/null 2>/dev/null
selfserv with PID 25469 found at Wed Nov 28 11:26:18 EST 2012
ssl.sh: #9302: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25469 >/dev/null 2>/dev/null
selfserv with PID 25469 found at Wed Nov 28 11:26:18 EST 2012
ssl.sh: #9303: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25469 >/dev/null 2>/dev/null
selfserv with PID 25469 found at Wed Nov 28 11:26:18 EST 2012
ssl.sh: #9304: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25469 >/dev/null 2>/dev/null
selfserv with PID 25469 found at Wed Nov 28 11:26:18 EST 2012
ssl.sh: #9305: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25469 >/dev/null 2>/dev/null
selfserv with PID 25469 found at Wed Nov 28 11:26:19 EST 2012
ssl.sh: #9306: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25469 >/dev/null 2>/dev/null
selfserv with PID 25469 found at Wed Nov 28 11:26:19 EST 2012
ssl.sh: #9307: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25469 >/dev/null 2>/dev/null
selfserv with PID 25469 found at Wed Nov 28 11:26:19 EST 2012
ssl.sh: #9308: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25469 >/dev/null 2>/dev/null
selfserv with PID 25469 found at Wed Nov 28 11:26:19 EST 2012
ssl.sh: #9309: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25469 >/dev/null 2>/dev/null
selfserv with PID 25469 found at Wed Nov 28 11:26:20 EST 2012
ssl.sh: #9310: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/server/root.crl_43-48-ec

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 162 bytes
tstclnt: Writing 162 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25469 >/dev/null 2>/dev/null
selfserv with PID 25469 found at Wed Nov 28 11:26:20 EST 2012
================= CRL Reloaded =============
ssl.sh: #9311: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25469 >/dev/null 2>/dev/null
selfserv with PID 25469 found at Wed Nov 28 11:26:20 EST 2012
ssl.sh: #9312: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25469 >/dev/null 2>/dev/null
selfserv with PID 25469 found at Wed Nov 28 11:26:20 EST 2012
ssl.sh: #9313: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25469 >/dev/null 2>/dev/null
selfserv with PID 25469 found at Wed Nov 28 11:26:20 EST 2012
ssl.sh: #9314: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25469 >/dev/null 2>/dev/null
selfserv with PID 25469 found at Wed Nov 28 11:26:21 EST 2012
ssl.sh: #9315: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25469 >/dev/null 2>/dev/null
selfserv with PID 25469 found at Wed Nov 28 11:26:21 EST 2012
ssl.sh: #9316: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25469 >/dev/null 2>/dev/null
selfserv with PID 25469 found at Wed Nov 28 11:26:21 EST 2012
ssl.sh: #9317: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25469 >/dev/null 2>/dev/null
selfserv with PID 25469 found at Wed Nov 28 11:26:21 EST 2012
ssl.sh: #9318: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25469 >/dev/null 2>/dev/null
selfserv with PID 25469 found at Wed Nov 28 11:26:21 EST 2012
ssl.sh: #9319: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25469 >/dev/null 2>/dev/null
selfserv with PID 25469 found at Wed Nov 28 11:26:22 EST 2012
ssl.sh: #9320: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25469 >/dev/null 2>/dev/null
selfserv with PID 25469 found at Wed Nov 28 11:26:22 EST 2012
ssl.sh: #9321: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25469 >/dev/null 2>/dev/null
selfserv with PID 25469 found at Wed Nov 28 11:26:22 EST 2012
ssl.sh: #9322: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25469 >/dev/null 2>/dev/null
selfserv with PID 25469 found at Wed Nov 28 11:26:22 EST 2012
ssl.sh: #9323: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25469 >/dev/null 2>/dev/null
selfserv with PID 25469 found at Wed Nov 28 11:26:22 EST 2012
ssl.sh: #9324: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/server/root.crl_49-52-ec

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 162 bytes
tstclnt: Writing 162 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25469 >/dev/null 2>/dev/null
selfserv with PID 25469 found at Wed Nov 28 11:26:23 EST 2012
================= CRL Reloaded =============
ssl.sh: #9325: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25469 >/dev/null 2>/dev/null
selfserv with PID 25469 found at Wed Nov 28 11:26:23 EST 2012
ssl.sh: #9326: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25469 >/dev/null 2>/dev/null
selfserv with PID 25469 found at Wed Nov 28 11:26:23 EST 2012
ssl.sh: #9327: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25469 >/dev/null 2>/dev/null
selfserv with PID 25469 found at Wed Nov 28 11:26:23 EST 2012
ssl.sh: #9328: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25469 >/dev/null 2>/dev/null
selfserv with PID 25469 found at Wed Nov 28 11:26:24 EST 2012
ssl.sh: #9329: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25469 >/dev/null 2>/dev/null
selfserv with PID 25469 found at Wed Nov 28 11:26:24 EST 2012
ssl.sh: #9330: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25469 >/dev/null 2>/dev/null
selfserv with PID 25469 found at Wed Nov 28 11:26:24 EST 2012
ssl.sh: #9331: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25469 >/dev/null 2>/dev/null
selfserv with PID 25469 found at Wed Nov 28 11:26:24 EST 2012
ssl.sh: #9332: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25469 >/dev/null 2>/dev/null
selfserv with PID 25469 found at Wed Nov 28 11:26:24 EST 2012
ssl.sh: #9333: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25469 >/dev/null 2>/dev/null
selfserv with PID 25469 found at Wed Nov 28 11:26:25 EST 2012
ssl.sh: #9334: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25469 >/dev/null 2>/dev/null
selfserv with PID 25469 found at Wed Nov 28 11:26:25 EST 2012
ssl.sh: #9335: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25469 >/dev/null 2>/dev/null
selfserv with PID 25469 found at Wed Nov 28 11:26:25 EST 2012
ssl.sh: #9336: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25469 >/dev/null 2>/dev/null
selfserv with PID 25469 found at Wed Nov 28 11:26:25 EST 2012
ssl.sh: #9337: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25469 >/dev/null 2>/dev/null
selfserv with PID 25469 found at Wed Nov 28 11:26:26 EST 2012
ssl.sh: #9338: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25469 at Wed Nov 28 11:26:26 EST 2012
kill -USR1 25469
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 25469 killed at Wed Nov 28 11:26:26 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:26:26 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:26:26 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 26931 >/dev/null 2>/dev/null
selfserv with PID 26931 found at Wed Nov 28 11:26:26 EST 2012
selfserv with PID 26931 started at Wed Nov 28 11:26:26 EST 2012
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 26931 >/dev/null 2>/dev/null
selfserv with PID 26931 found at Wed Nov 28 11:26:26 EST 2012
ssl.sh: #9339: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26931 >/dev/null 2>/dev/null
selfserv with PID 26931 found at Wed Nov 28 11:26:26 EST 2012
ssl.sh: #9340: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 26931 >/dev/null 2>/dev/null
selfserv with PID 26931 found at Wed Nov 28 11:26:26 EST 2012
ssl.sh: #9341: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26931 >/dev/null 2>/dev/null
selfserv with PID 26931 found at Wed Nov 28 11:26:27 EST 2012
ssl.sh: #9342: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26931 >/dev/null 2>/dev/null
selfserv with PID 26931 found at Wed Nov 28 11:26:27 EST 2012
ssl.sh: #9343: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26931 >/dev/null 2>/dev/null
selfserv with PID 26931 found at Wed Nov 28 11:26:27 EST 2012
ssl.sh: #9344: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26931 >/dev/null 2>/dev/null
selfserv with PID 26931 found at Wed Nov 28 11:26:27 EST 2012
ssl.sh: #9345: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26931 >/dev/null 2>/dev/null
selfserv with PID 26931 found at Wed Nov 28 11:26:27 EST 2012
ssl.sh: #9346: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26931 >/dev/null 2>/dev/null
selfserv with PID 26931 found at Wed Nov 28 11:26:28 EST 2012
ssl.sh: #9347: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26931 >/dev/null 2>/dev/null
selfserv with PID 26931 found at Wed Nov 28 11:26:28 EST 2012
ssl.sh: #9348: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26931 >/dev/null 2>/dev/null
selfserv with PID 26931 found at Wed Nov 28 11:26:28 EST 2012
ssl.sh: #9349: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26931 >/dev/null 2>/dev/null
selfserv with PID 26931 found at Wed Nov 28 11:26:28 EST 2012
ssl.sh: #9350: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26931 >/dev/null 2>/dev/null
selfserv with PID 26931 found at Wed Nov 28 11:26:29 EST 2012
ssl.sh: #9351: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/server/root.crl_43-48-ec

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 162 bytes
tstclnt: Writing 162 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26931 >/dev/null 2>/dev/null
selfserv with PID 26931 found at Wed Nov 28 11:26:29 EST 2012
================= CRL Reloaded =============
ssl.sh: #9352: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 26931 >/dev/null 2>/dev/null
selfserv with PID 26931 found at Wed Nov 28 11:26:29 EST 2012
ssl.sh: #9353: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26931 >/dev/null 2>/dev/null
selfserv with PID 26931 found at Wed Nov 28 11:26:29 EST 2012
ssl.sh: #9354: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 26931 >/dev/null 2>/dev/null
selfserv with PID 26931 found at Wed Nov 28 11:26:29 EST 2012
ssl.sh: #9355: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 26931 >/dev/null 2>/dev/null
selfserv with PID 26931 found at Wed Nov 28 11:26:30 EST 2012
ssl.sh: #9356: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 26931 >/dev/null 2>/dev/null
selfserv with PID 26931 found at Wed Nov 28 11:26:30 EST 2012
ssl.sh: #9357: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 26931 >/dev/null 2>/dev/null
selfserv with PID 26931 found at Wed Nov 28 11:26:30 EST 2012
ssl.sh: #9358: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26931 >/dev/null 2>/dev/null
selfserv with PID 26931 found at Wed Nov 28 11:26:30 EST 2012
ssl.sh: #9359: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 26931 >/dev/null 2>/dev/null
selfserv with PID 26931 found at Wed Nov 28 11:26:30 EST 2012
ssl.sh: #9360: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 26931 >/dev/null 2>/dev/null
selfserv with PID 26931 found at Wed Nov 28 11:26:31 EST 2012
ssl.sh: #9361: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26931 >/dev/null 2>/dev/null
selfserv with PID 26931 found at Wed Nov 28 11:26:31 EST 2012
ssl.sh: #9362: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26931 >/dev/null 2>/dev/null
selfserv with PID 26931 found at Wed Nov 28 11:26:31 EST 2012
ssl.sh: #9363: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26931 >/dev/null 2>/dev/null
selfserv with PID 26931 found at Wed Nov 28 11:26:31 EST 2012
ssl.sh: #9364: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26931 >/dev/null 2>/dev/null
selfserv with PID 26931 found at Wed Nov 28 11:26:31 EST 2012
ssl.sh: #9365: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/server/root.crl_49-52-ec

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 162 bytes
tstclnt: Writing 162 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26931 >/dev/null 2>/dev/null
selfserv with PID 26931 found at Wed Nov 28 11:26:32 EST 2012
================= CRL Reloaded =============
ssl.sh: #9366: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 26931 >/dev/null 2>/dev/null
selfserv with PID 26931 found at Wed Nov 28 11:26:32 EST 2012
ssl.sh: #9367: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26931 >/dev/null 2>/dev/null
selfserv with PID 26931 found at Wed Nov 28 11:26:32 EST 2012
ssl.sh: #9368: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 26931 >/dev/null 2>/dev/null
selfserv with PID 26931 found at Wed Nov 28 11:26:32 EST 2012
ssl.sh: #9369: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x09 for socket out_flags.
tstclnt: PR_Poll returned 0x09 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 26931 >/dev/null 2>/dev/null
selfserv with PID 26931 found at Wed Nov 28 11:26:32 EST 2012
ssl.sh: #9370: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 26931 >/dev/null 2>/dev/null
selfserv with PID 26931 found at Wed Nov 28 11:26:33 EST 2012
ssl.sh: #9371: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 26931 >/dev/null 2>/dev/null
selfserv with PID 26931 found at Wed Nov 28 11:26:33 EST 2012
ssl.sh: #9372: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26931 >/dev/null 2>/dev/null
selfserv with PID 26931 found at Wed Nov 28 11:26:33 EST 2012
ssl.sh: #9373: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 26931 >/dev/null 2>/dev/null
selfserv with PID 26931 found at Wed Nov 28 11:26:33 EST 2012
ssl.sh: #9374: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 26931 >/dev/null 2>/dev/null
selfserv with PID 26931 found at Wed Nov 28 11:26:34 EST 2012
ssl.sh: #9375: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 26931 >/dev/null 2>/dev/null
selfserv with PID 26931 found at Wed Nov 28 11:26:34 EST 2012
ssl.sh: #9376: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 26931 >/dev/null 2>/dev/null
selfserv with PID 26931 found at Wed Nov 28 11:26:34 EST 2012
ssl.sh: #9377: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26931 >/dev/null 2>/dev/null
selfserv with PID 26931 found at Wed Nov 28 11:26:34 EST 2012
ssl.sh: #9378: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 26931 >/dev/null 2>/dev/null
selfserv with PID 26931 found at Wed Nov 28 11:26:34 EST 2012
ssl.sh: #9379: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26931 at Wed Nov 28 11:26:34 EST 2012
kill -USR1 26931
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 26931 killed at Wed Nov 28 11:26:34 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:26:34 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:26:34 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 28393 >/dev/null 2>/dev/null
selfserv with PID 28393 found at Wed Nov 28 11:26:34 EST 2012
selfserv with PID 28393 started at Wed Nov 28 11:26:34 EST 2012
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28393 >/dev/null 2>/dev/null
selfserv with PID 28393 found at Wed Nov 28 11:26:35 EST 2012
ssl.sh: #9380: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28393 >/dev/null 2>/dev/null
selfserv with PID 28393 found at Wed Nov 28 11:26:35 EST 2012
ssl.sh: #9381: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28393 >/dev/null 2>/dev/null
selfserv with PID 28393 found at Wed Nov 28 11:26:35 EST 2012
ssl.sh: #9382: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28393 >/dev/null 2>/dev/null
selfserv with PID 28393 found at Wed Nov 28 11:26:35 EST 2012
ssl.sh: #9383: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28393 >/dev/null 2>/dev/null
selfserv with PID 28393 found at Wed Nov 28 11:26:36 EST 2012
ssl.sh: #9384: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28393 >/dev/null 2>/dev/null
selfserv with PID 28393 found at Wed Nov 28 11:26:36 EST 2012
ssl.sh: #9385: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28393 >/dev/null 2>/dev/null
selfserv with PID 28393 found at Wed Nov 28 11:26:36 EST 2012
ssl.sh: #9386: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28393 >/dev/null 2>/dev/null
selfserv with PID 28393 found at Wed Nov 28 11:26:36 EST 2012
ssl.sh: #9387: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28393 >/dev/null 2>/dev/null
selfserv with PID 28393 found at Wed Nov 28 11:26:36 EST 2012
ssl.sh: #9388: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28393 >/dev/null 2>/dev/null
selfserv with PID 28393 found at Wed Nov 28 11:26:37 EST 2012
ssl.sh: #9389: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28393 >/dev/null 2>/dev/null
selfserv with PID 28393 found at Wed Nov 28 11:26:37 EST 2012
ssl.sh: #9390: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28393 >/dev/null 2>/dev/null
selfserv with PID 28393 found at Wed Nov 28 11:26:37 EST 2012
ssl.sh: #9391: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28393 >/dev/null 2>/dev/null
selfserv with PID 28393 found at Wed Nov 28 11:26:37 EST 2012
ssl.sh: #9392: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/server/root.crl_43-48-ec

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 162 bytes
tstclnt: Writing 162 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28393 >/dev/null 2>/dev/null
selfserv with PID 28393 found at Wed Nov 28 11:26:38 EST 2012
================= CRL Reloaded =============
ssl.sh: #9393: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x09 for socket out_flags.
tstclnt: PR_Poll returned 0x09 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28393 >/dev/null 2>/dev/null
selfserv with PID 28393 found at Wed Nov 28 11:26:38 EST 2012
ssl.sh: #9394: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28393 >/dev/null 2>/dev/null
selfserv with PID 28393 found at Wed Nov 28 11:26:38 EST 2012
ssl.sh: #9395: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28393 >/dev/null 2>/dev/null
selfserv with PID 28393 found at Wed Nov 28 11:26:38 EST 2012
ssl.sh: #9396: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28393 >/dev/null 2>/dev/null
selfserv with PID 28393 found at Wed Nov 28 11:26:38 EST 2012
ssl.sh: #9397: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28393 >/dev/null 2>/dev/null
selfserv with PID 28393 found at Wed Nov 28 11:26:39 EST 2012
ssl.sh: #9398: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28393 >/dev/null 2>/dev/null
selfserv with PID 28393 found at Wed Nov 28 11:26:39 EST 2012
ssl.sh: #9399: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28393 >/dev/null 2>/dev/null
selfserv with PID 28393 found at Wed Nov 28 11:26:39 EST 2012
ssl.sh: #9400: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28393 >/dev/null 2>/dev/null
selfserv with PID 28393 found at Wed Nov 28 11:26:39 EST 2012
ssl.sh: #9401: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28393 >/dev/null 2>/dev/null
selfserv with PID 28393 found at Wed Nov 28 11:26:39 EST 2012
ssl.sh: #9402: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28393 >/dev/null 2>/dev/null
selfserv with PID 28393 found at Wed Nov 28 11:26:40 EST 2012
ssl.sh: #9403: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28393 >/dev/null 2>/dev/null
selfserv with PID 28393 found at Wed Nov 28 11:26:40 EST 2012
ssl.sh: #9404: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28393 >/dev/null 2>/dev/null
selfserv with PID 28393 found at Wed Nov 28 11:26:40 EST 2012
ssl.sh: #9405: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28393 >/dev/null 2>/dev/null
selfserv with PID 28393 found at Wed Nov 28 11:26:40 EST 2012
ssl.sh: #9406: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/server/root.crl_49-52-ec

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 162 bytes
tstclnt: Writing 162 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28393 >/dev/null 2>/dev/null
selfserv with PID 28393 found at Wed Nov 28 11:26:40 EST 2012
================= CRL Reloaded =============
ssl.sh: #9407: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28393 >/dev/null 2>/dev/null
selfserv with PID 28393 found at Wed Nov 28 11:26:41 EST 2012
ssl.sh: #9408: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28393 >/dev/null 2>/dev/null
selfserv with PID 28393 found at Wed Nov 28 11:26:41 EST 2012
ssl.sh: #9409: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28393 >/dev/null 2>/dev/null
selfserv with PID 28393 found at Wed Nov 28 11:26:41 EST 2012
ssl.sh: #9410: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28393 >/dev/null 2>/dev/null
selfserv with PID 28393 found at Wed Nov 28 11:26:41 EST 2012
ssl.sh: #9411: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28393 >/dev/null 2>/dev/null
selfserv with PID 28393 found at Wed Nov 28 11:26:41 EST 2012
ssl.sh: #9412: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28393 >/dev/null 2>/dev/null
selfserv with PID 28393 found at Wed Nov 28 11:26:42 EST 2012
ssl.sh: #9413: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28393 >/dev/null 2>/dev/null
selfserv with PID 28393 found at Wed Nov 28 11:26:42 EST 2012
ssl.sh: #9414: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28393 >/dev/null 2>/dev/null
selfserv with PID 28393 found at Wed Nov 28 11:26:42 EST 2012
ssl.sh: #9415: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28393 >/dev/null 2>/dev/null
selfserv with PID 28393 found at Wed Nov 28 11:26:42 EST 2012
ssl.sh: #9416: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28393 >/dev/null 2>/dev/null
selfserv with PID 28393 found at Wed Nov 28 11:26:42 EST 2012
ssl.sh: #9417: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28393 >/dev/null 2>/dev/null
selfserv with PID 28393 found at Wed Nov 28 11:26:43 EST 2012
ssl.sh: #9418: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28393 >/dev/null 2>/dev/null
selfserv with PID 28393 found at Wed Nov 28 11:26:43 EST 2012
ssl.sh: #9419: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28393 >/dev/null 2>/dev/null
selfserv with PID 28393 found at Wed Nov 28 11:26:43 EST 2012
ssl.sh: #9420: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 28393 at Wed Nov 28 11:26:43 EST 2012
kill -USR1 28393
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 28393 killed at Wed Nov 28 11:26:43 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:26:43 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:26:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 29855 >/dev/null 2>/dev/null
selfserv with PID 29855 found at Wed Nov 28 11:26:43 EST 2012
selfserv with PID 29855 started at Wed Nov 28 11:26:43 EST 2012
trying to kill selfserv with PID 29855 at Wed Nov 28 11:26:43 EST 2012
kill -USR1 29855
./ssl.sh: line 173: 29855 User defined signal 1   ${PROFTOOL} ${BINDIR}/selfserv -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 29855 killed at Wed Nov 28 11:26:43 EST 2012
selfserv starting at Wed Nov 28 11:26:43 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:26:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 29889 >/dev/null 2>/dev/null
selfserv with PID 29889 found at Wed Nov 28 11:26:43 EST 2012
selfserv with PID 29889 started at Wed Nov 28 11:26:43 EST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29889 >/dev/null 2>/dev/null
selfserv with PID 29889 found at Wed Nov 28 11:26:44 EST 2012
ssl.sh: #9421: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29889 >/dev/null 2>/dev/null
selfserv with PID 29889 found at Wed Nov 28 11:26:44 EST 2012
ssl.sh: #9422: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29889 >/dev/null 2>/dev/null
selfserv with PID 29889 found at Wed Nov 28 11:26:44 EST 2012
ssl.sh: #9423: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29889 >/dev/null 2>/dev/null
selfserv with PID 29889 found at Wed Nov 28 11:26:44 EST 2012
ssl.sh: #9424: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29889 >/dev/null 2>/dev/null
selfserv with PID 29889 found at Wed Nov 28 11:26:44 EST 2012
ssl.sh: #9425: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29889 >/dev/null 2>/dev/null
selfserv with PID 29889 found at Wed Nov 28 11:26:44 EST 2012
ssl.sh: #9426: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29889 >/dev/null 2>/dev/null
selfserv with PID 29889 found at Wed Nov 28 11:26:45 EST 2012
ssl.sh: #9427: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29889 >/dev/null 2>/dev/null
selfserv with PID 29889 found at Wed Nov 28 11:26:45 EST 2012
ssl.sh: #9428: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29889 >/dev/null 2>/dev/null
selfserv with PID 29889 found at Wed Nov 28 11:26:45 EST 2012
ssl.sh: #9429: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29889 >/dev/null 2>/dev/null
selfserv with PID 29889 found at Wed Nov 28 11:26:45 EST 2012
ssl.sh: #9430: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29889 >/dev/null 2>/dev/null
selfserv with PID 29889 found at Wed Nov 28 11:26:45 EST 2012
ssl.sh: #9431: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29889 >/dev/null 2>/dev/null
selfserv with PID 29889 found at Wed Nov 28 11:26:46 EST 2012
ssl.sh: #9432: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29889 >/dev/null 2>/dev/null
selfserv with PID 29889 found at Wed Nov 28 11:26:46 EST 2012
ssl.sh: #9433: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/server/root.crl_43-48

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 159 bytes
tstclnt: Writing 159 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29889 >/dev/null 2>/dev/null
selfserv with PID 29889 found at Wed Nov 28 11:26:46 EST 2012
================= CRL Reloaded =============
ssl.sh: #9434: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29889 >/dev/null 2>/dev/null
selfserv with PID 29889 found at Wed Nov 28 11:26:46 EST 2012
ssl.sh: #9435: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29889 >/dev/null 2>/dev/null
selfserv with PID 29889 found at Wed Nov 28 11:26:46 EST 2012
ssl.sh: #9436: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29889 >/dev/null 2>/dev/null
selfserv with PID 29889 found at Wed Nov 28 11:26:46 EST 2012
ssl.sh: #9437: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29889 >/dev/null 2>/dev/null
selfserv with PID 29889 found at Wed Nov 28 11:26:47 EST 2012
ssl.sh: #9438: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29889 >/dev/null 2>/dev/null
selfserv with PID 29889 found at Wed Nov 28 11:26:47 EST 2012
ssl.sh: #9439: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29889 >/dev/null 2>/dev/null
selfserv with PID 29889 found at Wed Nov 28 11:26:47 EST 2012
ssl.sh: #9440: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29889 >/dev/null 2>/dev/null
selfserv with PID 29889 found at Wed Nov 28 11:26:47 EST 2012
ssl.sh: #9441: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29889 >/dev/null 2>/dev/null
selfserv with PID 29889 found at Wed Nov 28 11:26:47 EST 2012
ssl.sh: #9442: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29889 >/dev/null 2>/dev/null
selfserv with PID 29889 found at Wed Nov 28 11:26:48 EST 2012
ssl.sh: #9443: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29889 >/dev/null 2>/dev/null
selfserv with PID 29889 found at Wed Nov 28 11:26:48 EST 2012
ssl.sh: #9444: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29889 >/dev/null 2>/dev/null
selfserv with PID 29889 found at Wed Nov 28 11:26:48 EST 2012
ssl.sh: #9445: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29889 >/dev/null 2>/dev/null
selfserv with PID 29889 found at Wed Nov 28 11:26:48 EST 2012
ssl.sh: #9446: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29889 >/dev/null 2>/dev/null
selfserv with PID 29889 found at Wed Nov 28 11:26:48 EST 2012
ssl.sh: #9447: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/server/root.crl_49-52

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 159 bytes
tstclnt: Writing 159 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29889 >/dev/null 2>/dev/null
selfserv with PID 29889 found at Wed Nov 28 11:26:49 EST 2012
================= CRL Reloaded =============
ssl.sh: #9448: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29889 >/dev/null 2>/dev/null
selfserv with PID 29889 found at Wed Nov 28 11:26:49 EST 2012
ssl.sh: #9449: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29889 >/dev/null 2>/dev/null
selfserv with PID 29889 found at Wed Nov 28 11:26:49 EST 2012
ssl.sh: #9450: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29889 >/dev/null 2>/dev/null
selfserv with PID 29889 found at Wed Nov 28 11:26:49 EST 2012
ssl.sh: #9451: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29889 >/dev/null 2>/dev/null
selfserv with PID 29889 found at Wed Nov 28 11:26:49 EST 2012
ssl.sh: #9452: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29889 >/dev/null 2>/dev/null
selfserv with PID 29889 found at Wed Nov 28 11:26:49 EST 2012
ssl.sh: #9453: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29889 >/dev/null 2>/dev/null
selfserv with PID 29889 found at Wed Nov 28 11:26:50 EST 2012
ssl.sh: #9454: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29889 >/dev/null 2>/dev/null
selfserv with PID 29889 found at Wed Nov 28 11:26:50 EST 2012
ssl.sh: #9455: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29889 >/dev/null 2>/dev/null
selfserv with PID 29889 found at Wed Nov 28 11:26:50 EST 2012
ssl.sh: #9456: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29889 >/dev/null 2>/dev/null
selfserv with PID 29889 found at Wed Nov 28 11:26:50 EST 2012
ssl.sh: #9457: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29889 >/dev/null 2>/dev/null
selfserv with PID 29889 found at Wed Nov 28 11:26:50 EST 2012
ssl.sh: #9458: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29889 >/dev/null 2>/dev/null
selfserv with PID 29889 found at Wed Nov 28 11:26:51 EST 2012
ssl.sh: #9459: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29889 >/dev/null 2>/dev/null
selfserv with PID 29889 found at Wed Nov 28 11:26:51 EST 2012
ssl.sh: #9460: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29889 >/dev/null 2>/dev/null
selfserv with PID 29889 found at Wed Nov 28 11:26:51 EST 2012
ssl.sh: #9461: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 29889 at Wed Nov 28 11:26:51 EST 2012
kill -USR1 29889
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 29889 killed at Wed Nov 28 11:26:51 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:26:51 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:26:51 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 31351 >/dev/null 2>/dev/null
selfserv with PID 31351 found at Wed Nov 28 11:26:51 EST 2012
selfserv with PID 31351 started at Wed Nov 28 11:26:51 EST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 31351 >/dev/null 2>/dev/null
selfserv with PID 31351 found at Wed Nov 28 11:26:51 EST 2012
ssl.sh: #9462: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31351 >/dev/null 2>/dev/null
selfserv with PID 31351 found at Wed Nov 28 11:26:51 EST 2012
ssl.sh: #9463: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 31351 >/dev/null 2>/dev/null
selfserv with PID 31351 found at Wed Nov 28 11:26:52 EST 2012
ssl.sh: #9464: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31351 >/dev/null 2>/dev/null
selfserv with PID 31351 found at Wed Nov 28 11:26:52 EST 2012
ssl.sh: #9465: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31351 >/dev/null 2>/dev/null
selfserv with PID 31351 found at Wed Nov 28 11:26:52 EST 2012
ssl.sh: #9466: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31351 >/dev/null 2>/dev/null
selfserv with PID 31351 found at Wed Nov 28 11:26:52 EST 2012
ssl.sh: #9467: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31351 >/dev/null 2>/dev/null
selfserv with PID 31351 found at Wed Nov 28 11:26:52 EST 2012
ssl.sh: #9468: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31351 >/dev/null 2>/dev/null
selfserv with PID 31351 found at Wed Nov 28 11:26:52 EST 2012
ssl.sh: #9469: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31351 >/dev/null 2>/dev/null
selfserv with PID 31351 found at Wed Nov 28 11:26:53 EST 2012
ssl.sh: #9470: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31351 >/dev/null 2>/dev/null
selfserv with PID 31351 found at Wed Nov 28 11:26:53 EST 2012
ssl.sh: #9471: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31351 >/dev/null 2>/dev/null
selfserv with PID 31351 found at Wed Nov 28 11:26:53 EST 2012
ssl.sh: #9472: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31351 >/dev/null 2>/dev/null
selfserv with PID 31351 found at Wed Nov 28 11:26:53 EST 2012
ssl.sh: #9473: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31351 >/dev/null 2>/dev/null
selfserv with PID 31351 found at Wed Nov 28 11:26:53 EST 2012
ssl.sh: #9474: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/server/root.crl_43-48

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 159 bytes
tstclnt: Writing 159 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31351 >/dev/null 2>/dev/null
selfserv with PID 31351 found at Wed Nov 28 11:26:54 EST 2012
================= CRL Reloaded =============
ssl.sh: #9475: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 31351 >/dev/null 2>/dev/null
selfserv with PID 31351 found at Wed Nov 28 11:26:54 EST 2012
ssl.sh: #9476: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31351 >/dev/null 2>/dev/null
selfserv with PID 31351 found at Wed Nov 28 11:26:54 EST 2012
ssl.sh: #9477: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 31351 >/dev/null 2>/dev/null
selfserv with PID 31351 found at Wed Nov 28 11:26:54 EST 2012
ssl.sh: #9478: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 31351 >/dev/null 2>/dev/null
selfserv with PID 31351 found at Wed Nov 28 11:26:54 EST 2012
ssl.sh: #9479: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 31351 >/dev/null 2>/dev/null
selfserv with PID 31351 found at Wed Nov 28 11:26:55 EST 2012
ssl.sh: #9480: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 31351 >/dev/null 2>/dev/null
selfserv with PID 31351 found at Wed Nov 28 11:26:55 EST 2012
ssl.sh: #9481: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31351 >/dev/null 2>/dev/null
selfserv with PID 31351 found at Wed Nov 28 11:26:55 EST 2012
ssl.sh: #9482: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 31351 >/dev/null 2>/dev/null
selfserv with PID 31351 found at Wed Nov 28 11:26:55 EST 2012
ssl.sh: #9483: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 31351 >/dev/null 2>/dev/null
selfserv with PID 31351 found at Wed Nov 28 11:26:55 EST 2012
ssl.sh: #9484: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31351 >/dev/null 2>/dev/null
selfserv with PID 31351 found at Wed Nov 28 11:26:55 EST 2012
ssl.sh: #9485: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31351 >/dev/null 2>/dev/null
selfserv with PID 31351 found at Wed Nov 28 11:26:56 EST 2012
ssl.sh: #9486: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31351 >/dev/null 2>/dev/null
selfserv with PID 31351 found at Wed Nov 28 11:26:56 EST 2012
ssl.sh: #9487: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31351 >/dev/null 2>/dev/null
selfserv with PID 31351 found at Wed Nov 28 11:26:56 EST 2012
ssl.sh: #9488: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/server/root.crl_49-52

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 159 bytes
tstclnt: Writing 159 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31351 >/dev/null 2>/dev/null
selfserv with PID 31351 found at Wed Nov 28 11:26:56 EST 2012
================= CRL Reloaded =============
ssl.sh: #9489: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 31351 >/dev/null 2>/dev/null
selfserv with PID 31351 found at Wed Nov 28 11:26:56 EST 2012
ssl.sh: #9490: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31351 >/dev/null 2>/dev/null
selfserv with PID 31351 found at Wed Nov 28 11:26:56 EST 2012
ssl.sh: #9491: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 31351 >/dev/null 2>/dev/null
selfserv with PID 31351 found at Wed Nov 28 11:26:57 EST 2012
ssl.sh: #9492: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 31351 >/dev/null 2>/dev/null
selfserv with PID 31351 found at Wed Nov 28 11:26:57 EST 2012
ssl.sh: #9493: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 31351 >/dev/null 2>/dev/null
selfserv with PID 31351 found at Wed Nov 28 11:26:57 EST 2012
ssl.sh: #9494: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 31351 >/dev/null 2>/dev/null
selfserv with PID 31351 found at Wed Nov 28 11:26:57 EST 2012
ssl.sh: #9495: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31351 >/dev/null 2>/dev/null
selfserv with PID 31351 found at Wed Nov 28 11:26:57 EST 2012
ssl.sh: #9496: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 31351 >/dev/null 2>/dev/null
selfserv with PID 31351 found at Wed Nov 28 11:26:58 EST 2012
ssl.sh: #9497: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 31351 >/dev/null 2>/dev/null
selfserv with PID 31351 found at Wed Nov 28 11:26:58 EST 2012
ssl.sh: #9498: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 31351 >/dev/null 2>/dev/null
selfserv with PID 31351 found at Wed Nov 28 11:26:58 EST 2012
ssl.sh: #9499: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 31351 >/dev/null 2>/dev/null
selfserv with PID 31351 found at Wed Nov 28 11:26:58 EST 2012
ssl.sh: #9500: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31351 >/dev/null 2>/dev/null
selfserv with PID 31351 found at Wed Nov 28 11:26:58 EST 2012
ssl.sh: #9501: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 31351 >/dev/null 2>/dev/null
selfserv with PID 31351 found at Wed Nov 28 11:26:59 EST 2012
ssl.sh: #9502: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 31351 at Wed Nov 28 11:26:59 EST 2012
kill -USR1 31351
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 31351 killed at Wed Nov 28 11:26:59 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:26:59 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:26:59 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 350 >/dev/null 2>/dev/null
selfserv with PID 350 found at Wed Nov 28 11:26:59 EST 2012
selfserv with PID 350 started at Wed Nov 28 11:26:59 EST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 350 >/dev/null 2>/dev/null
selfserv with PID 350 found at Wed Nov 28 11:26:59 EST 2012
ssl.sh: #9503: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 350 >/dev/null 2>/dev/null
selfserv with PID 350 found at Wed Nov 28 11:26:59 EST 2012
ssl.sh: #9504: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 350 >/dev/null 2>/dev/null
selfserv with PID 350 found at Wed Nov 28 11:26:59 EST 2012
ssl.sh: #9505: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 350 >/dev/null 2>/dev/null
selfserv with PID 350 found at Wed Nov 28 11:26:59 EST 2012
ssl.sh: #9506: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 350 >/dev/null 2>/dev/null
selfserv with PID 350 found at Wed Nov 28 11:27:00 EST 2012
ssl.sh: #9507: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 350 >/dev/null 2>/dev/null
selfserv with PID 350 found at Wed Nov 28 11:27:00 EST 2012
ssl.sh: #9508: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 350 >/dev/null 2>/dev/null
selfserv with PID 350 found at Wed Nov 28 11:27:00 EST 2012
ssl.sh: #9509: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 350 >/dev/null 2>/dev/null
selfserv with PID 350 found at Wed Nov 28 11:27:00 EST 2012
ssl.sh: #9510: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 350 >/dev/null 2>/dev/null
selfserv with PID 350 found at Wed Nov 28 11:27:00 EST 2012
ssl.sh: #9511: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 350 >/dev/null 2>/dev/null
selfserv with PID 350 found at Wed Nov 28 11:27:00 EST 2012
ssl.sh: #9512: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 350 >/dev/null 2>/dev/null
selfserv with PID 350 found at Wed Nov 28 11:27:01 EST 2012
ssl.sh: #9513: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 350 >/dev/null 2>/dev/null
selfserv with PID 350 found at Wed Nov 28 11:27:01 EST 2012
ssl.sh: #9514: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 350 >/dev/null 2>/dev/null
selfserv with PID 350 found at Wed Nov 28 11:27:01 EST 2012
ssl.sh: #9515: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/server/root.crl_43-48

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 159 bytes
tstclnt: Writing 159 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 350 >/dev/null 2>/dev/null
selfserv with PID 350 found at Wed Nov 28 11:27:01 EST 2012
================= CRL Reloaded =============
ssl.sh: #9516: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 350 >/dev/null 2>/dev/null
selfserv with PID 350 found at Wed Nov 28 11:27:01 EST 2012
ssl.sh: #9517: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 350 >/dev/null 2>/dev/null
selfserv with PID 350 found at Wed Nov 28 11:27:02 EST 2012
ssl.sh: #9518: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 350 >/dev/null 2>/dev/null
selfserv with PID 350 found at Wed Nov 28 11:27:02 EST 2012
ssl.sh: #9519: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 350 >/dev/null 2>/dev/null
selfserv with PID 350 found at Wed Nov 28 11:27:02 EST 2012
ssl.sh: #9520: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 350 >/dev/null 2>/dev/null
selfserv with PID 350 found at Wed Nov 28 11:27:02 EST 2012
ssl.sh: #9521: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 350 >/dev/null 2>/dev/null
selfserv with PID 350 found at Wed Nov 28 11:27:02 EST 2012
ssl.sh: #9522: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 350 >/dev/null 2>/dev/null
selfserv with PID 350 found at Wed Nov 28 11:27:02 EST 2012
ssl.sh: #9523: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 350 >/dev/null 2>/dev/null
selfserv with PID 350 found at Wed Nov 28 11:27:03 EST 2012
ssl.sh: #9524: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 350 >/dev/null 2>/dev/null
selfserv with PID 350 found at Wed Nov 28 11:27:03 EST 2012
ssl.sh: #9525: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 350 >/dev/null 2>/dev/null
selfserv with PID 350 found at Wed Nov 28 11:27:03 EST 2012
ssl.sh: #9526: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 350 >/dev/null 2>/dev/null
selfserv with PID 350 found at Wed Nov 28 11:27:03 EST 2012
ssl.sh: #9527: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 350 >/dev/null 2>/dev/null
selfserv with PID 350 found at Wed Nov 28 11:27:03 EST 2012
ssl.sh: #9528: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 350 >/dev/null 2>/dev/null
selfserv with PID 350 found at Wed Nov 28 11:27:04 EST 2012
ssl.sh: #9529: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/server/root.crl_49-52

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 159 bytes
tstclnt: Writing 159 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 350 >/dev/null 2>/dev/null
selfserv with PID 350 found at Wed Nov 28 11:27:04 EST 2012
================= CRL Reloaded =============
ssl.sh: #9530: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 350 >/dev/null 2>/dev/null
selfserv with PID 350 found at Wed Nov 28 11:27:04 EST 2012
ssl.sh: #9531: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 350 >/dev/null 2>/dev/null
selfserv with PID 350 found at Wed Nov 28 11:27:04 EST 2012
ssl.sh: #9532: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 350 >/dev/null 2>/dev/null
selfserv with PID 350 found at Wed Nov 28 11:27:04 EST 2012
ssl.sh: #9533: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 350 >/dev/null 2>/dev/null
selfserv with PID 350 found at Wed Nov 28 11:27:04 EST 2012
ssl.sh: #9534: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 350 >/dev/null 2>/dev/null
selfserv with PID 350 found at Wed Nov 28 11:27:05 EST 2012
ssl.sh: #9535: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 350 >/dev/null 2>/dev/null
selfserv with PID 350 found at Wed Nov 28 11:27:05 EST 2012
ssl.sh: #9536: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 350 >/dev/null 2>/dev/null
selfserv with PID 350 found at Wed Nov 28 11:27:05 EST 2012
ssl.sh: #9537: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 350 >/dev/null 2>/dev/null
selfserv with PID 350 found at Wed Nov 28 11:27:05 EST 2012
ssl.sh: #9538: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 350 >/dev/null 2>/dev/null
selfserv with PID 350 found at Wed Nov 28 11:27:05 EST 2012
ssl.sh: #9539: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 350 >/dev/null 2>/dev/null
selfserv with PID 350 found at Wed Nov 28 11:27:05 EST 2012
ssl.sh: #9540: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 350 >/dev/null 2>/dev/null
selfserv with PID 350 found at Wed Nov 28 11:27:06 EST 2012
ssl.sh: #9541: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 350 >/dev/null 2>/dev/null
selfserv with PID 350 found at Wed Nov 28 11:27:06 EST 2012
ssl.sh: #9542: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 350 >/dev/null 2>/dev/null
selfserv with PID 350 found at Wed Nov 28 11:27:06 EST 2012
ssl.sh: #9543: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 350 at Wed Nov 28 11:27:06 EST 2012
kill -USR1 350
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 350 killed at Wed Nov 28 11:27:06 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed Nov 28 11:27:06 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:27:06 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 1923 >/dev/null 2>/dev/null
selfserv with PID 1923 found at Wed Nov 28 11:27:06 EST 2012
selfserv with PID 1923 started at Wed Nov 28 11:27:06 EST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1923 >/dev/null 2>/dev/null
selfserv with PID 1923 found at Wed Nov 28 11:27:06 EST 2012
ssl.sh: #9544: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1923 >/dev/null 2>/dev/null
selfserv with PID 1923 found at Wed Nov 28 11:27:07 EST 2012
ssl.sh: #9545: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1923 >/dev/null 2>/dev/null
selfserv with PID 1923 found at Wed Nov 28 11:27:07 EST 2012
ssl.sh: #9546: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1923 >/dev/null 2>/dev/null
selfserv with PID 1923 found at Wed Nov 28 11:27:07 EST 2012
ssl.sh: #9547: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1923 >/dev/null 2>/dev/null
selfserv with PID 1923 found at Wed Nov 28 11:27:07 EST 2012
ssl.sh: #9548: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1923 >/dev/null 2>/dev/null
selfserv with PID 1923 found at Wed Nov 28 11:27:07 EST 2012
ssl.sh: #9549: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1923 >/dev/null 2>/dev/null
selfserv with PID 1923 found at Wed Nov 28 11:27:08 EST 2012
ssl.sh: #9550: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1923 >/dev/null 2>/dev/null
selfserv with PID 1923 found at Wed Nov 28 11:27:08 EST 2012
ssl.sh: #9551: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1923 >/dev/null 2>/dev/null
selfserv with PID 1923 found at Wed Nov 28 11:27:08 EST 2012
ssl.sh: #9552: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1923 >/dev/null 2>/dev/null
selfserv with PID 1923 found at Wed Nov 28 11:27:08 EST 2012
ssl.sh: #9553: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1923 >/dev/null 2>/dev/null
selfserv with PID 1923 found at Wed Nov 28 11:27:08 EST 2012
ssl.sh: #9554: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1923 >/dev/null 2>/dev/null
selfserv with PID 1923 found at Wed Nov 28 11:27:09 EST 2012
ssl.sh: #9555: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1923 >/dev/null 2>/dev/null
selfserv with PID 1923 found at Wed Nov 28 11:27:09 EST 2012
ssl.sh: #9556: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/server/root.crl_43-48-ec

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 162 bytes
tstclnt: Writing 162 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1923 >/dev/null 2>/dev/null
selfserv with PID 1923 found at Wed Nov 28 11:27:09 EST 2012
================= CRL Reloaded =============
ssl.sh: #9557: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1923 >/dev/null 2>/dev/null
selfserv with PID 1923 found at Wed Nov 28 11:27:09 EST 2012
ssl.sh: #9558: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1923 >/dev/null 2>/dev/null
selfserv with PID 1923 found at Wed Nov 28 11:27:10 EST 2012
ssl.sh: #9559: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1923 >/dev/null 2>/dev/null
selfserv with PID 1923 found at Wed Nov 28 11:27:10 EST 2012
ssl.sh: #9560: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1923 >/dev/null 2>/dev/null
selfserv with PID 1923 found at Wed Nov 28 11:27:10 EST 2012
ssl.sh: #9561: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1923 >/dev/null 2>/dev/null
selfserv with PID 1923 found at Wed Nov 28 11:27:10 EST 2012
ssl.sh: #9562: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1923 >/dev/null 2>/dev/null
selfserv with PID 1923 found at Wed Nov 28 11:27:10 EST 2012
ssl.sh: #9563: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1923 >/dev/null 2>/dev/null
selfserv with PID 1923 found at Wed Nov 28 11:27:11 EST 2012
ssl.sh: #9564: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1923 >/dev/null 2>/dev/null
selfserv with PID 1923 found at Wed Nov 28 11:27:11 EST 2012
ssl.sh: #9565: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1923 >/dev/null 2>/dev/null
selfserv with PID 1923 found at Wed Nov 28 11:27:11 EST 2012
ssl.sh: #9566: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1923 >/dev/null 2>/dev/null
selfserv with PID 1923 found at Wed Nov 28 11:27:11 EST 2012
ssl.sh: #9567: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1923 >/dev/null 2>/dev/null
selfserv with PID 1923 found at Wed Nov 28 11:27:11 EST 2012
ssl.sh: #9568: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1923 >/dev/null 2>/dev/null
selfserv with PID 1923 found at Wed Nov 28 11:27:12 EST 2012
ssl.sh: #9569: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1923 >/dev/null 2>/dev/null
selfserv with PID 1923 found at Wed Nov 28 11:27:12 EST 2012
ssl.sh: #9570: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/server/root.crl_49-52-ec

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 162 bytes
tstclnt: Writing 162 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1923 >/dev/null 2>/dev/null
selfserv with PID 1923 found at Wed Nov 28 11:27:12 EST 2012
================= CRL Reloaded =============
ssl.sh: #9571: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1923 >/dev/null 2>/dev/null
selfserv with PID 1923 found at Wed Nov 28 11:27:12 EST 2012
ssl.sh: #9572: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1923 >/dev/null 2>/dev/null
selfserv with PID 1923 found at Wed Nov 28 11:27:12 EST 2012
ssl.sh: #9573: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1923 >/dev/null 2>/dev/null
selfserv with PID 1923 found at Wed Nov 28 11:27:13 EST 2012
ssl.sh: #9574: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1923 >/dev/null 2>/dev/null
selfserv with PID 1923 found at Wed Nov 28 11:27:13 EST 2012
ssl.sh: #9575: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1923 >/dev/null 2>/dev/null
selfserv with PID 1923 found at Wed Nov 28 11:27:13 EST 2012
ssl.sh: #9576: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1923 >/dev/null 2>/dev/null
selfserv with PID 1923 found at Wed Nov 28 11:27:13 EST 2012
ssl.sh: #9577: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1923 >/dev/null 2>/dev/null
selfserv with PID 1923 found at Wed Nov 28 11:27:14 EST 2012
ssl.sh: #9578: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1923 >/dev/null 2>/dev/null
selfserv with PID 1923 found at Wed Nov 28 11:27:14 EST 2012
ssl.sh: #9579: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1923 >/dev/null 2>/dev/null
selfserv with PID 1923 found at Wed Nov 28 11:27:14 EST 2012
ssl.sh: #9580: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1923 >/dev/null 2>/dev/null
selfserv with PID 1923 found at Wed Nov 28 11:27:14 EST 2012
ssl.sh: #9581: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1923 >/dev/null 2>/dev/null
selfserv with PID 1923 found at Wed Nov 28 11:27:14 EST 2012
ssl.sh: #9582: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1923 >/dev/null 2>/dev/null
selfserv with PID 1923 found at Wed Nov 28 11:27:15 EST 2012
ssl.sh: #9583: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1923 >/dev/null 2>/dev/null
selfserv with PID 1923 found at Wed Nov 28 11:27:15 EST 2012
ssl.sh: #9584: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1923 at Wed Nov 28 11:27:15 EST 2012
kill -USR1 1923
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 1923 killed at Wed Nov 28 11:27:15 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:27:15 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:27:15 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 3389 >/dev/null 2>/dev/null
selfserv with PID 3389 found at Wed Nov 28 11:27:15 EST 2012
selfserv with PID 3389 started at Wed Nov 28 11:27:15 EST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3389 >/dev/null 2>/dev/null
selfserv with PID 3389 found at Wed Nov 28 11:27:15 EST 2012
ssl.sh: #9585: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3389 >/dev/null 2>/dev/null
selfserv with PID 3389 found at Wed Nov 28 11:27:15 EST 2012
ssl.sh: #9586: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3389 >/dev/null 2>/dev/null
selfserv with PID 3389 found at Wed Nov 28 11:27:15 EST 2012
ssl.sh: #9587: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3389 >/dev/null 2>/dev/null
selfserv with PID 3389 found at Wed Nov 28 11:27:16 EST 2012
ssl.sh: #9588: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3389 >/dev/null 2>/dev/null
selfserv with PID 3389 found at Wed Nov 28 11:27:16 EST 2012
ssl.sh: #9589: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3389 >/dev/null 2>/dev/null
selfserv with PID 3389 found at Wed Nov 28 11:27:16 EST 2012
ssl.sh: #9590: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3389 >/dev/null 2>/dev/null
selfserv with PID 3389 found at Wed Nov 28 11:27:16 EST 2012
ssl.sh: #9591: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3389 >/dev/null 2>/dev/null
selfserv with PID 3389 found at Wed Nov 28 11:27:17 EST 2012
ssl.sh: #9592: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3389 >/dev/null 2>/dev/null
selfserv with PID 3389 found at Wed Nov 28 11:27:17 EST 2012
ssl.sh: #9593: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3389 >/dev/null 2>/dev/null
selfserv with PID 3389 found at Wed Nov 28 11:27:17 EST 2012
ssl.sh: #9594: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3389 >/dev/null 2>/dev/null
selfserv with PID 3389 found at Wed Nov 28 11:27:17 EST 2012
ssl.sh: #9595: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3389 >/dev/null 2>/dev/null
selfserv with PID 3389 found at Wed Nov 28 11:27:17 EST 2012
ssl.sh: #9596: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3389 >/dev/null 2>/dev/null
selfserv with PID 3389 found at Wed Nov 28 11:27:18 EST 2012
ssl.sh: #9597: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/server/root.crl_43-48-ec

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 162 bytes
tstclnt: Writing 162 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3389 >/dev/null 2>/dev/null
selfserv with PID 3389 found at Wed Nov 28 11:27:18 EST 2012
================= CRL Reloaded =============
ssl.sh: #9598: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3389 >/dev/null 2>/dev/null
selfserv with PID 3389 found at Wed Nov 28 11:27:18 EST 2012
ssl.sh: #9599: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3389 >/dev/null 2>/dev/null
selfserv with PID 3389 found at Wed Nov 28 11:27:18 EST 2012
ssl.sh: #9600: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3389 >/dev/null 2>/dev/null
selfserv with PID 3389 found at Wed Nov 28 11:27:18 EST 2012
ssl.sh: #9601: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3389 >/dev/null 2>/dev/null
selfserv with PID 3389 found at Wed Nov 28 11:27:19 EST 2012
ssl.sh: #9602: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3389 >/dev/null 2>/dev/null
selfserv with PID 3389 found at Wed Nov 28 11:27:19 EST 2012
ssl.sh: #9603: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3389 >/dev/null 2>/dev/null
selfserv with PID 3389 found at Wed Nov 28 11:27:19 EST 2012
ssl.sh: #9604: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3389 >/dev/null 2>/dev/null
selfserv with PID 3389 found at Wed Nov 28 11:27:19 EST 2012
ssl.sh: #9605: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3389 >/dev/null 2>/dev/null
selfserv with PID 3389 found at Wed Nov 28 11:27:19 EST 2012
ssl.sh: #9606: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3389 >/dev/null 2>/dev/null
selfserv with PID 3389 found at Wed Nov 28 11:27:20 EST 2012
ssl.sh: #9607: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3389 >/dev/null 2>/dev/null
selfserv with PID 3389 found at Wed Nov 28 11:27:20 EST 2012
ssl.sh: #9608: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3389 >/dev/null 2>/dev/null
selfserv with PID 3389 found at Wed Nov 28 11:27:20 EST 2012
ssl.sh: #9609: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3389 >/dev/null 2>/dev/null
selfserv with PID 3389 found at Wed Nov 28 11:27:20 EST 2012
ssl.sh: #9610: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3389 >/dev/null 2>/dev/null
selfserv with PID 3389 found at Wed Nov 28 11:27:20 EST 2012
ssl.sh: #9611: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/server/root.crl_49-52-ec

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 162 bytes
tstclnt: Writing 162 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3389 >/dev/null 2>/dev/null
selfserv with PID 3389 found at Wed Nov 28 11:27:21 EST 2012
================= CRL Reloaded =============
ssl.sh: #9612: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3389 >/dev/null 2>/dev/null
selfserv with PID 3389 found at Wed Nov 28 11:27:21 EST 2012
ssl.sh: #9613: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3389 >/dev/null 2>/dev/null
selfserv with PID 3389 found at Wed Nov 28 11:27:21 EST 2012
ssl.sh: #9614: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3389 >/dev/null 2>/dev/null
selfserv with PID 3389 found at Wed Nov 28 11:27:21 EST 2012
ssl.sh: #9615: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3389 >/dev/null 2>/dev/null
selfserv with PID 3389 found at Wed Nov 28 11:27:21 EST 2012
ssl.sh: #9616: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3389 >/dev/null 2>/dev/null
selfserv with PID 3389 found at Wed Nov 28 11:27:22 EST 2012
ssl.sh: #9617: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3389 >/dev/null 2>/dev/null
selfserv with PID 3389 found at Wed Nov 28 11:27:22 EST 2012
ssl.sh: #9618: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3389 >/dev/null 2>/dev/null
selfserv with PID 3389 found at Wed Nov 28 11:27:22 EST 2012
ssl.sh: #9619: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3389 >/dev/null 2>/dev/null
selfserv with PID 3389 found at Wed Nov 28 11:27:22 EST 2012
ssl.sh: #9620: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3389 >/dev/null 2>/dev/null
selfserv with PID 3389 found at Wed Nov 28 11:27:22 EST 2012
ssl.sh: #9621: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3389 >/dev/null 2>/dev/null
selfserv with PID 3389 found at Wed Nov 28 11:27:23 EST 2012
ssl.sh: #9622: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3389 >/dev/null 2>/dev/null
selfserv with PID 3389 found at Wed Nov 28 11:27:23 EST 2012
ssl.sh: #9623: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3389 >/dev/null 2>/dev/null
selfserv with PID 3389 found at Wed Nov 28 11:27:23 EST 2012
ssl.sh: #9624: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3389 >/dev/null 2>/dev/null
selfserv with PID 3389 found at Wed Nov 28 11:27:23 EST 2012
ssl.sh: #9625: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3389 at Wed Nov 28 11:27:23 EST 2012
kill -USR1 3389
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 3389 killed at Wed Nov 28 11:27:23 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:27:23 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:27:23 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 4852 >/dev/null 2>/dev/null
selfserv with PID 4852 found at Wed Nov 28 11:27:23 EST 2012
selfserv with PID 4852 started at Wed Nov 28 11:27:23 EST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4852 >/dev/null 2>/dev/null
selfserv with PID 4852 found at Wed Nov 28 11:27:24 EST 2012
ssl.sh: #9626: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4852 >/dev/null 2>/dev/null
selfserv with PID 4852 found at Wed Nov 28 11:27:24 EST 2012
ssl.sh: #9627: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4852 >/dev/null 2>/dev/null
selfserv with PID 4852 found at Wed Nov 28 11:27:24 EST 2012
ssl.sh: #9628: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4852 >/dev/null 2>/dev/null
selfserv with PID 4852 found at Wed Nov 28 11:27:24 EST 2012
ssl.sh: #9629: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4852 >/dev/null 2>/dev/null
selfserv with PID 4852 found at Wed Nov 28 11:27:24 EST 2012
ssl.sh: #9630: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4852 >/dev/null 2>/dev/null
selfserv with PID 4852 found at Wed Nov 28 11:27:25 EST 2012
ssl.sh: #9631: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4852 >/dev/null 2>/dev/null
selfserv with PID 4852 found at Wed Nov 28 11:27:25 EST 2012
ssl.sh: #9632: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4852 >/dev/null 2>/dev/null
selfserv with PID 4852 found at Wed Nov 28 11:27:25 EST 2012
ssl.sh: #9633: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4852 >/dev/null 2>/dev/null
selfserv with PID 4852 found at Wed Nov 28 11:27:25 EST 2012
ssl.sh: #9634: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4852 >/dev/null 2>/dev/null
selfserv with PID 4852 found at Wed Nov 28 11:27:25 EST 2012
ssl.sh: #9635: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4852 >/dev/null 2>/dev/null
selfserv with PID 4852 found at Wed Nov 28 11:27:26 EST 2012
ssl.sh: #9636: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4852 >/dev/null 2>/dev/null
selfserv with PID 4852 found at Wed Nov 28 11:27:26 EST 2012
ssl.sh: #9637: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4852 >/dev/null 2>/dev/null
selfserv with PID 4852 found at Wed Nov 28 11:27:26 EST 2012
ssl.sh: #9638: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/server/root.crl_43-48-ec

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 162 bytes
tstclnt: Writing 162 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4852 >/dev/null 2>/dev/null
selfserv with PID 4852 found at Wed Nov 28 11:27:26 EST 2012
================= CRL Reloaded =============
ssl.sh: #9639: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4852 >/dev/null 2>/dev/null
selfserv with PID 4852 found at Wed Nov 28 11:27:27 EST 2012
ssl.sh: #9640: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4852 >/dev/null 2>/dev/null
selfserv with PID 4852 found at Wed Nov 28 11:27:27 EST 2012
ssl.sh: #9641: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4852 >/dev/null 2>/dev/null
selfserv with PID 4852 found at Wed Nov 28 11:27:27 EST 2012
ssl.sh: #9642: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4852 >/dev/null 2>/dev/null
selfserv with PID 4852 found at Wed Nov 28 11:27:27 EST 2012
ssl.sh: #9643: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4852 >/dev/null 2>/dev/null
selfserv with PID 4852 found at Wed Nov 28 11:27:27 EST 2012
ssl.sh: #9644: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4852 >/dev/null 2>/dev/null
selfserv with PID 4852 found at Wed Nov 28 11:27:28 EST 2012
ssl.sh: #9645: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4852 >/dev/null 2>/dev/null
selfserv with PID 4852 found at Wed Nov 28 11:27:28 EST 2012
ssl.sh: #9646: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4852 >/dev/null 2>/dev/null
selfserv with PID 4852 found at Wed Nov 28 11:27:28 EST 2012
ssl.sh: #9647: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4852 >/dev/null 2>/dev/null
selfserv with PID 4852 found at Wed Nov 28 11:27:28 EST 2012
ssl.sh: #9648: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4852 >/dev/null 2>/dev/null
selfserv with PID 4852 found at Wed Nov 28 11:27:28 EST 2012
ssl.sh: #9649: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4852 >/dev/null 2>/dev/null
selfserv with PID 4852 found at Wed Nov 28 11:27:29 EST 2012
ssl.sh: #9650: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4852 >/dev/null 2>/dev/null
selfserv with PID 4852 found at Wed Nov 28 11:27:29 EST 2012
ssl.sh: #9651: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4852 >/dev/null 2>/dev/null
selfserv with PID 4852 found at Wed Nov 28 11:27:29 EST 2012
ssl.sh: #9652: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/server/root.crl_49-52-ec

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 162 bytes
tstclnt: Writing 162 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4852 >/dev/null 2>/dev/null
selfserv with PID 4852 found at Wed Nov 28 11:27:29 EST 2012
================= CRL Reloaded =============
ssl.sh: #9653: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4852 >/dev/null 2>/dev/null
selfserv with PID 4852 found at Wed Nov 28 11:27:29 EST 2012
ssl.sh: #9654: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4852 >/dev/null 2>/dev/null
selfserv with PID 4852 found at Wed Nov 28 11:27:30 EST 2012
ssl.sh: #9655: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4852 >/dev/null 2>/dev/null
selfserv with PID 4852 found at Wed Nov 28 11:27:30 EST 2012
ssl.sh: #9656: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4852 >/dev/null 2>/dev/null
selfserv with PID 4852 found at Wed Nov 28 11:27:30 EST 2012
ssl.sh: #9657: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4852 >/dev/null 2>/dev/null
selfserv with PID 4852 found at Wed Nov 28 11:27:30 EST 2012
ssl.sh: #9658: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4852 >/dev/null 2>/dev/null
selfserv with PID 4852 found at Wed Nov 28 11:27:30 EST 2012
ssl.sh: #9659: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4852 >/dev/null 2>/dev/null
selfserv with PID 4852 found at Wed Nov 28 11:27:31 EST 2012
ssl.sh: #9660: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4852 >/dev/null 2>/dev/null
selfserv with PID 4852 found at Wed Nov 28 11:27:31 EST 2012
ssl.sh: #9661: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4852 >/dev/null 2>/dev/null
selfserv with PID 4852 found at Wed Nov 28 11:27:31 EST 2012
ssl.sh: #9662: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4852 >/dev/null 2>/dev/null
selfserv with PID 4852 found at Wed Nov 28 11:27:31 EST 2012
ssl.sh: #9663: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4852 >/dev/null 2>/dev/null
selfserv with PID 4852 found at Wed Nov 28 11:27:31 EST 2012
ssl.sh: #9664: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4852 >/dev/null 2>/dev/null
selfserv with PID 4852 found at Wed Nov 28 11:27:31 EST 2012
ssl.sh: #9665: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4852 >/dev/null 2>/dev/null
selfserv with PID 4852 found at Wed Nov 28 11:27:32 EST 2012
ssl.sh: #9666: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 4852 at Wed Nov 28 11:27:32 EST 2012
kill -USR1 4852
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 4852 killed at Wed Nov 28 11:27:32 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed Nov 28 11:27:32 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:27:32 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 6317 >/dev/null 2>/dev/null
selfserv with PID 6317 found at Wed Nov 28 11:27:32 EST 2012
selfserv with PID 6317 started at Wed Nov 28 11:27:32 EST 2012
trying to kill selfserv with PID 6317 at Wed Nov 28 11:27:32 EST 2012
kill -USR1 6317
./ssl.sh: line 173:  6317 User defined signal 1   ${PROFTOOL} ${BINDIR}/selfserv -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 6317 killed at Wed Nov 28 11:27:32 EST 2012
ssl.sh: SSL Stress Test  - server bypass/client bypass  - with ECC ===============================
ssl.sh: Stress SSL2 RC4 128 with MD5 ----
selfserv starting at Wed Nov 28 11:27:32 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:27:32 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 6440 >/dev/null 2>/dev/null
selfserv with PID 6440 found at Wed Nov 28 11:27:32 EST 2012
selfserv with PID 6440 started at Wed Nov 28 11:27:32 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 1000 -C A \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:27:32 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: SSL2 - 1 server certificates tested.
strsclnt completed at Wed Nov 28 11:27:32 EST 2012
ssl.sh: #9667: Stress SSL2 RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 6440 at Wed Nov 28 11:27:32 EST 2012
kill -USR1 6440
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 6440 killed at Wed Nov 28 11:27:32 EST 2012
ssl.sh: Stress SSL3 RC4 128 with MD5 ----
selfserv starting at Wed Nov 28 11:27:32 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:27:32 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 6518 >/dev/null 2>/dev/null
selfserv with PID 6518 found at Wed Nov 28 11:27:32 EST 2012
selfserv with PID 6518 started at Wed Nov 28 11:27:32 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 1000 -C c -V :ssl3 \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:27:32 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:27:33 EST 2012
ssl.sh: #9668: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 6518 at Wed Nov 28 11:27:33 EST 2012
kill -USR1 6518
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 6518 killed at Wed Nov 28 11:27:33 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 ----
selfserv starting at Wed Nov 28 11:27:33 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:27:33 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 6596 >/dev/null 2>/dev/null
selfserv with PID 6596 found at Wed Nov 28 11:27:33 EST 2012
selfserv with PID 6596 started at Wed Nov 28 11:27:33 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 1000 -C c \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:27:33 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:27:33 EST 2012
ssl.sh: #9669: Stress TLS  RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 6596 at Wed Nov 28 11:27:33 EST 2012
kill -USR1 6596
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 6596 killed at Wed Nov 28 11:27:33 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (false start) ----
selfserv starting at Wed Nov 28 11:27:33 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:27:33 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 6674 >/dev/null 2>/dev/null
selfserv with PID 6674 found at Wed Nov 28 11:27:33 EST 2012
selfserv with PID 6674 started at Wed Nov 28 11:27:33 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 1000 -C c -g \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:27:33 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:27:34 EST 2012
ssl.sh: #9670: Stress TLS  RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 6674 at Wed Nov 28 11:27:34 EST 2012
kill -USR1 6674
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 6674 killed at Wed Nov 28 11:27:34 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket) ----
selfserv starting at Wed Nov 28 11:27:34 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:27:34 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 6752 >/dev/null 2>/dev/null
selfserv with PID 6752 found at Wed Nov 28 11:27:34 EST 2012
selfserv with PID 6752 started at Wed Nov 28 11:27:34 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:27:34 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Wed Nov 28 11:27:34 EST 2012
ssl.sh: #9671: Stress TLS  RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 6752 at Wed Nov 28 11:27:34 EST 2012
kill -USR1 6752
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 6752 killed at Wed Nov 28 11:27:34 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (compression) ----
selfserv starting at Wed Nov 28 11:27:34 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:27:34 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 6830 >/dev/null 2>/dev/null
selfserv with PID 6830 found at Wed Nov 28 11:27:34 EST 2012
selfserv with PID 6830 started at Wed Nov 28 11:27:34 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -z \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:27:34 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:27:35 EST 2012
ssl.sh: #9672: Stress TLS  RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 6830 at Wed Nov 28 11:27:35 EST 2012
kill -USR1 6830
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 6830 killed at Wed Nov 28 11:27:35 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression) ----
selfserv starting at Wed Nov 28 11:27:35 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:27:35 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 6908 >/dev/null 2>/dev/null
selfserv with PID 6908 found at Wed Nov 28 11:27:35 EST 2012
selfserv with PID 6908 started at Wed Nov 28 11:27:35 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u -z \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:27:35 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Wed Nov 28 11:27:35 EST 2012
ssl.sh: #9673: Stress TLS  RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 6908 at Wed Nov 28 11:27:35 EST 2012
kill -USR1 6908
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 6908 killed at Wed Nov 28 11:27:35 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) ----
selfserv starting at Wed Nov 28 11:27:35 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:27:35 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 6986 >/dev/null 2>/dev/null
selfserv with PID 6986 found at Wed Nov 28 11:27:35 EST 2012
selfserv with PID 6986 started at Wed Nov 28 11:27:35 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:27:35 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Wed Nov 28 11:27:36 EST 2012
ssl.sh: #9674: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 6986 at Wed Nov 28 11:27:36 EST 2012
kill -USR1 6986
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 6986 killed at Wed Nov 28 11:27:36 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI) ----
selfserv starting at Wed Nov 28 11:27:36 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:27:36 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 7070 >/dev/null 2>/dev/null
selfserv with PID 7070 found at Wed Nov 28 11:27:36 EST 2012
selfserv with PID 7070 started at Wed Nov 28 11:27:36 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:27:36 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Wed Nov 28 11:27:36 EST 2012
ssl.sh: #9675: Stress TLS RC4 128 with MD5 (session ticket, SNI) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 7070 at Wed Nov 28 11:27:36 EST 2012
kill -USR1 7070
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 7070 killed at Wed Nov 28 11:27:36 EST 2012
ssl.sh: Stress SSL2 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Wed Nov 28 11:27:36 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:27:36 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 7169 >/dev/null 2>/dev/null
selfserv with PID 7169 found at Wed Nov 28 11:27:36 EST 2012
selfserv with PID 7169 started at Wed Nov 28 11:27:36 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 100 -C A -N -n TestUser \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:27:36 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: SSL2 - 100 server certificates tested.
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed Nov 28 11:27:37 EST 2012
ssl.sh: #9676: Stress SSL2 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 7169 at Wed Nov 28 11:27:37 EST 2012
kill -USR1 7169
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 7169 killed at Wed Nov 28 11:27:37 EST 2012
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Wed Nov 28 11:27:37 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:27:37 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 7246 >/dev/null 2>/dev/null
selfserv with PID 7246 found at Wed Nov 28 11:27:37 EST 2012
selfserv with PID 7246 started at Wed Nov 28 11:27:37 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 100 -C c -V :ssl3 -N -n TestUser \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:27:37 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed Nov 28 11:27:38 EST 2012
ssl.sh: #9677: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 7246 at Wed Nov 28 11:27:38 EST 2012
kill -USR1 7246
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 7246 killed at Wed Nov 28 11:27:38 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Wed Nov 28 11:27:38 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:27:38 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 7323 >/dev/null 2>/dev/null
selfserv with PID 7323 found at Wed Nov 28 11:27:38 EST 2012
selfserv with PID 7323 started at Wed Nov 28 11:27:38 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 100 -C c -N -n TestUser \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:27:38 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed Nov 28 11:27:39 EST 2012
ssl.sh: #9678: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 7323 at Wed Nov 28 11:27:39 EST 2012
kill -USR1 7323
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 7323 killed at Wed Nov 28 11:27:39 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Wed Nov 28 11:27:39 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:27:39 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 7400 >/dev/null 2>/dev/null
selfserv with PID 7400 found at Wed Nov 28 11:27:39 EST 2012
selfserv with PID 7400 started at Wed Nov 28 11:27:39 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:27:39 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Wed Nov 28 11:27:39 EST 2012
ssl.sh: #9679: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 7400 at Wed Nov 28 11:27:39 EST 2012
kill -USR1 7400
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 7400 killed at Wed Nov 28 11:27:39 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Wed Nov 28 11:27:39 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:27:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 7478 >/dev/null 2>/dev/null
selfserv with PID 7478 found at Wed Nov 28 11:27:40 EST 2012
selfserv with PID 7478 started at Wed Nov 28 11:27:40 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -z \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:27:40 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:27:40 EST 2012
ssl.sh: #9680: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 7478 at Wed Nov 28 11:27:40 EST 2012
kill -USR1 7478
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 7478 killed at Wed Nov 28 11:27:40 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Wed Nov 28 11:27:40 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:27:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 7556 >/dev/null 2>/dev/null
selfserv with PID 7556 found at Wed Nov 28 11:27:40 EST 2012
selfserv with PID 7556 started at Wed Nov 28 11:27:40 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:27:40 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:27:40 EST 2012
ssl.sh: #9681: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 7556 at Wed Nov 28 11:27:40 EST 2012
kill -USR1 7556
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 7556 killed at Wed Nov 28 11:27:40 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Wed Nov 28 11:27:40 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:27:40 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 7634 >/dev/null 2>/dev/null
selfserv with PID 7634 found at Wed Nov 28 11:27:40 EST 2012
selfserv with PID 7634 started at Wed Nov 28 11:27:40 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u -z \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:27:40 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Wed Nov 28 11:27:41 EST 2012
ssl.sh: #9682: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 7634 at Wed Nov 28 11:27:41 EST 2012
kill -USR1 7634
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 7634 killed at Wed Nov 28 11:27:41 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Wed Nov 28 11:27:41 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:27:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 7712 >/dev/null 2>/dev/null
selfserv with PID 7712 found at Wed Nov 28 11:27:41 EST 2012
selfserv with PID 7712 started at Wed Nov 28 11:27:41 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:27:41 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Wed Nov 28 11:27:41 EST 2012
ssl.sh: #9683: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 7712 at Wed Nov 28 11:27:41 EST 2012
kill -USR1 7712
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 7712 killed at Wed Nov 28 11:27:41 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ----
selfserv starting at Wed Nov 28 11:27:41 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:27:41 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 7796 >/dev/null 2>/dev/null
selfserv with PID 7796 found at Wed Nov 28 11:27:41 EST 2012
selfserv with PID 7796 started at Wed Nov 28 11:27:41 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:27:41 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Wed Nov 28 11:27:42 EST 2012
ssl.sh: #9684: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 7796 at Wed Nov 28 11:27:42 EST 2012
kill -USR1 7796
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 7796 killed at Wed Nov 28 11:27:42 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ----
selfserv starting at Wed Nov 28 11:27:42 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -a buildnss02-sni.usersys.redhat.com -k buildnss02-sni.usersys.redhat.com -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:27:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 7880 >/dev/null 2>/dev/null
selfserv with PID 7880 found at Wed Nov 28 11:27:42 EST 2012
selfserv with PID 7880 started at Wed Nov 28 11:27:42 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u -a buildnss02-sni.usersys.redhat.com \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:27:42 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Wed Nov 28 11:27:42 EST 2012
ssl.sh: #9685: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 7880 at Wed Nov 28 11:27:42 EST 2012
kill -USR1 7880
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 7880 killed at Wed Nov 28 11:27:42 EST 2012
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Wed Nov 28 11:27:42 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C009 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:27:42 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 7979 >/dev/null 2>/dev/null
selfserv with PID 7979 found at Wed Nov 28 11:27:42 EST 2012
selfserv with PID 7979 started at Wed Nov 28 11:27:42 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 100 -C :C009 -N -V :ssl3 \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:27:42 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed Nov 28 11:27:43 EST 2012
ssl.sh: #9686: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 7979 at Wed Nov 28 11:27:43 EST 2012
kill -USR1 7979
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 7979 killed at Wed Nov 28 11:27:43 EST 2012
ssl.sh: Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Wed Nov 28 11:27:43 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C013 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:27:43 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 8056 >/dev/null 2>/dev/null
selfserv with PID 8056 found at Wed Nov 28 11:27:43 EST 2012
selfserv with PID 8056 started at Wed Nov 28 11:27:43 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 1000 -C :C013 -V :ssl3 \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:27:43 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:27:44 EST 2012
ssl.sh: #9687: Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 8056 at Wed Nov 28 11:27:44 EST 2012
kill -USR1 8056
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 8056 killed at Wed Nov 28 11:27:44 EST 2012
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) ----
selfserv starting at Wed Nov 28 11:27:44 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C004 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:27:44 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 8134 >/dev/null 2>/dev/null
selfserv with PID 8134 found at Wed Nov 28 11:27:44 EST 2012
selfserv with PID 8134 started at Wed Nov 28 11:27:44 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C004 -N \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:27:44 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed Nov 28 11:27:45 EST 2012
ssl.sh: #9688: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 8134 at Wed Nov 28 11:27:45 EST 2012
kill -USR1 8134
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 8134 killed at Wed Nov 28 11:27:45 EST 2012
ssl.sh: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) ----
selfserv starting at Wed Nov 28 11:27:45 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c :C00E -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:27:45 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 8211 >/dev/null 2>/dev/null
selfserv with PID 8211 found at Wed Nov 28 11:27:45 EST 2012
selfserv with PID 8211 started at Wed Nov 28 11:27:45 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C00E -N \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:27:45 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed Nov 28 11:27:46 EST 2012
ssl.sh: #9689: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 8211 at Wed Nov 28 11:27:46 EST 2012
kill -USR1 8211
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 8211 killed at Wed Nov 28 11:27:46 EST 2012
ssl.sh: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Wed Nov 28 11:27:46 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C013 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:27:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 8288 >/dev/null 2>/dev/null
selfserv with PID 8288 found at Wed Nov 28 11:27:46 EST 2012
selfserv with PID 8288 started at Wed Nov 28 11:27:46 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :C013 \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:27:46 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:27:46 EST 2012
ssl.sh: #9690: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 8288 at Wed Nov 28 11:27:46 EST 2012
kill -USR1 8288
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 8288 killed at Wed Nov 28 11:27:46 EST 2012
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) ----
selfserv starting at Wed Nov 28 11:27:46 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C004 -u -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:27:46 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 8366 >/dev/null 2>/dev/null
selfserv with PID 8366 found at Wed Nov 28 11:27:46 EST 2012
selfserv with PID 8366 started at Wed Nov 28 11:27:46 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :C004 -u \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:27:46 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Wed Nov 28 11:27:47 EST 2012
ssl.sh: #9691: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 8366 at Wed Nov 28 11:27:47 EST 2012
kill -USR1 8366
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 8366 killed at Wed Nov 28 11:27:47 EST 2012
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Wed Nov 28 11:27:47 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C009 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:27:47 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 8465 >/dev/null 2>/dev/null
selfserv with PID 8465 found at Wed Nov 28 11:27:47 EST 2012
selfserv with PID 8465 started at Wed Nov 28 11:27:47 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 10 -C :C009 -N -V :ssl3 -n TestUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:27:47 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Wed Nov 28 11:27:47 EST 2012
ssl.sh: #9692: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 8465 at Wed Nov 28 11:27:47 EST 2012
kill -USR1 8465
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 8465 killed at Wed Nov 28 11:27:47 EST 2012
ssl.sh: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) ----
selfserv starting at Wed Nov 28 11:27:48 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:27:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 8543 >/dev/null 2>/dev/null
selfserv with PID 8543 found at Wed Nov 28 11:27:48 EST 2012
selfserv with PID 8543 started at Wed Nov 28 11:27:48 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 100 -C :C013 -V :ssl3 -n TestUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:27:48 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:27:48 EST 2012
ssl.sh: #9693: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 8543 at Wed Nov 28 11:27:48 EST 2012
kill -USR1 8543
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 8543 killed at Wed Nov 28 11:27:48 EST 2012
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Wed Nov 28 11:27:48 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C004 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:27:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 8621 >/dev/null 2>/dev/null
selfserv with PID 8621 found at Wed Nov 28 11:27:48 EST 2012
selfserv with PID 8621 started at Wed Nov 28 11:27:48 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 10 -C :C004 -N -n TestUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:27:48 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Wed Nov 28 11:27:48 EST 2012
ssl.sh: #9694: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 8621 at Wed Nov 28 11:27:48 EST 2012
kill -USR1 8621
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 8621 killed at Wed Nov 28 11:27:48 EST 2012
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Wed Nov 28 11:27:48 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -r -r -c :C00E -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:27:48 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 8698 >/dev/null 2>/dev/null
selfserv with PID 8698 found at Wed Nov 28 11:27:48 EST 2012
selfserv with PID 8698 started at Wed Nov 28 11:27:48 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 10 -C :C00E -N -n TestUser-ecmixed \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:27:48 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Wed Nov 28 11:27:49 EST 2012
ssl.sh: #9695: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 8698 at Wed Nov 28 11:27:49 EST 2012
kill -USR1 8698
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 8698 killed at Wed Nov 28 11:27:49 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ----
selfserv starting at Wed Nov 28 11:27:49 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:27:49 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 8775 >/dev/null 2>/dev/null
selfserv with PID 8775 found at Wed Nov 28 11:27:49 EST 2012
selfserv with PID 8775 started at Wed Nov 28 11:27:49 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -c 100 -C :C013 -n TestUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:27:49 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:27:49 EST 2012
ssl.sh: #9696: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 8775 at Wed Nov 28 11:27:49 EST 2012
kill -USR1 8775
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 8775 killed at Wed Nov 28 11:27:49 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ----
selfserv starting at Wed Nov 28 11:27:49 EST 2012
selfserv -D -p 8546 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -u -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:27:49 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 8853 >/dev/null 2>/dev/null
selfserv with PID 8853 found at Wed Nov 28 11:27:49 EST 2012
selfserv with PID 8853 started at Wed Nov 28 11:27:49 EST 2012
strsclnt -q -p 8546 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec -u \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:27:49 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Wed Nov 28 11:27:50 EST 2012
ssl.sh: #9697: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 8853 at Wed Nov 28 11:27:50 EST 2012
kill -USR1 8853
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 8853 killed at Wed Nov 28 11:27:50 EST 2012
ssl.sh: SSL Stress Test Extended Test - server bypass/client bypass  - with ECC ===============================
ssl.sh: skipping  Stress SSL2 RC4 128 with MD5 for Extended Test
ssl.sh: Stress SSL3 RC4 128 with MD5 ----
selfserv starting at Wed Nov 28 11:27:50 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:27:50 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 9006 >/dev/null 2>/dev/null
selfserv with PID 9006 found at Wed Nov 28 11:27:50 EST 2012
selfserv with PID 9006 started at Wed Nov 28 11:27:50 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 1000 -C c -V :ssl3 \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:27:50 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:27:50 EST 2012
ssl.sh: #9698: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 9006 at Wed Nov 28 11:27:50 EST 2012
kill -USR1 9006
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 9006 killed at Wed Nov 28 11:27:50 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 ----
selfserv starting at Wed Nov 28 11:27:50 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:27:50 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 9084 >/dev/null 2>/dev/null
selfserv with PID 9084 found at Wed Nov 28 11:27:50 EST 2012
selfserv with PID 9084 started at Wed Nov 28 11:27:50 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 1000 -C c \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:27:50 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:27:51 EST 2012
ssl.sh: #9699: Stress TLS  RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 9084 at Wed Nov 28 11:27:51 EST 2012
kill -USR1 9084
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 9084 killed at Wed Nov 28 11:27:51 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (false start) ----
selfserv starting at Wed Nov 28 11:27:51 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:27:51 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 9162 >/dev/null 2>/dev/null
selfserv with PID 9162 found at Wed Nov 28 11:27:51 EST 2012
selfserv with PID 9162 started at Wed Nov 28 11:27:51 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 1000 -C c -g \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:27:51 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:27:51 EST 2012
ssl.sh: #9700: Stress TLS  RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 9162 at Wed Nov 28 11:27:51 EST 2012
kill -USR1 9162
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 9162 killed at Wed Nov 28 11:27:51 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket) ----
selfserv starting at Wed Nov 28 11:27:51 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:27:51 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 9240 >/dev/null 2>/dev/null
selfserv with PID 9240 found at Wed Nov 28 11:27:51 EST 2012
selfserv with PID 9240 started at Wed Nov 28 11:27:51 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:27:51 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Wed Nov 28 11:27:52 EST 2012
ssl.sh: #9701: Stress TLS  RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 9240 at Wed Nov 28 11:27:52 EST 2012
kill -USR1 9240
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 9240 killed at Wed Nov 28 11:27:52 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (compression) ----
selfserv starting at Wed Nov 28 11:27:52 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:27:52 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 9318 >/dev/null 2>/dev/null
selfserv with PID 9318 found at Wed Nov 28 11:27:52 EST 2012
selfserv with PID 9318 started at Wed Nov 28 11:27:52 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -z \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:27:52 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:27:52 EST 2012
ssl.sh: #9702: Stress TLS  RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 9318 at Wed Nov 28 11:27:52 EST 2012
kill -USR1 9318
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 9318 killed at Wed Nov 28 11:27:52 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression) ----
selfserv starting at Wed Nov 28 11:27:52 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:27:52 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 9396 >/dev/null 2>/dev/null
selfserv with PID 9396 found at Wed Nov 28 11:27:52 EST 2012
selfserv with PID 9396 started at Wed Nov 28 11:27:52 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u -z \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:27:52 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Wed Nov 28 11:27:53 EST 2012
ssl.sh: #9703: Stress TLS  RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 9396 at Wed Nov 28 11:27:53 EST 2012
kill -USR1 9396
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 9396 killed at Wed Nov 28 11:27:53 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) ----
selfserv starting at Wed Nov 28 11:27:53 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:27:53 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 9474 >/dev/null 2>/dev/null
selfserv with PID 9474 found at Wed Nov 28 11:27:53 EST 2012
selfserv with PID 9474 started at Wed Nov 28 11:27:53 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:27:53 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Wed Nov 28 11:27:53 EST 2012
ssl.sh: #9704: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 9474 at Wed Nov 28 11:27:53 EST 2012
kill -USR1 9474
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 9474 killed at Wed Nov 28 11:27:53 EST 2012
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test
ssl.sh: skipping  Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Wed Nov 28 11:27:54 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:27:54 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 9581 >/dev/null 2>/dev/null
selfserv with PID 9581 found at Wed Nov 28 11:27:54 EST 2012
selfserv with PID 9581 started at Wed Nov 28 11:27:54 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 100 -C c -V :ssl3 -N -n ExtendedSSLUser \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:27:54 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed Nov 28 11:27:55 EST 2012
ssl.sh: #9705: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 9581 at Wed Nov 28 11:27:55 EST 2012
kill -USR1 9581
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 9581 killed at Wed Nov 28 11:27:55 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Wed Nov 28 11:27:55 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:27:55 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 9658 >/dev/null 2>/dev/null
selfserv with PID 9658 found at Wed Nov 28 11:27:55 EST 2012
selfserv with PID 9658 started at Wed Nov 28 11:27:55 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 100 -C c -N -n ExtendedSSLUser \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:27:55 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed Nov 28 11:27:56 EST 2012
ssl.sh: #9706: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 9658 at Wed Nov 28 11:27:56 EST 2012
kill -USR1 9658
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 9658 killed at Wed Nov 28 11:27:56 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Wed Nov 28 11:27:56 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:27:56 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 9735 >/dev/null 2>/dev/null
selfserv with PID 9735 found at Wed Nov 28 11:27:56 EST 2012
selfserv with PID 9735 started at Wed Nov 28 11:27:56 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:27:56 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Wed Nov 28 11:27:56 EST 2012
ssl.sh: #9707: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 9735 at Wed Nov 28 11:27:56 EST 2012
kill -USR1 9735
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 9735 killed at Wed Nov 28 11:27:56 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Wed Nov 28 11:27:56 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:27:56 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 9813 >/dev/null 2>/dev/null
selfserv with PID 9813 found at Wed Nov 28 11:27:56 EST 2012
selfserv with PID 9813 started at Wed Nov 28 11:27:56 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:27:56 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:27:57 EST 2012
ssl.sh: #9708: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 9813 at Wed Nov 28 11:27:57 EST 2012
kill -USR1 9813
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 9813 killed at Wed Nov 28 11:27:57 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Wed Nov 28 11:27:57 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:27:57 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 9891 >/dev/null 2>/dev/null
selfserv with PID 9891 found at Wed Nov 28 11:27:57 EST 2012
selfserv with PID 9891 started at Wed Nov 28 11:27:57 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:27:57 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:27:57 EST 2012
ssl.sh: #9709: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 9891 at Wed Nov 28 11:27:57 EST 2012
kill -USR1 9891
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 9891 killed at Wed Nov 28 11:27:57 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Wed Nov 28 11:27:57 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:27:57 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 9969 >/dev/null 2>/dev/null
selfserv with PID 9969 found at Wed Nov 28 11:27:57 EST 2012
selfserv with PID 9969 started at Wed Nov 28 11:27:57 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:27:57 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Wed Nov 28 11:27:57 EST 2012
ssl.sh: #9710: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 9969 at Wed Nov 28 11:27:58 EST 2012
kill -USR1 9969
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 9969 killed at Wed Nov 28 11:27:58 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Wed Nov 28 11:27:58 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -z -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:27:58 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 10047 >/dev/null 2>/dev/null
selfserv with PID 10047 found at Wed Nov 28 11:27:58 EST 2012
selfserv with PID 10047 started at Wed Nov 28 11:27:58 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:27:58 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Wed Nov 28 11:27:58 EST 2012
ssl.sh: #9711: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 10047 at Wed Nov 28 11:27:58 EST 2012
kill -USR1 10047
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 10047 killed at Wed Nov 28 11:27:58 EST 2012
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Wed Nov 28 11:27:58 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C009 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:27:58 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 10154 >/dev/null 2>/dev/null
selfserv with PID 10154 found at Wed Nov 28 11:27:58 EST 2012
selfserv with PID 10154 started at Wed Nov 28 11:27:58 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 100 -C :C009 -N -V :ssl3 \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:27:58 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed Nov 28 11:27:59 EST 2012
ssl.sh: #9712: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 10154 at Wed Nov 28 11:27:59 EST 2012
kill -USR1 10154
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 10154 killed at Wed Nov 28 11:27:59 EST 2012
ssl.sh: Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Wed Nov 28 11:27:59 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C013 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:27:59 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 10231 >/dev/null 2>/dev/null
selfserv with PID 10231 found at Wed Nov 28 11:27:59 EST 2012
selfserv with PID 10231 started at Wed Nov 28 11:27:59 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 1000 -C :C013 -V :ssl3 \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:27:59 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:28:00 EST 2012
ssl.sh: #9713: Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 10231 at Wed Nov 28 11:28:00 EST 2012
kill -USR1 10231
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 10231 killed at Wed Nov 28 11:28:00 EST 2012
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) ----
selfserv starting at Wed Nov 28 11:28:00 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C004 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:28:00 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 10309 >/dev/null 2>/dev/null
selfserv with PID 10309 found at Wed Nov 28 11:28:00 EST 2012
selfserv with PID 10309 started at Wed Nov 28 11:28:00 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C004 -N \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:28:00 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed Nov 28 11:28:01 EST 2012
ssl.sh: #9714: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 10309 at Wed Nov 28 11:28:01 EST 2012
kill -USR1 10309
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 10309 killed at Wed Nov 28 11:28:01 EST 2012
ssl.sh: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) ----
selfserv starting at Wed Nov 28 11:28:01 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c :C00E -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:28:01 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 10386 >/dev/null 2>/dev/null
selfserv with PID 10386 found at Wed Nov 28 11:28:01 EST 2012
selfserv with PID 10386 started at Wed Nov 28 11:28:01 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C00E -N \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:28:01 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed Nov 28 11:28:02 EST 2012
ssl.sh: #9715: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 10386 at Wed Nov 28 11:28:02 EST 2012
kill -USR1 10386
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 10386 killed at Wed Nov 28 11:28:02 EST 2012
ssl.sh: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Wed Nov 28 11:28:02 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C013 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:28:02 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 10473 >/dev/null 2>/dev/null
selfserv with PID 10473 found at Wed Nov 28 11:28:02 EST 2012
selfserv with PID 10473 started at Wed Nov 28 11:28:02 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :C013 \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:28:02 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:28:02 EST 2012
ssl.sh: #9716: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 10473 at Wed Nov 28 11:28:02 EST 2012
kill -USR1 10473
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 10473 killed at Wed Nov 28 11:28:02 EST 2012
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) ----
selfserv starting at Wed Nov 28 11:28:02 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C004 -u -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:28:02 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 10551 >/dev/null 2>/dev/null
selfserv with PID 10551 found at Wed Nov 28 11:28:02 EST 2012
selfserv with PID 10551 started at Wed Nov 28 11:28:02 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :C004 -u \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:28:02 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Wed Nov 28 11:28:03 EST 2012
ssl.sh: #9717: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 10551 at Wed Nov 28 11:28:03 EST 2012
kill -USR1 10551
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 10551 killed at Wed Nov 28 11:28:03 EST 2012
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Wed Nov 28 11:28:03 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C009 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:28:03 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 10650 >/dev/null 2>/dev/null
selfserv with PID 10650 found at Wed Nov 28 11:28:03 EST 2012
selfserv with PID 10650 started at Wed Nov 28 11:28:03 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 10 -C :C009 -N -V :ssl3 -n ExtendedSSLUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:28:03 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Wed Nov 28 11:28:04 EST 2012
ssl.sh: #9718: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 10650 at Wed Nov 28 11:28:04 EST 2012
kill -USR1 10650
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 10650 killed at Wed Nov 28 11:28:04 EST 2012
ssl.sh: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) ----
selfserv starting at Wed Nov 28 11:28:04 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:28:04 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 10727 >/dev/null 2>/dev/null
selfserv with PID 10727 found at Wed Nov 28 11:28:04 EST 2012
selfserv with PID 10727 started at Wed Nov 28 11:28:04 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 100 -C :C013 -V :ssl3 -n ExtendedSSLUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:28:04 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:28:04 EST 2012
ssl.sh: #9719: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 10727 at Wed Nov 28 11:28:04 EST 2012
kill -USR1 10727
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 10727 killed at Wed Nov 28 11:28:04 EST 2012
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Wed Nov 28 11:28:04 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C004 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:28:04 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 10805 >/dev/null 2>/dev/null
selfserv with PID 10805 found at Wed Nov 28 11:28:04 EST 2012
selfserv with PID 10805 started at Wed Nov 28 11:28:04 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 10 -C :C004 -N -n ExtendedSSLUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:28:04 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Wed Nov 28 11:28:05 EST 2012
ssl.sh: #9720: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 10805 at Wed Nov 28 11:28:05 EST 2012
kill -USR1 10805
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 10805 killed at Wed Nov 28 11:28:05 EST 2012
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Wed Nov 28 11:28:05 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -r -r -c :C00E -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:28:05 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 10883 >/dev/null 2>/dev/null
selfserv with PID 10883 found at Wed Nov 28 11:28:05 EST 2012
selfserv with PID 10883 started at Wed Nov 28 11:28:05 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 10 -C :C00E -N -n ExtendedSSLUser-ecmixed \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:28:05 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Wed Nov 28 11:28:05 EST 2012
ssl.sh: #9721: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 10883 at Wed Nov 28 11:28:05 EST 2012
kill -USR1 10883
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 10883 killed at Wed Nov 28 11:28:05 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ----
selfserv starting at Wed Nov 28 11:28:05 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:28:05 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 10962 >/dev/null 2>/dev/null
selfserv with PID 10962 found at Wed Nov 28 11:28:05 EST 2012
selfserv with PID 10962 started at Wed Nov 28 11:28:05 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -c 100 -C :C013 -n ExtendedSSLUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:28:05 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Wed Nov 28 11:28:06 EST 2012
ssl.sh: #9722: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 10962 at Wed Nov 28 11:28:06 EST 2012
kill -USR1 10962
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 10962 killed at Wed Nov 28 11:28:06 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ----
selfserv starting at Wed Nov 28 11:28:06 EST 2012
selfserv -D -p 8546 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -u -i ../tests_pid.10869  &
trying to connect to selfserv at Wed Nov 28 11:28:06 EST 2012
tstclnt -p 8546 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8546 (address=10.16.79.157)
kill -0 11040 >/dev/null 2>/dev/null
selfserv with PID 11040 found at Wed Nov 28 11:28:06 EST 2012
selfserv with PID 11040 started at Wed Nov 28 11:28:06 EST 2012
strsclnt -q -p 8546 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec -u \
          buildnss02.usersys.redhat.com
strsclnt started at Wed Nov 28 11:28:06 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Wed Nov 28 11:28:06 EST 2012
ssl.sh: #9723: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 11040 at Wed Nov 28 11:28:06 EST 2012
kill -USR1 11040
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8546 2>/dev/null;
selfserv with PID 11040 killed at Wed Nov 28 11:28:06 EST 2012
TIMESTAMP ssl END: Wed Nov 28 11:28:06 EST 2012
Running tests for merge
TIMESTAMP merge BEGIN: Wed Nov 28 11:28:06 EST 2012
sdr.sh: SDR Tests ===============================
sdr.sh: Creating an SDR key/SDR Encrypt - Value 1
sdrtest -d . -o /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests.v1.10869 -t "Test1"
sdr.sh: #9724: Creating SDR Key/Encrypt - Value 1  - PASSED
sdr.sh: SDR Encrypt - Value 2
sdrtest -d . -o /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests.v2.10869 -t "The quick brown fox jumped over the lazy dog"
sdr.sh: #9725: Encrypt - Value 2  - PASSED
sdr.sh: SDR Encrypt - Value 3
sdrtest -d . -o /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests.v3.10869 -t "1234567"
sdr.sh: #9726: Encrypt - Value 3  - PASSED
sdr.sh: SDR Decrypt - Value 1
sdrtest -d . -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests.v1.10869 -t "Test1"
sdr.sh: #9727: Decrypt - Value 1  - PASSED
sdr.sh: SDR Decrypt - Value 2
sdrtest -d . -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests.v2.10869 -t "The quick brown fox jumped over the lazy dog"
sdr.sh: #9728: Decrypt - Value 2  - PASSED
sdr.sh: SDR Decrypt - Value 3
sdrtest -d . -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests.v3.10869 -t "1234567"
sdr.sh: #9729: Decrypt - Value 3  - PASSED
merge.sh: Merge Tests ===============================
merge.sh: Creating an SDR key & Encrypt
sdrtest -d . -o /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests.v3.10869 -t Test2 -f ../tests.pw
merge.sh: #9730: Creating SDR Key  - PASSED
merge.sh: Merging in Key for Existing user
certutil --merge --source-dir ../dave -d . -f ../tests.pw -@ ../tests.pw
merge.sh: #9731: Merging Dave  - PASSED
merge.sh: Merging in new user 
certutil --merge --source-dir ../server -d . -f ../tests.pw -@ ../tests.pw
merge.sh: #9732: Merging server  - PASSED
merge.sh: Merging in new chain 
certutil --merge --source-dir ../ext_client -d . -f ../tests.pw -@ ../tests.pw
merge.sh: #9733: Merging ext_client  - PASSED
merge.sh: Merging in conflicting nicknames 1
certutil --merge --source-dir conflict1 -d . -f ../tests.pw -@ ../tests.pw
merge.sh: #9734: Merging conflicting nicknames 1  - PASSED
merge.sh: Merging in conflicting nicknames 1
certutil --merge --source-dir conflict2 -d . -f ../tests.pw -@ ../tests.pw
merge.sh: #9735: Merging conflicting nicknames 2  - PASSED
merge.sh: Verify nicknames were deconflicted (Alice #4)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 45 (0x2d)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:22:00 2012
            Not After : Tue Nov 28 16:22:00 2017
        Subject: "CN=TestUser45,E=TestUser45@bogus.com,O=BOGUS NSS,L=Mountain
             View,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    aa:82:34:6b:7c:29:50:89:84:71:5b:8d:3e:ca:fb:a8:
                    28:7f:7a:4c:12:ba:1a:36:25:eb:5d:d6:ec:8f:d0:e8:
                    83:ef:7e:3e:5d:ff:96:df:57:07:06:ee:f2:d8:7d:7a:
                    65:f8:57:a2:b1:34:f9:db:a2:f4:a5:73:48:3c:f9:87:
                    87:56:e1:e8:7e:bf:70:24:a3:be:bb:02:fa:d0:25:17:
                    f0:9e:4e:53:2d:fc:96:bd:93:93:c2:61:9d:9b:a0:d6:
                    83:15:91:b0:c8:43:db:aa:16:f1:4e:80:b6:6d:3a:f0:
                    0a:21:15:78:e0:12:38:3f:bc:31:d9:12:b9:cc:6a:17
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7d:79:ff:bc:11:7c:05:dc:2a:66:72:f0:74:7f:9a:a1:
        68:cb:0b:d1:42:41:59:78:80:a0:49:87:61:58:85:66:
        c4:fc:10:c6:89:e7:5b:1a:78:13:4f:3b:ad:b2:e7:fa:
        c8:9f:08:84:c2:07:51:31:6b:f5:76:05:0d:61:0b:d2:
        85:94:06:04:c9:9c:03:79:94:97:3e:d5:31:38:76:62:
        9d:68:57:08:5a:ec:bb:3f:95:06:71:cc:df:c3:58:da:
        4b:ba:8e:00:6a:a5:ba:34:f9:9d:5e:98:9d:5d:f4:e6:
        77:71:38:2b:98:e6:a2:f8:1f:1f:96:68:90:48:c3:55
    Fingerprint (MD5):
        71:E9:CF:86:03:A8:02:21:1A:55:80:1E:97:4D:8B:81
    Fingerprint (SHA1):
        1F:AF:20:1C:1F:F3:D8:D6:15:5B:6C:2A:FE:9E:73:2E:DC:6B:6F:59

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

merge.sh: #9736: Verify nicknames were deconflicted (Alice #4)  - PASSED
merge.sh: Verify nicknames were deconflicted (Alice #100)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 46 (0x2e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 16:22:05 2012
            Not After : Tue Nov 28 16:22:05 2017
        Subject: "CN=TestUser46,E=TestUser46@bogus.com,O=BOGUS NSS,L=Mountain
             View,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bd:b7:54:23:d2:e4:e9:98:c7:5d:66:c5:8f:86:55:6a:
                    b8:d1:04:26:f9:cc:0f:6a:d5:18:c6:26:df:0b:c3:f1:
                    0d:68:ee:35:3c:16:21:68:07:3d:df:52:75:24:ae:07:
                    0e:d1:be:97:b7:fe:05:a4:8e:06:f6:ec:66:e7:27:e2:
                    f9:83:38:91:b2:d2:a6:cc:cb:0e:f4:e0:dc:5a:2d:25:
                    d5:09:a4:cb:c4:5d:8e:3a:60:4a:f9:32:65:67:b8:a6:
                    e0:df:55:01:b8:c7:31:07:90:bd:fb:39:29:90:ba:bb:
                    cc:1c:91:66:de:db:db:96:08:39:13:a1:1c:2e:69:ad
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        23:7e:97:bc:ad:a1:e9:7b:00:ce:53:4a:42:3e:c3:05:
        8e:fb:78:9d:e0:b9:1f:f9:65:71:6a:d8:9a:6d:d3:7e:
        0d:45:94:23:db:bd:09:44:54:b4:79:48:e7:b5:44:35:
        c6:e2:98:9b:39:f9:c7:e7:33:e8:0e:c3:0a:03:98:8b:
        34:0d:4f:c2:e4:e0:aa:0d:46:d0:13:ca:0c:5e:74:8d:
        e6:b9:08:cb:16:7b:c0:7a:a1:ab:9f:b0:b0:3c:cf:24:
        c5:c9:41:5d:b6:f5:bc:7b:37:49:3e:80:82:8f:96:df:
        2c:8d:a6:52:3b:87:f2:9e:48:59:a0:67:b6:79:0f:08
    Fingerprint (MD5):
        50:A8:35:EF:13:5C:B8:3F:DA:2B:7B:32:F6:0F:14:83
    Fingerprint (SHA1):
        E9:ED:84:3E:49:DC:69:7E:C7:D2:A3:72:14:F4:43:45:D9:FD:8F:C8

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

merge.sh: #9737: Verify nicknames were deconflicted (Alice #100)  - PASSED
merge.sh: Merging in SDR 
certutil --merge --source-dir ../SDR -d . -f ../tests.pw -@ ../tests.pw
merge.sh: #9738: Merging SDR  - PASSED

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

TestCA                                                       CT,C,C
TestCA-ec                                                    CT,C,C
Alice                                                        u,u,u
Alice-ec                                                     u,u,u
Alice-ecmixed                                                u,u,u
bob@bogus.com                                                ,,   
Dave                                                         u,u,u
eve@bogus.com                                                ,,   
bob-ec@bogus.com                                             ,,   
Dave-ec                                                      u,u,u
Dave-ecmixed                                                 u,u,u
buildnss02.usersys.redhat.com                                u,u,u
buildnss02.usersys.redhat.com-ec                             u,u,u
buildnss02.usersys.redhat.com-ecmixed                        u,u,u
buildnss02-sni.usersys.redhat.com                            u,u,u
buildnss02-sni.usersys.redhat.com-ec                         u,u,u
buildnss02-sni.usersys.redhat.com-ecmixed                    u,u,u
ExtendedSSLUser                                              u,u,u
serverCA                                                     C,C,C
ExtendedSSLUser-ec                                           u,u,u
serverCA-ec                                                  C,C,C
ExtendedSSLUser-ecmixed                                      u,u,u
chain-2-clientCA-ec                                          ,,   
clientCA                                                     T,C,C
chain-2-clientCA                                             ,,   
clientCA-ec                                                  T,C,C
chain-1-clientCA-ec                                          ,,   
chain-1-clientCA                                             ,,   
Alice #2                                                     ,,   
Alice #1                                                     ,,   
Alice #99                                                    ,,   
Alice #3                                                     ,,   
Alice #4                                                     ,,   
Alice #100                                                   ,,   


CRL names                                CRL Type

TestCA                                   CRL  
TestCA-ec                                CRL  
merge.sh: Decrypt - With Original SDR Key
sdrtest -d . -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests.v3.10869 -t Test2 -f ../tests.pw
merge.sh: #9739: Decrypt - Value 3  - PASSED
merge.sh: Decrypt - With Merged SDR Key
sdrtest -d . -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests.v1.10869 -t Test1 -f ../tests.pw
merge.sh: #9740: Decrypt - Value 1  - PASSED
merge.sh: Signing with merged key  ------------------
cmsutil -S -T -N Dave -H SHA1 -i alice.txt -d . -p nss -o dave.dsig
merge.sh: #9741: Create Detached Signature Dave . - PASSED
cmsutil -D -i dave.dsig -c alice.txt -d . 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
merge.sh: #9742: Verifying Dave's Detached Signature  - PASSED
merge.sh: verifying  merged cert  ------------------
certutil -V -n ExtendedSSLUser -u C -d .
certutil: certificate is valid
merge.sh: #9743: Verifying ExtendedSSL User Cert  - PASSED
merge.sh: verifying  merged crl  ------------------
crlutil -L -n TestCA -d .
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US"
    This Update: Wed Nov 28 16:22:41 2012
    Entry 1 (0x1):
        Serial Number: 40 (0x28)
        Revocation Date: Wed Nov 28 16:18:01 2012
        Entry Extensions:
            Name: CRL reason code

    Entry 2 (0x2):
        Serial Number: 42 (0x2a)
        Revocation Date: Wed Nov 28 16:22:38 2012
    CRL Extensions:
        Name: Certificate Issuer Alt Name
        RFC822 Name: "caemail@ca.com"
        DNS name: "ca.com"
        Directory Name: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=Califo
            rnia,C=US"
        URI: "http://ca.com"
        IP Address:
            87:0b:31:39:32:2e:31:36:38:2e:30:2e:31

merge.sh: #9744: Verifying TestCA CRL  - PASSED
TIMESTAMP merge END: Wed Nov 28 11:28:37 EST 2012
Running tests for chains
TIMESTAMP chains BEGIN: Wed Nov 28 11:28:37 EST 2012
~/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/aiahttp ~/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/chains
httpserv starting at Wed Nov 28 11:28:37 EST 2012
httpserv -D -p 8556  \
         -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/aiahttp/http_pid.10869  &
trying to connect to httpserv at Wed Nov 28 11:28:37 EST 2012
tstclnt -p 8556 -h buildnss02.usersys.redhat.com -q -v
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to httpserv at Wed Nov 28 11:28:46 EST 2012
tstclnt -p 8556 -h buildnss02.usersys.redhat.com -q -v
tstclnt: error looking up host: A directory lookup on a network address has failed
chains.sh: #9745: Waiting for Server - FAILED
kill -0 11365 >/dev/null 2>/dev/null
httpserv with PID 11365 found at Wed Nov 28 11:28:46 EST 2012
httpserv with PID 11365 started at Wed Nov 28 11:28:46 EST 2012
~/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/chains
chains.sh: Certificate Chains Tests ===============================
chains.sh: Creating DB ArmyDB
certutil -N -d ArmyDB -f ArmyDB/dbpasswd
chains.sh: #9746: Bridge: Creating DB ArmyDB  - PASSED
chains.sh: Creating Root CA Army
certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army  -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -m 1128112838 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #9747: Bridge: Creating Root CA Army  - PASSED
chains.sh: Exporting Root CA Army.der
certutil -L -d ArmyDB -r -n Army -o Army.der
chains.sh: #9748: Bridge: Exporting Root CA Army.der  - PASSED
chains.sh: Creating DB NavyDB
certutil -N -d NavyDB -f NavyDB/dbpasswd
chains.sh: #9749: Bridge: Creating DB NavyDB  - PASSED
chains.sh: Creating Root CA Navy
certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy  -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -m 1128112839 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #9750: Bridge: Creating Root CA Navy  - PASSED
chains.sh: Exporting Root CA Navy.der
certutil -L -d NavyDB -r -n Navy -o Navy.der
chains.sh: #9751: Bridge: Exporting Root CA Navy.der  - PASSED
chains.sh: Creating DB BridgeDB
certutil -N -d BridgeDB -f BridgeDB/dbpasswd
chains.sh: #9752: Bridge: Creating DB BridgeDB  - PASSED
chains.sh: Creating Bridge certifiate request BridgeReq.der
certutil -s "CN=Bridge Bridge, O=Bridge, C=US"  -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o BridgeReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #9753: Bridge: Creating Bridge certifiate request BridgeReq.der  - PASSED
chains.sh: Creating certficate BridgeArmy.der signed by Army
certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1128112840 -7 Bridge@Army  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #9754: Bridge: Creating certficate BridgeArmy.der signed by Army  - PASSED
chains.sh: Importing certificate BridgeArmy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der
chains.sh: #9755: Bridge: Importing certificate BridgeArmy.der to BridgeDB database  - PASSED
chains.sh: Creating certficate BridgeNavy.der signed by Navy
certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1128112841 -7 Bridge@Navy  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #9756: Bridge: Creating certficate BridgeNavy.der signed by Navy  - PASSED
chains.sh: Importing certificate BridgeNavy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der
chains.sh: #9757: Bridge: Importing certificate BridgeNavy.der to BridgeDB database  - PASSED
chains.sh: Generating PKCS7 package from BridgeDB database
cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7
chains.sh: #9758: Bridge: Generating PKCS7 package from BridgeDB database  - PASSED
chains.sh: Creating DB UserDB
certutil -N -d UserDB -f UserDB/dbpasswd
chains.sh: #9759: Bridge: Creating DB UserDB  - PASSED
chains.sh: Creating EE certifiate request UserReq.der
certutil -s "CN=User EE, O=User, C=US"  -R  -d UserDB -f UserDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o UserReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #9760: Bridge: Creating EE certifiate request UserReq.der  - PASSED
chains.sh: Creating certficate UserBridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 1128112842   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #9761: Bridge: Creating certficate UserBridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate UserBridge.der to UserDB database
certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der
chains.sh: #9762: Bridge: Importing certificate UserBridge.der to UserDB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #9763: Bridge: Creating DB AllDB  - PASSED
chains.sh: Importing certificate Army.der to AllDB database
certutil -A -n Army  -t "" -d AllDB -f AllDB/dbpasswd -i Army.der
chains.sh: #9764: Bridge: Importing certificate Army.der to AllDB database  - PASSED
chains.sh: Importing certificate Navy.der to AllDB database
certutil -A -n Navy  -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der
chains.sh: #9765: Bridge: Importing certificate Navy.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags  -d AllDB     -t Navy
vfychain -d AllDB -pp -vv      UserBridge.der BridgeNavy.der  -t Navy
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128112839 (0x433da2c7)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 16:28:50 2012
            Not After : Tue Nov 28 16:28:50 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cc:4d:7b:6a:d9:b9:44:09:8c:86:f7:68:08:51:f3:08:
                    c6:87:f2:92:95:ac:36:e9:44:e8:7a:6c:0c:3d:32:26:
                    4a:89:c7:3b:5d:78:25:5c:1c:d6:7a:61:dc:f9:a3:4b:
                    22:a6:7b:56:0a:63:89:f6:97:57:b6:c1:df:48:a8:bf:
                    1d:e7:22:53:db:41:e9:39:29:0b:ab:94:16:47:26:02:
                    7c:ff:60:da:5f:f8:17:2d:8e:10:00:bb:25:ea:ef:2b:
                    05:fa:18:8b:ac:6c:4a:a2:8e:09:51:14:c6:64:da:41:
                    96:a3:97:a8:06:03:01:6b:36:11:48:74:1c:cb:ab:97
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1d:48:7f:c9:f9:7f:59:6d:3a:6b:fa:91:9a:c8:17:a3:
        b2:48:1c:ac:cf:d6:70:b8:75:64:d2:dc:99:4c:7d:83:
        20:dc:47:2d:61:e3:90:c9:07:9c:8d:27:72:e9:a1:d4:
        fd:e8:54:a9:5f:81:bd:83:9d:58:26:9c:63:7d:6d:4b:
        c9:48:97:4e:a6:2e:52:20:9a:19:5a:e5:60:ae:b3:86:
        ac:74:ca:6d:d3:dd:ff:4b:d9:07:d3:c2:cc:d2:99:7f:
        cb:2d:7e:30:4f:40:fe:21:15:cd:35:70:38:cd:0c:18:
        57:52:de:c9:3f:3c:da:b2:c3:86:4c:d3:c5:43:ca:35
    Fingerprint (MD5):
        60:92:1F:A1:7A:22:72:21:28:46:0F:12:79:F5:C4:E3
    Fingerprint (SHA1):
        92:E9:C0:E6:3F:D7:48:B1:C1:4C:96:86:65:5E:3A:7F:4D:2D:A8:36

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #9766: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags  -d AllDB     -t Navy - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags  -d AllDB     -t Army
vfychain -d AllDB -pp -vv      UserBridge.der BridgeArmy.der  -t Army
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128112838 (0x433da2c6)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Wed Nov 28 16:28:48 2012
            Not After : Tue Nov 28 16:28:48 2062
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a4:f8:a4:56:03:6e:09:94:70:fb:db:bd:ab:ed:c7:14:
                    71:94:7a:77:14:b7:a5:17:de:e6:8a:14:45:11:e1:a7:
                    4a:39:e2:40:67:12:e9:36:58:3a:0e:90:3e:ca:47:46:
                    b4:6c:57:06:38:23:f8:ff:d1:60:50:f1:73:73:de:65:
                    19:79:ad:b0:60:14:f0:09:af:06:01:db:aa:29:0f:78:
                    0e:3a:33:96:36:17:6c:fc:6c:1d:0a:f4:dc:66:00:e5:
                    80:1b:63:59:ed:e1:b8:fd:2c:58:1c:d3:79:18:b3:f0:
                    05:66:80:92:a2:9f:81:3f:55:e3:84:13:13:dc:3c:39
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        23:04:cb:56:28:16:ff:f7:28:37:1e:d1:42:ae:07:78:
        f8:54:97:1a:e7:52:3f:18:8e:87:45:8a:e6:62:d8:a8:
        73:d5:d6:45:fb:f5:29:76:7e:c8:64:bc:86:f9:7e:d9:
        8a:bc:a3:e1:8c:c4:af:8f:d8:09:96:2f:f5:28:5c:1e:
        3d:46:c6:44:63:bd:f8:e0:91:5b:67:a6:8d:10:6c:09:
        c7:29:d5:c0:d5:b6:95:68:75:44:f6:cb:49:c8:93:2d:
        43:1d:7e:47:f4:b0:47:df:65:c4:89:07:91:62:02:a2:
        10:56:a8:36:1a:15:34:40:42:57:15:3d:4f:8d:a5:56
    Fingerprint (MD5):
        BE:FA:A2:B3:4B:9C:FD:84:FE:C5:E4:7A:9C:42:0F:DA
    Fingerprint (SHA1):
        F9:59:59:9F:13:2A:77:31:1B:92:AE:88:C8:A9:AE:5A:3C:33:E4:92

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #9767: Bridge: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags  -d AllDB     -t Army - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags  -d AllDB     -t Army
vfychain -d AllDB -pp -vv      UserBridge.der BridgeNavy.der  -t Army
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Navy [Certificate Authority]:
  ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user.
    CN=Navy ROOT CA,O=Navy,C=US
Returned value is 1, expected result is fail
chains.sh: #9768: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags  -d AllDB     -t Army - PASSED
chains.sh: Importing certificate BridgeArmy.der to AllDB database
certutil -A -n Bridge  -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der
chains.sh: #9769: Bridge: Importing certificate BridgeArmy.der to AllDB database  - PASSED
chains.sh: Importing certificate BridgeNavy.der to AllDB database
certutil -A -n Bridge  -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der
chains.sh: #9770: Bridge: Importing certificate BridgeNavy.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der with flags  -d AllDB     -t Army
vfychain -d AllDB -pp -vv      UserBridge.der  -t Army
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128112838 (0x433da2c6)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Wed Nov 28 16:28:48 2012
            Not After : Tue Nov 28 16:28:48 2062
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a4:f8:a4:56:03:6e:09:94:70:fb:db:bd:ab:ed:c7:14:
                    71:94:7a:77:14:b7:a5:17:de:e6:8a:14:45:11:e1:a7:
                    4a:39:e2:40:67:12:e9:36:58:3a:0e:90:3e:ca:47:46:
                    b4:6c:57:06:38:23:f8:ff:d1:60:50:f1:73:73:de:65:
                    19:79:ad:b0:60:14:f0:09:af:06:01:db:aa:29:0f:78:
                    0e:3a:33:96:36:17:6c:fc:6c:1d:0a:f4:dc:66:00:e5:
                    80:1b:63:59:ed:e1:b8:fd:2c:58:1c:d3:79:18:b3:f0:
                    05:66:80:92:a2:9f:81:3f:55:e3:84:13:13:dc:3c:39
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        23:04:cb:56:28:16:ff:f7:28:37:1e:d1:42:ae:07:78:
        f8:54:97:1a:e7:52:3f:18:8e:87:45:8a:e6:62:d8:a8:
        73:d5:d6:45:fb:f5:29:76:7e:c8:64:bc:86:f9:7e:d9:
        8a:bc:a3:e1:8c:c4:af:8f:d8:09:96:2f:f5:28:5c:1e:
        3d:46:c6:44:63:bd:f8:e0:91:5b:67:a6:8d:10:6c:09:
        c7:29:d5:c0:d5:b6:95:68:75:44:f6:cb:49:c8:93:2d:
        43:1d:7e:47:f4:b0:47:df:65:c4:89:07:91:62:02:a2:
        10:56:a8:36:1a:15:34:40:42:57:15:3d:4f:8d:a5:56
    Fingerprint (MD5):
        BE:FA:A2:B3:4B:9C:FD:84:FE:C5:E4:7A:9C:42:0F:DA
    Fingerprint (SHA1):
        F9:59:59:9F:13:2A:77:31:1B:92:AE:88:C8:A9:AE:5A:3C:33:E4:92

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #9771: Bridge: Verifying certificate(s)  UserBridge.der with flags  -d AllDB     -t Army - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der with flags  -d AllDB     -t Navy
vfychain -d AllDB -pp -vv      UserBridge.der  -t Navy
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128112839 (0x433da2c7)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 16:28:50 2012
            Not After : Tue Nov 28 16:28:50 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cc:4d:7b:6a:d9:b9:44:09:8c:86:f7:68:08:51:f3:08:
                    c6:87:f2:92:95:ac:36:e9:44:e8:7a:6c:0c:3d:32:26:
                    4a:89:c7:3b:5d:78:25:5c:1c:d6:7a:61:dc:f9:a3:4b:
                    22:a6:7b:56:0a:63:89:f6:97:57:b6:c1:df:48:a8:bf:
                    1d:e7:22:53:db:41:e9:39:29:0b:ab:94:16:47:26:02:
                    7c:ff:60:da:5f:f8:17:2d:8e:10:00:bb:25:ea:ef:2b:
                    05:fa:18:8b:ac:6c:4a:a2:8e:09:51:14:c6:64:da:41:
                    96:a3:97:a8:06:03:01:6b:36:11:48:74:1c:cb:ab:97
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1d:48:7f:c9:f9:7f:59:6d:3a:6b:fa:91:9a:c8:17:a3:
        b2:48:1c:ac:cf:d6:70:b8:75:64:d2:dc:99:4c:7d:83:
        20:dc:47:2d:61:e3:90:c9:07:9c:8d:27:72:e9:a1:d4:
        fd:e8:54:a9:5f:81:bd:83:9d:58:26:9c:63:7d:6d:4b:
        c9:48:97:4e:a6:2e:52:20:9a:19:5a:e5:60:ae:b3:86:
        ac:74:ca:6d:d3:dd:ff:4b:d9:07:d3:c2:cc:d2:99:7f:
        cb:2d:7e:30:4f:40:fe:21:15:cd:35:70:38:cd:0c:18:
        57:52:de:c9:3f:3c:da:b2:c3:86:4c:d3:c5:43:ca:35
    Fingerprint (MD5):
        60:92:1F:A1:7A:22:72:21:28:46:0F:12:79:F5:C4:E3
    Fingerprint (SHA1):
        92:E9:C0:E6:3F:D7:48:B1:C1:4C:96:86:65:5E:3A:7F:4D:2D:A8:36

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #9772: Bridge: Verifying certificate(s)  UserBridge.der with flags  -d AllDB     -t Navy - PASSED
chains.sh: Creating DB ArmyOnlyDB
certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd
chains.sh: #9773: Bridge: Creating DB ArmyOnlyDB  - PASSED
chains.sh: Importing certificate Army.der to ArmyOnlyDB database
certutil -A -n Army  -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der
chains.sh: #9774: Bridge: Importing certificate Army.der to ArmyOnlyDB database  - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der with flags  -d ArmyOnlyDB    
vfychain -d ArmyOnlyDB -pp -vv      UserBridge.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=User EE,O=User,C=US :
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Bridge Bridge,O=Bridge,C=US
Returned value is 1, expected result is fail
chains.sh: #9775: Bridge: Verifying certificate(s)  UserBridge.der with flags  -d ArmyOnlyDB     - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags  -d ArmyOnlyDB    
vfychain -d ArmyOnlyDB -pp -vv      UserBridge.der BridgeNavy.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. bridge@navy [Certificate Authority]:
Email Address(es): bridge@navy
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Navy ROOT CA,O=Navy,C=US
Returned value is 1, expected result is fail
chains.sh: #9776: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags  -d ArmyOnlyDB     - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der Navy.der with flags  -d ArmyOnlyDB    
vfychain -d ArmyOnlyDB -pp -vv      UserBridge.der BridgeNavy.der Navy.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user.
    CN=Navy ROOT CA,O=Navy,C=US
Returned value is 1, expected result is fail
chains.sh: #9777: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der Navy.der with flags  -d ArmyOnlyDB     - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der Navy.der with flags  -d ArmyOnlyDB     -t Navy.der
vfychain -d ArmyOnlyDB -pp -vv      UserBridge.der BridgeNavy.der Navy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128112839 (0x433da2c7)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 16:28:50 2012
            Not After : Tue Nov 28 16:28:50 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cc:4d:7b:6a:d9:b9:44:09:8c:86:f7:68:08:51:f3:08:
                    c6:87:f2:92:95:ac:36:e9:44:e8:7a:6c:0c:3d:32:26:
                    4a:89:c7:3b:5d:78:25:5c:1c:d6:7a:61:dc:f9:a3:4b:
                    22:a6:7b:56:0a:63:89:f6:97:57:b6:c1:df:48:a8:bf:
                    1d:e7:22:53:db:41:e9:39:29:0b:ab:94:16:47:26:02:
                    7c:ff:60:da:5f:f8:17:2d:8e:10:00:bb:25:ea:ef:2b:
                    05:fa:18:8b:ac:6c:4a:a2:8e:09:51:14:c6:64:da:41:
                    96:a3:97:a8:06:03:01:6b:36:11:48:74:1c:cb:ab:97
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1d:48:7f:c9:f9:7f:59:6d:3a:6b:fa:91:9a:c8:17:a3:
        b2:48:1c:ac:cf:d6:70:b8:75:64:d2:dc:99:4c:7d:83:
        20:dc:47:2d:61:e3:90:c9:07:9c:8d:27:72:e9:a1:d4:
        fd:e8:54:a9:5f:81:bd:83:9d:58:26:9c:63:7d:6d:4b:
        c9:48:97:4e:a6:2e:52:20:9a:19:5a:e5:60:ae:b3:86:
        ac:74:ca:6d:d3:dd:ff:4b:d9:07:d3:c2:cc:d2:99:7f:
        cb:2d:7e:30:4f:40:fe:21:15:cd:35:70:38:cd:0c:18:
        57:52:de:c9:3f:3c:da:b2:c3:86:4c:d3:c5:43:ca:35
    Fingerprint (MD5):
        60:92:1F:A1:7A:22:72:21:28:46:0F:12:79:F5:C4:E3
    Fingerprint (SHA1):
        92:E9:C0:E6:3F:D7:48:B1:C1:4C:96:86:65:5E:3A:7F:4D:2D:A8:36


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #9778: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der Navy.der with flags  -d ArmyOnlyDB     -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags  -d ArmyOnlyDB     -t Navy.der
vfychain -d ArmyOnlyDB -pp -vv      UserBridge.der BridgeNavy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128112839 (0x433da2c7)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 16:28:50 2012
            Not After : Tue Nov 28 16:28:50 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cc:4d:7b:6a:d9:b9:44:09:8c:86:f7:68:08:51:f3:08:
                    c6:87:f2:92:95:ac:36:e9:44:e8:7a:6c:0c:3d:32:26:
                    4a:89:c7:3b:5d:78:25:5c:1c:d6:7a:61:dc:f9:a3:4b:
                    22:a6:7b:56:0a:63:89:f6:97:57:b6:c1:df:48:a8:bf:
                    1d:e7:22:53:db:41:e9:39:29:0b:ab:94:16:47:26:02:
                    7c:ff:60:da:5f:f8:17:2d:8e:10:00:bb:25:ea:ef:2b:
                    05:fa:18:8b:ac:6c:4a:a2:8e:09:51:14:c6:64:da:41:
                    96:a3:97:a8:06:03:01:6b:36:11:48:74:1c:cb:ab:97
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1d:48:7f:c9:f9:7f:59:6d:3a:6b:fa:91:9a:c8:17:a3:
        b2:48:1c:ac:cf:d6:70:b8:75:64:d2:dc:99:4c:7d:83:
        20:dc:47:2d:61:e3:90:c9:07:9c:8d:27:72:e9:a1:d4:
        fd:e8:54:a9:5f:81:bd:83:9d:58:26:9c:63:7d:6d:4b:
        c9:48:97:4e:a6:2e:52:20:9a:19:5a:e5:60:ae:b3:86:
        ac:74:ca:6d:d3:dd:ff:4b:d9:07:d3:c2:cc:d2:99:7f:
        cb:2d:7e:30:4f:40:fe:21:15:cd:35:70:38:cd:0c:18:
        57:52:de:c9:3f:3c:da:b2:c3:86:4c:d3:c5:43:ca:35
    Fingerprint (MD5):
        60:92:1F:A1:7A:22:72:21:28:46:0F:12:79:F5:C4:E3
    Fingerprint (SHA1):
        92:E9:C0:E6:3F:D7:48:B1:C1:4C:96:86:65:5E:3A:7F:4D:2D:A8:36


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #9779: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags  -d ArmyOnlyDB     -t Navy.der - PASSED
chains.sh: Creating DB NavyOnlyDB
certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd
chains.sh: #9780: Bridge: Creating DB NavyOnlyDB  - PASSED
chains.sh: Importing certificate Navy.der to NavyOnlyDB database
certutil -A -n Navy  -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der
chains.sh: #9781: Bridge: Importing certificate Navy.der to NavyOnlyDB database  - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der with flags  -d NavyOnlyDB    
vfychain -d NavyOnlyDB -pp -vv      UserBridge.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=User EE,O=User,C=US :
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Bridge Bridge,O=Bridge,C=US
Returned value is 1, expected result is fail
chains.sh: #9782: Bridge: Verifying certificate(s)  UserBridge.der with flags  -d NavyOnlyDB     - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags  -d NavyOnlyDB    
vfychain -d NavyOnlyDB -pp -vv      UserBridge.der BridgeArmy.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. bridge@army [Certificate Authority]:
Email Address(es): bridge@army
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Army ROOT CA,O=Army,C=US
Returned value is 1, expected result is fail
chains.sh: #9783: Bridge: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags  -d NavyOnlyDB     - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeArmy.der Army.der with flags  -d NavyOnlyDB    
vfychain -d NavyOnlyDB -pp -vv      UserBridge.der BridgeArmy.der Army.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user.
    CN=Army ROOT CA,O=Army,C=US
Returned value is 1, expected result is fail
chains.sh: #9784: Bridge: Verifying certificate(s)  UserBridge.der BridgeArmy.der Army.der with flags  -d NavyOnlyDB     - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeArmy.der Army.der with flags  -d NavyOnlyDB     -t Army.der
vfychain -d NavyOnlyDB -pp -vv      UserBridge.der BridgeArmy.der Army.der  -t Army.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128112838 (0x433da2c6)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Wed Nov 28 16:28:48 2012
            Not After : Tue Nov 28 16:28:48 2062
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a4:f8:a4:56:03:6e:09:94:70:fb:db:bd:ab:ed:c7:14:
                    71:94:7a:77:14:b7:a5:17:de:e6:8a:14:45:11:e1:a7:
                    4a:39:e2:40:67:12:e9:36:58:3a:0e:90:3e:ca:47:46:
                    b4:6c:57:06:38:23:f8:ff:d1:60:50:f1:73:73:de:65:
                    19:79:ad:b0:60:14:f0:09:af:06:01:db:aa:29:0f:78:
                    0e:3a:33:96:36:17:6c:fc:6c:1d:0a:f4:dc:66:00:e5:
                    80:1b:63:59:ed:e1:b8:fd:2c:58:1c:d3:79:18:b3:f0:
                    05:66:80:92:a2:9f:81:3f:55:e3:84:13:13:dc:3c:39
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        23:04:cb:56:28:16:ff:f7:28:37:1e:d1:42:ae:07:78:
        f8:54:97:1a:e7:52:3f:18:8e:87:45:8a:e6:62:d8:a8:
        73:d5:d6:45:fb:f5:29:76:7e:c8:64:bc:86:f9:7e:d9:
        8a:bc:a3:e1:8c:c4:af:8f:d8:09:96:2f:f5:28:5c:1e:
        3d:46:c6:44:63:bd:f8:e0:91:5b:67:a6:8d:10:6c:09:
        c7:29:d5:c0:d5:b6:95:68:75:44:f6:cb:49:c8:93:2d:
        43:1d:7e:47:f4:b0:47:df:65:c4:89:07:91:62:02:a2:
        10:56:a8:36:1a:15:34:40:42:57:15:3d:4f:8d:a5:56
    Fingerprint (MD5):
        BE:FA:A2:B3:4B:9C:FD:84:FE:C5:E4:7A:9C:42:0F:DA
    Fingerprint (SHA1):
        F9:59:59:9F:13:2A:77:31:1B:92:AE:88:C8:A9:AE:5A:3C:33:E4:92


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #9785: Bridge: Verifying certificate(s)  UserBridge.der BridgeArmy.der Army.der with flags  -d NavyOnlyDB     -t Army.der - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags  -d NavyOnlyDB     -t Army.der
vfychain -d NavyOnlyDB -pp -vv      UserBridge.der BridgeArmy.der  -t Army.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128112838 (0x433da2c6)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Wed Nov 28 16:28:48 2012
            Not After : Tue Nov 28 16:28:48 2062
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a4:f8:a4:56:03:6e:09:94:70:fb:db:bd:ab:ed:c7:14:
                    71:94:7a:77:14:b7:a5:17:de:e6:8a:14:45:11:e1:a7:
                    4a:39:e2:40:67:12:e9:36:58:3a:0e:90:3e:ca:47:46:
                    b4:6c:57:06:38:23:f8:ff:d1:60:50:f1:73:73:de:65:
                    19:79:ad:b0:60:14:f0:09:af:06:01:db:aa:29:0f:78:
                    0e:3a:33:96:36:17:6c:fc:6c:1d:0a:f4:dc:66:00:e5:
                    80:1b:63:59:ed:e1:b8:fd:2c:58:1c:d3:79:18:b3:f0:
                    05:66:80:92:a2:9f:81:3f:55:e3:84:13:13:dc:3c:39
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        23:04:cb:56:28:16:ff:f7:28:37:1e:d1:42:ae:07:78:
        f8:54:97:1a:e7:52:3f:18:8e:87:45:8a:e6:62:d8:a8:
        73:d5:d6:45:fb:f5:29:76:7e:c8:64:bc:86:f9:7e:d9:
        8a:bc:a3:e1:8c:c4:af:8f:d8:09:96:2f:f5:28:5c:1e:
        3d:46:c6:44:63:bd:f8:e0:91:5b:67:a6:8d:10:6c:09:
        c7:29:d5:c0:d5:b6:95:68:75:44:f6:cb:49:c8:93:2d:
        43:1d:7e:47:f4:b0:47:df:65:c4:89:07:91:62:02:a2:
        10:56:a8:36:1a:15:34:40:42:57:15:3d:4f:8d:a5:56
    Fingerprint (MD5):
        BE:FA:A2:B3:4B:9C:FD:84:FE:C5:E4:7A:9C:42:0F:DA
    Fingerprint (SHA1):
        F9:59:59:9F:13:2A:77:31:1B:92:AE:88:C8:A9:AE:5A:3C:33:E4:92


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #9786: Bridge: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags  -d NavyOnlyDB     -t Army.der - PASSED
chains.sh: Creating DB Root1DB
certutil -N -d Root1DB -f Root1DB/dbpasswd
chains.sh: #9787: MegaBridge_3_2: Creating DB Root1DB  - PASSED
chains.sh: Creating Root CA Root1
certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1  -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -m 1128112843 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #9788: MegaBridge_3_2: Creating Root CA Root1  - PASSED
chains.sh: Exporting Root CA Root1.der
certutil -L -d Root1DB -r -n Root1 -o Root1.der
chains.sh: #9789: MegaBridge_3_2: Exporting Root CA Root1.der  - PASSED
chains.sh: Creating DB Root2DB
certutil -N -d Root2DB -f Root2DB/dbpasswd
chains.sh: #9790: MegaBridge_3_2: Creating DB Root2DB  - PASSED
chains.sh: Creating Root CA Root2
certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2  -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -m 1128112844 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #9791: MegaBridge_3_2: Creating Root CA Root2  - PASSED
chains.sh: Exporting Root CA Root2.der
certutil -L -d Root2DB -r -n Root2 -o Root2.der
chains.sh: #9792: MegaBridge_3_2: Exporting Root CA Root2.der  - PASSED
chains.sh: Creating DB Root3DB
certutil -N -d Root3DB -f Root3DB/dbpasswd
chains.sh: #9793: MegaBridge_3_2: Creating DB Root3DB  - PASSED
chains.sh: Creating Root CA Root3
certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3  -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -m 1128112845 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #9794: MegaBridge_3_2: Creating Root CA Root3  - PASSED
chains.sh: Exporting Root CA Root3.der
certutil -L -d Root3DB -r -n Root3 -o Root3.der
chains.sh: #9795: MegaBridge_3_2: Exporting Root CA Root3.der  - PASSED
chains.sh: Creating DB Root4DB
certutil -N -d Root4DB -f Root4DB/dbpasswd
chains.sh: #9796: MegaBridge_3_2: Creating DB Root4DB  - PASSED
chains.sh: Creating Root CA Root4
certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4  -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -m 1128112846 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #9797: MegaBridge_3_2: Creating Root CA Root4  - PASSED
chains.sh: Exporting Root CA Root4.der
certutil -L -d Root4DB -r -n Root4 -o Root4.der
chains.sh: #9798: MegaBridge_3_2: Exporting Root CA Root4.der  - PASSED
chains.sh: Creating DB Root5DB
certutil -N -d Root5DB -f Root5DB/dbpasswd
chains.sh: #9799: MegaBridge_3_2: Creating DB Root5DB  - PASSED
chains.sh: Creating Root CA Root5
certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5  -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -m 1128112847 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #9800: MegaBridge_3_2: Creating Root CA Root5  - PASSED
chains.sh: Exporting Root CA Root5.der
certutil -L -d Root5DB -r -n Root5 -o Root5.der
chains.sh: #9801: MegaBridge_3_2: Exporting Root CA Root5.der  - PASSED
chains.sh: Creating DB Root6DB
certutil -N -d Root6DB -f Root6DB/dbpasswd
chains.sh: #9802: MegaBridge_3_2: Creating DB Root6DB  - PASSED
chains.sh: Creating Root CA Root6
certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6  -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -m 1128112848 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #9803: MegaBridge_3_2: Creating Root CA Root6  - PASSED
chains.sh: Exporting Root CA Root6.der
certutil -L -d Root6DB -r -n Root6 -o Root6.der
chains.sh: #9804: MegaBridge_3_2: Exporting Root CA Root6.der  - PASSED
chains.sh: Creating DB Root7DB
certutil -N -d Root7DB -f Root7DB/dbpasswd
chains.sh: #9805: MegaBridge_3_2: Creating DB Root7DB  - PASSED
chains.sh: Creating Root CA Root7
certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7  -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -m 1128112849 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #9806: MegaBridge_3_2: Creating Root CA Root7  - PASSED
chains.sh: Exporting Root CA Root7.der
certutil -L -d Root7DB -r -n Root7 -o Root7.der
chains.sh: #9807: MegaBridge_3_2: Exporting Root CA Root7.der  - PASSED
chains.sh: Creating DB Root8DB
certutil -N -d Root8DB -f Root8DB/dbpasswd
chains.sh: #9808: MegaBridge_3_2: Creating DB Root8DB  - PASSED
chains.sh: Creating Root CA Root8
certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8  -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -m 1128112850 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #9809: MegaBridge_3_2: Creating Root CA Root8  - PASSED
chains.sh: Exporting Root CA Root8.der
certutil -L -d Root8DB -r -n Root8 -o Root8.der
chains.sh: #9810: MegaBridge_3_2: Exporting Root CA Root8.der  - PASSED
chains.sh: Creating DB Root9DB
certutil -N -d Root9DB -f Root9DB/dbpasswd
chains.sh: #9811: MegaBridge_3_2: Creating DB Root9DB  - PASSED
chains.sh: Creating Root CA Root9
certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9  -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -m 1128112851 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #9812: MegaBridge_3_2: Creating Root CA Root9  - PASSED
chains.sh: Exporting Root CA Root9.der
certutil -L -d Root9DB -r -n Root9 -o Root9.der
chains.sh: #9813: MegaBridge_3_2: Exporting Root CA Root9.der  - PASSED
chains.sh: Creating DB Bridge11DB
certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd
chains.sh: #9814: MegaBridge_3_2: Creating DB Bridge11DB  - PASSED
chains.sh: Creating Bridge certifiate request Bridge11Req.der
certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US"  -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o Bridge11Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #9815: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der  - PASSED
chains.sh: Creating certficate Bridge11Root1.der signed by Root1
certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 1128112852 -7 Bridge11@Root1  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #9816: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1  - PASSED
chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database
certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der
chains.sh: #9817: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database  - PASSED
chains.sh: Creating certficate Bridge11Root2.der signed by Root2
certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 1128112853 -7 Bridge11@Root2  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #9818: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2  - PASSED
chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database
certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der
chains.sh: #9819: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database  - PASSED
chains.sh: Creating certficate Bridge11Root3.der signed by Root3
certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 1128112854 -7 Bridge11@Root3  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #9820: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3  - PASSED
chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database
certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der
chains.sh: #9821: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database  - PASSED
chains.sh: Generating PKCS7 package from Bridge11DB database
cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7
chains.sh: #9822: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database  - PASSED
chains.sh: Creating DB Bridge12DB
certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd
chains.sh: #9823: MegaBridge_3_2: Creating DB Bridge12DB  - PASSED
chains.sh: Creating Bridge certifiate request Bridge12Req.der
certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US"  -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o Bridge12Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #9824: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der  - PASSED
chains.sh: Creating certficate Bridge12Root4.der signed by Root4
certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 1128112855 -7 Bridge12@Root4  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #9825: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4  - PASSED
chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database
certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der
chains.sh: #9826: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database  - PASSED
chains.sh: Creating certficate Bridge12Root5.der signed by Root5
certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 1128112856 -7 Bridge12@Root5  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #9827: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5  - PASSED
chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database
certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der
chains.sh: #9828: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database  - PASSED
chains.sh: Creating certficate Bridge12Root6.der signed by Root6
certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 1128112857 -7 Bridge12@Root6  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #9829: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6  - PASSED
chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database
certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der
chains.sh: #9830: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database  - PASSED
chains.sh: Generating PKCS7 package from Bridge12DB database
cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7
chains.sh: #9831: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database  - PASSED
chains.sh: Creating DB Bridge13DB
certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd
chains.sh: #9832: MegaBridge_3_2: Creating DB Bridge13DB  - PASSED
chains.sh: Creating Bridge certifiate request Bridge13Req.der
certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US"  -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o Bridge13Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #9833: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der  - PASSED
chains.sh: Creating certficate Bridge13Root7.der signed by Root7
certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 1128112858 -7 Bridge13@Root7  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #9834: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7  - PASSED
chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database
certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der
chains.sh: #9835: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database  - PASSED
chains.sh: Creating certficate Bridge13Root8.der signed by Root8
certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 1128112859 -7 Bridge13@Root8  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #9836: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8  - PASSED
chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database
certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der
chains.sh: #9837: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database  - PASSED
chains.sh: Creating certficate Bridge13Root9.der signed by Root9
certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 1128112860 -7 Bridge13@Root9  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #9838: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9  - PASSED
chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database
certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der
chains.sh: #9839: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database  - PASSED
chains.sh: Generating PKCS7 package from Bridge13DB database
cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7
chains.sh: #9840: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database  - PASSED
chains.sh: Creating DB Bridge21DB
certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd
chains.sh: #9841: MegaBridge_3_2: Creating DB Bridge21DB  - PASSED
chains.sh: Creating Bridge certifiate request Bridge21Req.der
certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US"  -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o Bridge21Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #9842: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der  - PASSED
chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11
certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 1128112861 -7 Bridge21@Bridge11  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #9843: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11  - PASSED
chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database
certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der
chains.sh: #9844: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database  - PASSED
chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12
certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 1128112862 -7 Bridge21@Bridge12  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #9845: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12  - PASSED
chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database
certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der
chains.sh: #9846: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database  - PASSED
chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13
certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 1128112863 -7 Bridge21@Bridge13  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #9847: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13  - PASSED
chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database
certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der
chains.sh: #9848: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database  - PASSED
chains.sh: Generating PKCS7 package from Bridge21DB database
cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7
chains.sh: #9849: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #9850: MegaBridge_3_2: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #9851: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21
certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 1128112864   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #9852: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21  - PASSED
chains.sh: Importing certificate CA1Bridge21.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der
chains.sh: #9853: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #9854: MegaBridge_3_2: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o EE1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #9855: MegaBridge_3_2: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1128112865   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #9856: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE1CA1.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der
chains.sh: #9857: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database  - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags  -d EE1DB     -t Root1.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der  -t Root1.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128112843 (0x433da2cb)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root1 ROOT CA,O=Root1,C=US"
        Validity:
            Not Before: Wed Nov 28 16:29:04 2012
            Not After : Tue Nov 28 16:29:04 2062
        Subject: "CN=Root1 ROOT CA,O=Root1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b1:c3:de:95:90:75:1b:62:10:bd:4c:3f:23:84:9d:52:
                    4f:e9:d8:af:29:ed:0e:f3:cc:09:c4:50:e9:ba:ba:e0:
                    dc:13:a4:79:c0:b8:20:35:39:93:26:61:e9:89:05:da:
                    d5:f1:8c:2d:d8:4e:ff:b6:ff:4b:fc:57:cf:98:19:5d:
                    ab:02:39:56:e6:a0:7e:4b:5c:c8:d3:e5:6c:14:88:98:
                    f6:74:8c:ac:fb:a4:f3:54:37:2b:8c:04:25:4f:98:4c:
                    63:bc:5c:3c:ae:05:5e:7d:f1:cd:30:12:e9:97:1e:a5:
                    6b:ac:ad:43:23:b9:b9:3d:57:9c:32:fa:b3:a0:c5:2f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:c3:c8:c2:68:17:04:20:df:84:cb:23:04:ba:e6:bb:
        88:b9:34:de:43:7c:e4:84:da:34:a6:44:51:c1:6b:40:
        5b:82:a4:af:f9:03:2e:c0:c1:d2:df:11:8b:e5:2e:e9:
        31:8c:c6:ca:33:89:49:58:d2:47:83:5e:a1:0c:c7:42:
        3a:96:20:13:7d:e9:e5:19:ae:97:be:cb:a1:e6:45:42:
        20:39:35:1a:55:16:d5:4f:e7:45:bd:74:ca:e3:77:9c:
        e1:a0:2d:58:f1:32:2d:04:2b:1a:5f:4f:74:63:a7:28:
        e4:f4:d5:dc:9f:53:e6:83:78:82:e9:17:0d:4b:3f:aa
    Fingerprint (MD5):
        1B:40:0E:D7:EB:F9:DF:7D:A8:16:24:ED:65:A5:1C:71
    Fingerprint (SHA1):
        07:47:A9:09:74:A2:01:07:F3:A3:01:F2:1D:67:CD:B2:97:4C:E8:31


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US"
Returned value is 0, expected result is pass
chains.sh: #9858: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags  -d EE1DB     -t Root1.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags  -d EE1DB     -t Root2.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der  -t Root2.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128112844 (0x433da2cc)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root2 ROOT CA,O=Root2,C=US"
        Validity:
            Not Before: Wed Nov 28 16:29:06 2012
            Not After : Tue Nov 28 16:29:06 2062
        Subject: "CN=Root2 ROOT CA,O=Root2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    9c:d7:20:d9:30:43:93:8a:da:59:27:c4:3b:45:44:51:
                    10:e8:96:05:91:a8:89:6a:83:1e:d6:cc:31:95:b7:f3:
                    a9:71:fc:39:3a:37:fd:39:97:48:7e:8d:8f:c9:af:e5:
                    b5:c2:54:5a:94:22:51:5c:cf:22:52:78:00:f1:3d:f7:
                    6c:e9:a6:de:16:24:45:37:00:dc:98:13:b8:dc:36:2e:
                    11:f7:f8:04:ab:ac:b1:43:03:30:f1:b3:ca:3a:e4:4b:
                    28:a2:6b:12:b7:37:e5:1f:2d:68:46:65:ae:b8:8a:42:
                    16:a2:2e:b4:8d:53:0f:80:61:3a:32:2e:55:13:0b:1b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        0b:19:af:a7:e1:3a:25:2d:bf:e3:e0:8c:79:f7:99:6d:
        41:2c:15:50:23:3c:f3:c3:9e:34:7c:6c:65:c2:da:6e:
        65:5d:3e:cf:5f:b5:f3:b8:fb:f8:48:6c:5e:32:e2:09:
        11:4c:5e:d2:f9:10:04:e1:17:d1:07:dc:39:60:cc:c8:
        a0:0f:e1:23:1a:eb:bd:22:97:7c:29:a3:5d:f1:e9:d3:
        92:36:e8:25:22:7c:9d:14:be:3a:d6:16:c3:76:e6:2c:
        2d:dc:8b:a4:5f:f1:30:56:30:2b:7d:34:14:35:af:13:
        99:e5:67:09:d3:ca:2d:60:2f:29:43:49:9c:90:37:e7
    Fingerprint (MD5):
        88:52:21:CE:4F:4D:72:F7:71:C3:37:1C:18:81:38:BC
    Fingerprint (SHA1):
        8A:61:8E:49:6B:1D:BF:46:5A:27:2E:CB:DD:FE:F3:EB:CF:21:F7:37


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US"
Returned value is 0, expected result is pass
chains.sh: #9859: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags  -d EE1DB     -t Root2.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags  -d EE1DB     -t Root3.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der  -t Root3.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128112845 (0x433da2cd)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root3 ROOT CA,O=Root3,C=US"
        Validity:
            Not Before: Wed Nov 28 16:29:09 2012
            Not After : Tue Nov 28 16:29:09 2062
        Subject: "CN=Root3 ROOT CA,O=Root3,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b9:7d:b5:49:92:26:02:3f:83:79:aa:55:7a:fe:23:3f:
                    82:96:36:90:8a:fa:55:6f:3e:9e:a0:1a:0f:1b:a9:c0:
                    22:c6:71:94:63:43:33:ec:4a:d6:67:9d:a9:72:03:ad:
                    34:f8:1c:d2:e6:30:82:63:7c:f0:7d:14:2b:d5:65:ad:
                    a5:6d:57:75:f9:d4:02:09:93:9d:ce:7c:15:02:4e:aa:
                    a3:9d:ca:81:a1:95:9b:64:bf:ca:90:96:86:ff:97:af:
                    47:fa:66:d0:de:c5:61:e1:14:f1:b7:a9:55:77:5a:ec:
                    5c:f1:cd:ef:3f:a7:fe:b0:c1:63:a6:1b:2f:7d:45:d5
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ad:76:2d:7c:41:21:05:c4:d4:d2:9b:ae:e2:8c:29:2a:
        d9:79:60:45:04:e3:70:a4:f2:ff:98:bc:f6:6d:e7:16:
        e4:9b:92:f6:1d:01:0f:5b:84:f6:e9:00:41:c8:33:d8:
        5b:f7:65:74:93:df:39:eb:56:75:b7:58:d1:e5:1d:82:
        69:8b:00:99:f3:62:4b:79:15:98:a2:97:b7:e1:26:d0:
        07:9c:8d:a9:4c:cd:b9:a7:40:62:7b:a6:94:88:61:7e:
        ec:1b:f9:3d:07:f6:91:a8:13:24:57:b8:f3:d7:6f:fa:
        5d:cc:76:fd:26:f8:25:8e:52:59:9e:4c:f6:b6:ca:1e
    Fingerprint (MD5):
        B7:A1:CC:56:51:40:F5:5F:E6:7F:EB:A2:97:21:C9:F3
    Fingerprint (SHA1):
        BC:4C:7D:CC:ED:FB:3C:C4:49:AB:6F:50:43:39:0F:4F:49:35:FE:55


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US"
Returned value is 0, expected result is pass
chains.sh: #9860: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags  -d EE1DB     -t Root3.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags  -d EE1DB     -t Root4.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der  -t Root4.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128112846 (0x433da2ce)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root4 ROOT CA,O=Root4,C=US"
        Validity:
            Not Before: Wed Nov 28 16:29:11 2012
            Not After : Tue Nov 28 16:29:11 2062
        Subject: "CN=Root4 ROOT CA,O=Root4,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c1:50:65:3a:20:f5:e5:fe:45:81:9e:ce:14:ac:ce:39:
                    80:d3:c3:07:77:6f:28:1b:01:60:0f:f0:0c:9c:cf:8a:
                    ce:f9:38:1a:86:c7:6f:22:3c:45:b7:bc:c2:5d:59:c2:
                    a4:17:4b:c6:09:71:84:7d:07:21:58:66:7c:59:ea:46:
                    3c:8a:6c:ee:bb:cb:77:90:8e:d7:f8:a7:e5:d1:98:19:
                    31:15:c4:e4:67:52:c3:5f:21:f0:65:f3:5c:d2:3e:a6:
                    34:bf:49:e3:43:1d:9a:21:90:f5:72:fb:5f:52:3e:f3:
                    e6:48:72:34:35:59:cb:a4:12:95:52:d7:99:d7:97:77
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        b7:27:92:78:6e:bf:15:b5:e3:39:33:78:37:c1:76:28:
        97:f8:15:a0:4f:3b:2a:52:b1:66:67:ab:a8:1d:7e:31:
        72:b9:8e:c3:38:6d:14:f1:53:39:c8:15:38:2d:7d:99:
        af:eb:59:78:ef:1a:56:df:a7:7b:a3:93:ea:46:81:7b:
        ab:23:fe:04:e5:40:c7:3c:e8:69:3f:8a:7a:54:a9:1b:
        7f:4c:f8:1e:4b:f2:95:7c:72:cb:69:25:32:fc:24:7d:
        6d:4e:1d:3b:90:12:29:15:27:0f:8b:69:9a:87:4a:bd:
        f7:15:b8:de:9a:ac:34:40:d9:fc:b1:1d:42:4d:e7:18
    Fingerprint (MD5):
        AE:CC:15:1E:DC:05:CC:EC:90:28:C9:9C:00:13:B6:B8
    Fingerprint (SHA1):
        78:3C:4C:F2:1C:84:98:D2:72:57:F5:E2:02:DF:F3:C4:90:4F:4E:6C


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US"
Returned value is 0, expected result is pass
chains.sh: #9861: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags  -d EE1DB     -t Root4.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags  -d EE1DB     -t Root5.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der  -t Root5.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128112847 (0x433da2cf)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root5 ROOT CA,O=Root5,C=US"
        Validity:
            Not Before: Wed Nov 28 16:29:13 2012
            Not After : Tue Nov 28 16:29:13 2062
        Subject: "CN=Root5 ROOT CA,O=Root5,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d0:eb:24:aa:37:2d:5d:ae:4e:8f:09:18:a9:63:05:18:
                    85:18:ae:66:9f:45:d2:57:6b:45:e4:d1:9f:d3:e9:f7:
                    c7:86:6f:9d:ef:e3:ed:01:72:46:f2:28:71:31:f6:4f:
                    65:ce:53:de:80:92:12:43:df:c6:96:5e:30:44:9b:69:
                    9e:ac:72:15:50:b2:46:a3:27:ac:8c:9d:c6:a5:c0:4b:
                    ab:6e:55:69:32:09:0a:d9:1b:c4:2f:fd:0b:13:d2:3a:
                    17:49:08:5d:ea:fb:06:8f:ad:ec:59:4f:5e:51:f8:45:
                    7b:51:81:0b:4d:b3:d4:15:7e:cb:1b:c0:fc:e7:07:6b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        32:06:c2:35:b4:8d:42:04:2f:0a:73:1f:1f:41:2a:49:
        47:56:a6:02:e1:8c:88:70:22:b0:db:68:5c:ed:79:c2:
        f1:fa:6a:bf:04:1b:f8:a6:f0:6d:22:b4:d1:84:61:90:
        d5:d5:a8:0a:1e:fd:61:1d:f8:10:4d:3d:5b:81:9d:ab:
        23:38:00:34:33:fe:08:3e:f1:3c:da:57:fc:81:a2:81:
        1a:7d:e8:af:e9:66:08:1e:f6:9a:0a:12:c7:bf:60:06:
        f7:a6:94:eb:69:c2:f1:73:ea:b1:37:de:bf:d5:a5:83:
        5b:9a:22:77:dd:58:12:3d:bb:4b:1a:40:cb:c1:b7:6d
    Fingerprint (MD5):
        8F:A1:62:E8:00:F6:74:87:DC:16:C7:96:34:4E:2F:1F
    Fingerprint (SHA1):
        E6:58:E7:45:7C:59:97:03:B7:3A:9E:B3:68:27:02:DC:85:0C:35:A4


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US"
Returned value is 0, expected result is pass
chains.sh: #9862: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags  -d EE1DB     -t Root5.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags  -d EE1DB     -t Root6.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der  -t Root6.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128112848 (0x433da2d0)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root6 ROOT CA,O=Root6,C=US"
        Validity:
            Not Before: Wed Nov 28 16:29:15 2012
            Not After : Tue Nov 28 16:29:15 2062
        Subject: "CN=Root6 ROOT CA,O=Root6,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ac:96:9b:b2:37:cd:e4:10:04:6c:47:b7:47:7b:4d:bc:
                    44:78:46:5f:e4:c8:65:27:57:61:dc:c0:d0:34:6c:ba:
                    b3:21:00:32:1a:ce:cf:75:df:00:59:12:84:1e:d2:3c:
                    a6:58:ad:5f:f3:a5:54:10:7d:71:63:43:9e:63:ff:2d:
                    93:2d:17:fa:d9:d7:5a:cf:d0:3a:ba:20:e5:22:89:8a:
                    f8:d6:68:89:0e:0a:cd:64:4d:79:00:19:4a:63:6f:24:
                    ee:dc:26:ba:38:7a:d5:56:aa:b8:40:fc:b7:49:cd:46:
                    3e:7f:8c:7c:46:49:3a:a0:7f:85:0e:38:18:1c:bb:cf
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        52:67:d6:86:76:0b:83:44:3c:84:90:69:7d:a7:2c:09:
        03:27:50:4e:a4:f5:f5:aa:6b:ce:01:32:72:fc:f4:0d:
        54:76:96:2e:79:94:67:4d:d4:7f:2d:9a:2e:f1:c0:d2:
        a3:46:f8:75:0a:3e:21:7d:f3:2f:4e:1f:a9:fe:4a:5e:
        de:b2:8f:6d:ff:4b:1d:47:17:11:7a:3a:43:7f:af:5b:
        77:94:4c:e7:a1:62:85:13:9c:77:91:22:c7:1b:0c:0d:
        9c:17:90:a2:b1:42:d7:76:9c:e8:cd:4b:23:cf:6c:69:
        a9:0e:46:31:b5:a9:3e:c4:27:3b:2c:7e:81:46:65:83
    Fingerprint (MD5):
        47:71:20:AE:1E:D4:16:9B:79:FA:C6:D4:62:EA:46:58
    Fingerprint (SHA1):
        B7:86:4A:1D:92:F2:97:E8:E6:3B:A0:0F:77:70:F2:E0:EB:41:1B:44


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US"
Returned value is 0, expected result is pass
chains.sh: #9863: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags  -d EE1DB     -t Root6.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags  -d EE1DB     -t Root7.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der  -t Root7.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128112849 (0x433da2d1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root7 ROOT CA,O=Root7,C=US"
        Validity:
            Not Before: Wed Nov 28 16:29:17 2012
            Not After : Tue Nov 28 16:29:17 2062
        Subject: "CN=Root7 ROOT CA,O=Root7,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    9a:0e:3a:45:7b:47:1b:69:8e:28:8f:70:c3:19:61:08:
                    31:34:ef:f2:f8:c4:4b:26:2a:03:ed:9a:98:cc:82:ab:
                    5f:ad:1b:f9:c5:c0:71:09:87:21:89:12:1e:f1:ea:f6:
                    11:ba:0b:4e:2f:3d:dd:86:65:e3:22:06:de:a5:7b:81:
                    e3:fa:04:85:51:83:04:a8:67:29:94:b7:74:db:5c:30:
                    05:24:3b:2b:a4:78:6e:70:96:72:7e:7b:db:5c:7e:31:
                    18:db:24:5e:93:61:75:dd:3a:9a:51:fe:5e:d9:02:1f:
                    4d:70:f6:72:ac:39:8c:95:a8:15:b4:87:78:57:f5:21
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        10:51:b3:7b:58:e6:19:46:4d:6d:8d:83:58:f6:8e:a1:
        81:9e:e0:d3:51:de:11:bb:2d:6c:54:ab:6f:83:c2:e4:
        7b:c5:92:1a:f7:f1:03:31:a0:03:c1:37:9a:34:b0:15:
        e7:df:13:d7:c8:f5:4c:02:1b:1c:f9:b7:2b:1c:a4:88:
        ca:ee:25:ec:07:28:a6:72:fc:e3:95:92:71:ac:63:99:
        85:ac:96:c8:22:de:27:f1:b8:31:26:19:6a:5f:7f:1d:
        8a:07:a1:97:79:fc:1e:f8:34:a9:74:9e:79:f2:53:4c:
        86:ca:3c:cb:7c:e3:ec:87:42:61:6e:6f:3a:5d:c5:c9
    Fingerprint (MD5):
        AE:BE:98:0B:19:37:96:9A:25:7D:9D:1E:8D:00:BA:B1
    Fingerprint (SHA1):
        8F:C8:BE:19:A6:64:1B:C4:85:7C:A6:3D:05:F4:BE:EB:BD:74:41:62


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US"
Returned value is 0, expected result is pass
chains.sh: #9864: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags  -d EE1DB     -t Root7.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags  -d EE1DB     -t Root8.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der  -t Root8.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128112850 (0x433da2d2)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root8 ROOT CA,O=Root8,C=US"
        Validity:
            Not Before: Wed Nov 28 16:29:19 2012
            Not After : Tue Nov 28 16:29:19 2062
        Subject: "CN=Root8 ROOT CA,O=Root8,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    de:49:56:d3:63:70:be:c5:d9:00:95:c2:d8:a8:92:e4:
                    cb:d8:6f:76:d4:71:92:34:ed:58:cd:29:69:04:2d:47:
                    5b:b7:86:5d:83:5c:4b:98:f8:c8:26:f5:03:90:6f:f6:
                    34:56:51:a3:22:dc:17:21:46:1c:c3:75:77:f0:f4:d3:
                    80:dd:d1:29:20:28:f9:4d:72:1f:af:60:fa:35:80:03:
                    95:4b:dc:f1:26:8c:e0:89:de:b8:0c:5c:9c:fb:ba:6c:
                    10:91:3d:ef:37:21:25:46:6d:74:7f:f9:fd:5f:a8:3c:
                    c3:f4:0a:c4:c0:62:19:13:e2:b7:ab:0c:11:b5:56:db
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        d5:30:a3:5a:51:a9:f0:b3:b5:37:97:c7:3c:d1:6c:0a:
        e0:14:d7:bd:86:31:e6:23:ee:ce:a2:1a:6f:00:5a:01:
        4b:6d:05:68:e7:fe:6b:5b:f0:63:a1:b4:44:6d:73:cc:
        68:9b:bc:e5:13:03:88:b4:71:90:d3:85:dd:e4:0a:ac:
        2d:a2:74:68:4c:f4:16:d6:16:d7:4d:b8:89:6c:f7:96:
        34:9b:1a:4a:11:aa:56:f9:99:51:4c:e6:ad:7c:af:8c:
        e6:e1:e9:4e:49:76:61:ca:c9:c0:9c:bd:68:a6:c2:42:
        36:f7:b5:c7:ce:cd:1d:f9:66:4d:65:fc:70:54:ce:dc
    Fingerprint (MD5):
        3B:05:02:62:14:F8:72:2C:DF:83:37:12:37:40:D7:10
    Fingerprint (SHA1):
        01:AC:EA:72:D2:72:D3:E3:57:3A:6D:F3:C4:CD:80:B1:57:82:DC:E6


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US"
Returned value is 0, expected result is pass
chains.sh: #9865: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags  -d EE1DB     -t Root8.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags  -d EE1DB     -t Root9.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der  -t Root9.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128112851 (0x433da2d3)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root9 ROOT CA,O=Root9,C=US"
        Validity:
            Not Before: Wed Nov 28 16:29:21 2012
            Not After : Tue Nov 28 16:29:21 2062
        Subject: "CN=Root9 ROOT CA,O=Root9,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ce:78:8f:c0:0a:a6:f6:1b:89:97:b4:13:09:b1:3e:95:
                    81:07:fe:d3:44:31:30:9d:0b:44:50:05:d4:0c:6b:ee:
                    a8:6c:5c:8d:93:76:eb:8c:9e:f6:cc:eb:ec:78:ee:cd:
                    ff:4c:04:33:d5:f8:2d:53:b3:5d:c3:54:08:e2:bb:5d:
                    8b:ca:64:f8:d2:16:ac:6b:c0:6c:10:fb:ba:62:6b:44:
                    ff:ac:0f:a7:b2:ce:89:ba:ed:cf:67:0b:99:27:64:e4:
                    b9:a7:64:b2:08:39:65:2b:37:17:5e:0a:9f:9e:a0:65:
                    44:28:b5:60:46:da:3c:7c:0e:81:86:04:44:e3:0a:85
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1b:a5:44:15:0d:2e:0e:57:20:05:08:fc:ac:9c:9d:70:
        9d:ad:79:dd:06:1c:82:d5:12:26:bd:cf:6d:16:ec:48:
        8e:d2:05:b7:cd:84:2e:7c:ca:ef:7c:54:b9:0e:84:9b:
        8f:d3:63:2e:2a:71:58:9e:84:66:97:c0:80:73:ed:40:
        e3:12:75:50:5b:b8:5e:85:4b:a5:0b:3f:fc:5c:8e:c7:
        8b:e9:62:15:c5:2f:f5:a0:24:a5:d6:55:53:27:76:d1:
        9f:a0:ed:ce:c6:c6:1d:da:65:f4:2a:93:80:0d:49:84:
        e2:c5:e8:b4:2b:85:03:d8:3c:06:e6:43:63:03:c8:73
    Fingerprint (MD5):
        F9:78:3A:F2:5B:FA:AE:99:83:9D:AC:28:AE:E3:59:F6
    Fingerprint (SHA1):
        7A:93:B4:5D:51:7B:D7:16:24:C7:11:84:6C:0C:BF:1A:35:4A:FE:B3


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US"
Returned value is 0, expected result is pass
chains.sh: #9866: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags  -d EE1DB     -t Root9.der - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #9867: Extension: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -m 1128112866 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #9868: Extension: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #9869: Extension: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #9870: Extension: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #9871: Extension: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1128112867   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #9872: Extension: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
chains.sh: #9873: Extension: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #9874: Extension: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #9875: Extension: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1128112868   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #9876: Extension: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
chains.sh: #9877: Extension: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB UserDB
certutil -N -d UserDB -f UserDB/dbpasswd
chains.sh: #9878: Extension: Creating DB UserDB  - PASSED
chains.sh: Creating EE certifiate request UserReq.der
certutil -s "CN=User EE, O=User, C=US"  -R  -d UserDB -f UserDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o UserReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #9879: Extension: Creating EE certifiate request UserReq.der  - PASSED
chains.sh: Creating certficate UserCA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1128112869   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #9880: Extension: Creating certficate UserCA2.der signed by CA2  - PASSED
chains.sh: Importing certificate UserCA2.der to UserDB database
certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der
chains.sh: #9881: Extension: Importing certificate UserCA2.der to UserDB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #9882: Extension: Creating DB AllDB  - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der CA2CA1.der CA1Root.der Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128112866 (0x433da2e2)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:29:41 2012
            Not After : Tue Nov 28 16:29:41 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d6:b1:db:51:c7:df:02:27:3e:cd:12:65:84:66:b4:a4:
                    41:19:0f:d0:07:bd:42:df:72:e9:ed:71:b8:fd:ce:ab:
                    ea:ba:99:f0:4c:b0:9a:78:85:43:88:8a:ac:6a:b6:cb:
                    5a:dc:e8:26:3a:08:bd:c2:bf:80:52:b9:79:a7:46:ee:
                    73:a2:29:a5:15:99:44:32:a8:96:40:f4:ba:b6:7d:fe:
                    8d:9b:cd:23:09:aa:53:3f:93:60:e5:e6:60:b5:27:c4:
                    99:62:58:e8:d9:cc:1f:a5:f2:6e:ac:80:ef:fb:86:8d:
                    52:68:fd:70:54:23:55:bc:03:ed:db:9f:1d:89:1a:61
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        49:90:49:fb:05:31:e3:3a:c9:83:67:a7:5e:e6:59:ea:
        27:7f:d8:5f:15:77:1e:8c:08:d9:74:e9:f4:48:ec:18:
        da:04:47:66:87:55:c8:5e:39:49:37:41:d6:1a:3c:21:
        e9:4b:18:36:50:56:61:31:ae:19:9b:93:4b:0d:d4:7d:
        38:99:f7:e4:af:6f:99:b1:2f:af:a4:26:71:55:05:5a:
        bc:36:1d:db:0c:b2:db:f0:5f:9b:96:6d:5f:9f:5a:f4:
        f6:07:e5:e7:a2:2d:03:42:29:b0:ed:af:fd:18:24:f2:
        6c:5b:54:4f:84:16:7a:5b:07:2b:af:ee:e8:64:e7:4f
    Fingerprint (MD5):
        9A:86:A8:51:15:03:0A:93:18:63:7B:34:97:43:D1:C4
    Fingerprint (SHA1):
        3F:9D:ED:16:BA:FF:94:3D:B7:A9:FC:37:32:DF:6B:94:1F:93:8B:49


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #9883: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der Root.der with flags  -d AllDB    -o OID.2.0  -t Root.der
vfychain -d AllDB -pp -vv     -o OID.2.0  UserCA2.der CA2CA1.der CA1Root.der Root.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #9884: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der Root.der with flags  -d AllDB    -o OID.2.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der with flags  -d AllDB    -o OID.1.0  -t CA1Root.der
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der CA2CA1.der CA1Root.der  -t CA1Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128112867 (0x433da2e3)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:29:43 2012
            Not After : Tue Nov 28 16:29:43 2017
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d2:97:ae:ce:81:2e:60:e8:51:ed:74:0a:c5:ad:bf:ca:
                    9f:50:b7:a6:69:97:a8:af:2d:83:86:3d:31:24:23:bb:
                    4c:7c:d6:33:be:e8:4d:6b:ab:ba:38:5d:9b:b1:8d:03:
                    b6:d3:ff:eb:67:37:37:9e:80:c5:cc:36:f2:b4:e1:36:
                    78:86:14:e8:c8:a1:15:d9:5d:2b:2d:f0:c6:7a:33:73:
                    33:c2:44:29:da:46:30:4e:28:a9:13:d3:c4:ab:41:18:
                    b5:6f:3f:a1:4a:30:b3:32:77:60:53:e2:91:27:92:29:
                    37:39:b5:38:ed:fc:77:d3:0b:5d:fc:bb:87:f0:0e:25
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        78:a5:89:9b:db:74:24:71:00:a8:c4:c4:f9:dd:6c:fb:
        47:0c:88:7c:50:f2:cf:c6:cc:c4:34:ad:da:a3:93:7e:
        b2:0b:61:c4:95:ce:01:d5:17:18:61:9c:d7:af:ea:33:
        56:48:aa:47:12:83:68:19:17:01:43:ae:a8:6c:01:dd:
        d0:c2:e7:52:d4:4b:76:da:ff:cd:82:4c:21:5d:06:c5:
        80:4e:74:c3:d3:4c:eb:25:a4:cf:ed:a5:39:e9:25:f9:
        9c:23:62:d3:84:5a:bb:0a:f4:7e:9b:98:25:ab:7a:d7:
        4a:47:53:71:f8:46:bf:99:54:9f:e0:c1:53:05:26:c2
    Fingerprint (MD5):
        7B:84:B0:F6:F5:40:AF:46:A4:F0:8F:0B:F6:13:4F:4F
    Fingerprint (SHA1):
        E2:AD:FC:F5:C5:A8:2F:D8:A3:00:15:ED:CE:6F:53:B9:8B:53:A2:54


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #9885: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der with flags  -d AllDB    -o OID.1.0  -t CA1Root.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der with flags  -d AllDB    -o OID.2.0  -t CA1Root.der
vfychain -d AllDB -pp -vv     -o OID.2.0  UserCA2.der CA2CA1.der CA1Root.der  -t CA1Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #9886: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der with flags  -d AllDB    -o OID.2.0  -t CA1Root.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags  -d AllDB    -o OID.1.0  -t CA2CA1.der
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der CA2CA1.der  -t CA2CA1.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128112868 (0x433da2e4)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Wed Nov 28 16:29:45 2012
            Not After : Tue Nov 28 16:29:45 2017
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c8:50:5c:a4:8d:33:bf:9f:a7:29:b0:93:20:51:fd:b5:
                    54:8b:28:c0:97:62:e6:91:bc:eb:d7:18:2b:6d:ff:bf:
                    ea:23:8f:d2:53:a4:8c:ad:3a:39:ec:9f:d8:31:88:00:
                    23:3f:0e:b3:ab:d6:96:3c:e3:0f:f4:cd:60:f8:0b:ea:
                    0a:5b:02:c5:64:fe:b8:34:af:21:ef:96:fe:ad:25:c1:
                    bb:77:29:02:c9:19:fd:ff:36:05:12:95:7b:ca:fe:c7:
                    61:48:2d:97:99:30:47:d4:31:85:0c:c1:78:45:e3:fc:
                    bf:f1:0a:3a:2c:a0:63:91:3a:60:ac:4e:a9:9f:fb:b7
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        45:95:d1:15:b1:29:57:8f:cd:86:1e:82:78:37:20:74:
        d6:3d:b3:f3:68:3e:d4:1b:19:b3:00:ac:cb:f9:3c:a8:
        f1:31:96:65:8c:65:72:d4:5f:07:84:98:a1:d1:76:a3:
        e7:36:0d:6d:16:b0:76:28:e3:8b:05:4d:1d:19:b5:0e:
        f0:2e:01:29:a2:54:61:45:39:e4:1b:b0:e8:1f:e5:e9:
        ab:1f:2b:7a:c6:e5:65:de:91:e2:12:08:a7:8d:d3:18:
        ca:ed:ef:0f:62:58:67:5e:09:09:72:64:53:74:0b:ce:
        ac:4f:a3:3d:09:b9:f6:78:fe:0d:fb:e3:1b:24:e5:d8
    Fingerprint (MD5):
        6B:7F:31:2D:50:04:0B:AB:BF:47:0C:70:C0:F1:E8:71
    Fingerprint (SHA1):
        40:D4:D5:F8:8C:DD:E6:87:39:DB:3B:0A:87:C5:D4:FC:3A:F9:A3:C8


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Returned value is 0, expected result is pass
chains.sh: #9887: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags  -d AllDB    -o OID.1.0  -t CA2CA1.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags  -d AllDB    -o OID.2.0  -t CA2CA1.der
vfychain -d AllDB -pp -vv     -o OID.2.0  UserCA2.der CA2CA1.der  -t CA2CA1.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #9888: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags  -d AllDB    -o OID.2.0  -t CA2CA1.der - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #9889: Extension: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA1Root.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der
chains.sh: #9890: Extension: Importing certificate CA1Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA1.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der
chains.sh: #9891: Extension: Importing certificate CA2CA1.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t Root
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128112866 (0x433da2e2)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:29:41 2012
            Not After : Tue Nov 28 16:29:41 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d6:b1:db:51:c7:df:02:27:3e:cd:12:65:84:66:b4:a4:
                    41:19:0f:d0:07:bd:42:df:72:e9:ed:71:b8:fd:ce:ab:
                    ea:ba:99:f0:4c:b0:9a:78:85:43:88:8a:ac:6a:b6:cb:
                    5a:dc:e8:26:3a:08:bd:c2:bf:80:52:b9:79:a7:46:ee:
                    73:a2:29:a5:15:99:44:32:a8:96:40:f4:ba:b6:7d:fe:
                    8d:9b:cd:23:09:aa:53:3f:93:60:e5:e6:60:b5:27:c4:
                    99:62:58:e8:d9:cc:1f:a5:f2:6e:ac:80:ef:fb:86:8d:
                    52:68:fd:70:54:23:55:bc:03:ed:db:9f:1d:89:1a:61
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        49:90:49:fb:05:31:e3:3a:c9:83:67:a7:5e:e6:59:ea:
        27:7f:d8:5f:15:77:1e:8c:08:d9:74:e9:f4:48:ec:18:
        da:04:47:66:87:55:c8:5e:39:49:37:41:d6:1a:3c:21:
        e9:4b:18:36:50:56:61:31:ae:19:9b:93:4b:0d:d4:7d:
        38:99:f7:e4:af:6f:99:b1:2f:af:a4:26:71:55:05:5a:
        bc:36:1d:db:0c:b2:db:f0:5f:9b:96:6d:5f:9f:5a:f4:
        f6:07:e5:e7:a2:2d:03:42:29:b0:ed:af:fd:18:24:f2:
        6c:5b:54:4f:84:16:7a:5b:07:2b:af:ee:e8:64:e7:4f
    Fingerprint (MD5):
        9A:86:A8:51:15:03:0A:93:18:63:7B:34:97:43:D1:C4
    Fingerprint (SHA1):
        3F:9D:ED:16:BA:FF:94:3D:B7:A9:FC:37:32:DF:6B:94:1F:93:8B:49

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #9892: Extension: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.2.0  -t Root
vfychain -d AllDB -pp -vv     -o OID.2.0  UserCA2.der  -t Root
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #9893: Extension: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.2.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t CA1
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128112867 (0x433da2e3)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:29:43 2012
            Not After : Tue Nov 28 16:29:43 2017
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d2:97:ae:ce:81:2e:60:e8:51:ed:74:0a:c5:ad:bf:ca:
                    9f:50:b7:a6:69:97:a8:af:2d:83:86:3d:31:24:23:bb:
                    4c:7c:d6:33:be:e8:4d:6b:ab:ba:38:5d:9b:b1:8d:03:
                    b6:d3:ff:eb:67:37:37:9e:80:c5:cc:36:f2:b4:e1:36:
                    78:86:14:e8:c8:a1:15:d9:5d:2b:2d:f0:c6:7a:33:73:
                    33:c2:44:29:da:46:30:4e:28:a9:13:d3:c4:ab:41:18:
                    b5:6f:3f:a1:4a:30:b3:32:77:60:53:e2:91:27:92:29:
                    37:39:b5:38:ed:fc:77:d3:0b:5d:fc:bb:87:f0:0e:25
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        78:a5:89:9b:db:74:24:71:00:a8:c4:c4:f9:dd:6c:fb:
        47:0c:88:7c:50:f2:cf:c6:cc:c4:34:ad:da:a3:93:7e:
        b2:0b:61:c4:95:ce:01:d5:17:18:61:9c:d7:af:ea:33:
        56:48:aa:47:12:83:68:19:17:01:43:ae:a8:6c:01:dd:
        d0:c2:e7:52:d4:4b:76:da:ff:cd:82:4c:21:5d:06:c5:
        80:4e:74:c3:d3:4c:eb:25:a4:cf:ed:a5:39:e9:25:f9:
        9c:23:62:d3:84:5a:bb:0a:f4:7e:9b:98:25:ab:7a:d7:
        4a:47:53:71:f8:46:bf:99:54:9f:e0:c1:53:05:26:c2
    Fingerprint (MD5):
        7B:84:B0:F6:F5:40:AF:46:A4:F0:8F:0B:F6:13:4F:4F
    Fingerprint (SHA1):
        E2:AD:FC:F5:C5:A8:2F:D8:A3:00:15:ED:CE:6F:53:B9:8B:53:A2:54

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #9894: Extension: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.2.0  -t CA1
vfychain -d AllDB -pp -vv     -o OID.2.0  UserCA2.der  -t CA1
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CA1 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #9895: Extension: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.2.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t CA2
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128112868 (0x433da2e4)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Wed Nov 28 16:29:45 2012
            Not After : Tue Nov 28 16:29:45 2017
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c8:50:5c:a4:8d:33:bf:9f:a7:29:b0:93:20:51:fd:b5:
                    54:8b:28:c0:97:62:e6:91:bc:eb:d7:18:2b:6d:ff:bf:
                    ea:23:8f:d2:53:a4:8c:ad:3a:39:ec:9f:d8:31:88:00:
                    23:3f:0e:b3:ab:d6:96:3c:e3:0f:f4:cd:60:f8:0b:ea:
                    0a:5b:02:c5:64:fe:b8:34:af:21:ef:96:fe:ad:25:c1:
                    bb:77:29:02:c9:19:fd:ff:36:05:12:95:7b:ca:fe:c7:
                    61:48:2d:97:99:30:47:d4:31:85:0c:c1:78:45:e3:fc:
                    bf:f1:0a:3a:2c:a0:63:91:3a:60:ac:4e:a9:9f:fb:b7
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        45:95:d1:15:b1:29:57:8f:cd:86:1e:82:78:37:20:74:
        d6:3d:b3:f3:68:3e:d4:1b:19:b3:00:ac:cb:f9:3c:a8:
        f1:31:96:65:8c:65:72:d4:5f:07:84:98:a1:d1:76:a3:
        e7:36:0d:6d:16:b0:76:28:e3:8b:05:4d:1d:19:b5:0e:
        f0:2e:01:29:a2:54:61:45:39:e4:1b:b0:e8:1f:e5:e9:
        ab:1f:2b:7a:c6:e5:65:de:91:e2:12:08:a7:8d:d3:18:
        ca:ed:ef:0f:62:58:67:5e:09:09:72:64:53:74:0b:ce:
        ac:4f:a3:3d:09:b9:f6:78:fe:0d:fb:e3:1b:24:e5:d8
    Fingerprint (MD5):
        6B:7F:31:2D:50:04:0B:AB:BF:47:0C:70:C0:F1:E8:71
    Fingerprint (SHA1):
        40:D4:D5:F8:8C:DD:E6:87:39:DB:3B:0A:87:C5:D4:FC:3A:F9:A3:C8

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Returned value is 0, expected result is pass
chains.sh: #9896: Extension: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.2.0  -t CA2
vfychain -d AllDB -pp -vv     -o OID.2.0  UserCA2.der  -t CA2
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CA2 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #9897: Extension: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.2.0  -t CA2 - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #9898: Extension2: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -m 1128112870 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #9899: Extension2: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #9900: Extension2: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #9901: Extension2: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #9902: Extension2: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1128112871   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #9903: Extension2: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
chains.sh: #9904: Extension2: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #9905: Extension2: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #9906: Extension2: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1128112872   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #9907: Extension2: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
chains.sh: #9908: Extension2: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB User1DB
certutil -N -d User1DB -f User1DB/dbpasswd
chains.sh: #9909: Extension2: Creating DB User1DB  - PASSED
chains.sh: Creating EE certifiate request User1Req.der
certutil -s "CN=User1 EE, O=User1, C=US"  -R  -d User1DB -f User1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o User1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #9910: Extension2: Creating EE certifiate request User1Req.der  - PASSED
chains.sh: Creating certficate User1CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1128112873   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #9911: Extension2: Creating certficate User1CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate User1CA2.der to User1DB database
certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der
chains.sh: #9912: Extension2: Importing certificate User1CA2.der to User1DB database  - PASSED
chains.sh: Creating DB User2DB
certutil -N -d User2DB -f User2DB/dbpasswd
chains.sh: #9913: Extension2: Creating DB User2DB  - PASSED
chains.sh: Creating EE certifiate request User2Req.der
certutil -s "CN=User2 EE, O=User2, C=US"  -R  -d User2DB -f User2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o User2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #9914: Extension2: Creating EE certifiate request User2Req.der  - PASSED
chains.sh: Creating certficate User2CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1128112874   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #9915: Extension2: Creating certficate User2CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate User2CA2.der to User2DB database
certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der
chains.sh: #9916: Extension2: Importing certificate User2CA2.der to User2DB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #9917: Extension2: Creating DB AllDB  - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der
vfychain -d AllDB -pp -vv     -o OID.1.0  User1CA2.der CA2CA1.der CA1Root.der Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128112870 (0x433da2e6)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:29:52 2012
            Not After : Tue Nov 28 16:29:52 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:1e:67:06:13:dc:ec:46:72:b0:b0:b9:dc:dc:ee:e4:
                    8a:fd:20:4c:e8:b1:71:5f:6a:39:a1:0f:ba:53:2e:1e:
                    c7:5a:68:16:bd:95:85:fd:12:1d:bc:ef:36:7d:9d:04:
                    c4:7a:86:43:5b:5f:76:3a:7b:7a:be:98:ba:00:d5:14:
                    dd:df:ac:c6:eb:60:ad:6c:bb:eb:26:11:55:dd:65:6a:
                    5f:bf:38:55:7b:3f:8b:19:ca:bc:5d:1f:1f:54:ec:e1:
                    17:1f:b1:97:e8:f2:b3:06:54:a1:a1:ee:c9:8a:ef:86:
                    3d:41:05:2a:be:51:05:88:0c:53:2e:91:c1:e7:35:69
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        75:10:71:d6:88:ad:51:6b:b9:97:58:b0:4a:be:86:b8:
        12:76:ad:38:c2:e9:92:05:56:93:2e:99:5e:e3:ac:5a:
        6e:82:b7:4a:75:f4:65:f2:8b:8f:2a:df:f6:d9:e3:08:
        be:38:88:0e:4c:30:25:17:ba:35:17:c5:5e:9d:dc:0d:
        66:30:da:0c:1b:3b:3b:2d:0c:d7:3f:1a:ce:77:92:7f:
        0e:3b:8b:db:de:ea:ae:ff:4b:17:c2:7a:38:96:f0:85:
        bb:3e:42:d4:a3:dc:41:96:2e:7f:cd:6d:ce:1c:ec:37:
        a9:12:19:1c:19:7a:ea:22:b8:8b:0c:0e:a2:5e:7b:ec
    Fingerprint (MD5):
        BF:34:D4:7F:1D:34:A8:B7:9A:68:80:41:61:4C:5E:1D
    Fingerprint (SHA1):
        11:C4:9F:54:37:26:DE:BE:41:7F:78:8A:8C:C6:6B:7D:0A:54:C8:F7


Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #9918: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der Root.der with flags  -d AllDB    -o OID.2.0  -t Root.der
vfychain -d AllDB -pp -vv     -o OID.2.0  User1CA2.der CA2CA1.der CA1Root.der Root.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #9919: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der Root.der with flags  -d AllDB    -o OID.2.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der with flags  -d AllDB    -o OID.1.0  -t CA1Root.der
vfychain -d AllDB -pp -vv     -o OID.1.0  User1CA2.der CA2CA1.der CA1Root.der  -t CA1Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128112871 (0x433da2e7)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:29:55 2012
            Not After : Tue Nov 28 16:29:55 2017
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d3:e6:00:e2:ea:3c:8a:f6:6e:64:96:9b:c5:10:d2:ca:
                    44:a0:5a:85:6f:a6:ea:5d:c8:7e:8a:d5:40:77:ad:b1:
                    de:2d:91:e3:50:b2:a4:42:55:5f:3e:85:27:4f:8b:e3:
                    4c:61:aa:db:d9:2d:36:60:fa:ca:a3:7e:ef:7b:35:50:
                    5f:bc:0e:e1:1e:fa:10:ef:60:24:ff:2e:15:a0:1a:3b:
                    b7:ab:c2:30:13:f8:14:a6:5d:08:c8:60:93:08:f5:21:
                    9c:66:e6:84:04:58:ae:70:7c:a5:df:4a:97:9d:7a:43:
                    1c:f8:b4:81:30:f7:02:6f:85:be:10:8a:83:df:b9:73
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        25:d4:a2:7d:df:35:01:bf:73:63:cd:95:c1:fe:2e:99:
        6c:6d:b2:6a:a7:4d:a0:e2:4e:63:af:e2:36:8d:a0:29:
        26:cd:78:88:89:fe:a2:af:7f:f3:23:e6:8d:e2:1b:85:
        b7:29:85:a4:17:8e:0d:a8:b1:ea:1d:21:80:17:52:6a:
        e0:81:88:48:b3:03:c6:24:7d:6c:db:bc:24:85:1e:ce:
        ba:61:13:36:c3:b3:e2:a5:1d:03:80:e2:70:5c:d7:dc:
        6e:04:c4:21:e7:a6:48:ea:80:c8:b2:f6:fd:59:2e:ad:
        47:79:37:39:70:b5:19:73:2b:64:56:36:18:7f:50:1c
    Fingerprint (MD5):
        1D:0D:D9:2B:4A:5E:5B:86:E1:0D:BD:A4:62:76:88:C6
    Fingerprint (SHA1):
        13:3F:EB:DC:92:4A:20:C4:A6:B4:9F:1F:53:96:E0:E6:E3:5B:D6:F5


Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #9920: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der with flags  -d AllDB    -o OID.1.0  -t CA1Root.der - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der with flags  -d AllDB    -o OID.2.0  -t CA1Root.der
vfychain -d AllDB -pp -vv     -o OID.2.0  User1CA2.der CA2CA1.der CA1Root.der  -t CA1Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #9921: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der with flags  -d AllDB    -o OID.2.0  -t CA1Root.der - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der with flags  -d AllDB    -o OID.1.0  -t CA2CA1.der
vfychain -d AllDB -pp -vv     -o OID.1.0  User1CA2.der CA2CA1.der  -t CA2CA1.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128112872 (0x433da2e8)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Wed Nov 28 16:29:57 2012
            Not After : Tue Nov 28 16:29:57 2017
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d2:c4:ef:9c:95:d4:75:55:24:29:76:d3:fc:51:c9:53:
                    9a:75:8b:92:4e:11:ab:2f:92:8a:ac:8c:3b:9f:1d:f3:
                    4b:c4:ca:b7:14:f6:d2:3d:36:1f:3f:ae:76:cd:d4:7d:
                    56:52:2d:05:4f:ec:5f:56:b4:e1:41:10:5d:1f:ab:07:
                    32:f5:4d:4d:47:6f:fa:84:52:67:28:cd:f0:8f:fa:26:
                    18:e5:65:54:1a:6c:bf:74:5e:fa:74:47:66:e0:d2:c6:
                    fa:1d:53:96:ad:95:8c:6f:5f:0c:9a:21:d6:d8:e4:f5:
                    9c:68:41:62:a8:fe:de:f3:0a:47:4f:9c:96:0f:d0:03
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7c:52:01:24:b2:32:78:10:21:f6:05:39:85:de:78:dd:
        d3:25:59:a5:35:b7:07:64:fe:5e:b8:3e:45:ff:af:94:
        00:3e:a6:5b:33:67:cf:1b:d1:40:2a:ea:e9:c6:5c:0c:
        c2:2d:94:01:aa:a1:e3:c1:04:fe:6d:4b:c5:13:6a:8d:
        fe:c5:82:c4:6f:3a:06:32:64:17:1b:44:81:37:4f:16:
        62:69:d0:bc:0e:5d:a8:e0:29:5f:21:fa:7a:f8:52:44:
        61:2a:32:91:4f:50:48:2c:5d:95:44:b4:bb:70:d9:48:
        9d:6a:8a:41:2e:8d:fd:5d:53:71:6a:29:98:af:f8:4b
    Fingerprint (MD5):
        B3:93:0D:98:8E:F4:04:3C:17:E0:B1:15:1C:A6:F9:24
    Fingerprint (SHA1):
        E9:F2:20:95:EF:8E:BE:C9:4D:4D:92:FE:78:F2:5D:07:A1:92:B5:F9


Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Returned value is 0, expected result is pass
chains.sh: #9922: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der with flags  -d AllDB    -o OID.1.0  -t CA2CA1.der - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der with flags  -d AllDB    -o OID.2.0  -t CA2CA1.der
vfychain -d AllDB -pp -vv     -o OID.2.0  User1CA2.der CA2CA1.der  -t CA2CA1.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #9923: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der with flags  -d AllDB    -o OID.2.0  -t CA2CA1.der - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #9924: Extension2: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA1Root.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der
chains.sh: #9925: Extension2: Importing certificate CA1Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA1.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der
chains.sh: #9926: Extension2: Importing certificate CA2CA1.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.1.0  -t Root
vfychain -d AllDB -pp -vv     -o OID.1.0  User1CA2.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128112870 (0x433da2e6)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:29:52 2012
            Not After : Tue Nov 28 16:29:52 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:1e:67:06:13:dc:ec:46:72:b0:b0:b9:dc:dc:ee:e4:
                    8a:fd:20:4c:e8:b1:71:5f:6a:39:a1:0f:ba:53:2e:1e:
                    c7:5a:68:16:bd:95:85:fd:12:1d:bc:ef:36:7d:9d:04:
                    c4:7a:86:43:5b:5f:76:3a:7b:7a:be:98:ba:00:d5:14:
                    dd:df:ac:c6:eb:60:ad:6c:bb:eb:26:11:55:dd:65:6a:
                    5f:bf:38:55:7b:3f:8b:19:ca:bc:5d:1f:1f:54:ec:e1:
                    17:1f:b1:97:e8:f2:b3:06:54:a1:a1:ee:c9:8a:ef:86:
                    3d:41:05:2a:be:51:05:88:0c:53:2e:91:c1:e7:35:69
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        75:10:71:d6:88:ad:51:6b:b9:97:58:b0:4a:be:86:b8:
        12:76:ad:38:c2:e9:92:05:56:93:2e:99:5e:e3:ac:5a:
        6e:82:b7:4a:75:f4:65:f2:8b:8f:2a:df:f6:d9:e3:08:
        be:38:88:0e:4c:30:25:17:ba:35:17:c5:5e:9d:dc:0d:
        66:30:da:0c:1b:3b:3b:2d:0c:d7:3f:1a:ce:77:92:7f:
        0e:3b:8b:db:de:ea:ae:ff:4b:17:c2:7a:38:96:f0:85:
        bb:3e:42:d4:a3:dc:41:96:2e:7f:cd:6d:ce:1c:ec:37:
        a9:12:19:1c:19:7a:ea:22:b8:8b:0c:0e:a2:5e:7b:ec
    Fingerprint (MD5):
        BF:34:D4:7F:1D:34:A8:B7:9A:68:80:41:61:4C:5E:1D
    Fingerprint (SHA1):
        11:C4:9F:54:37:26:DE:BE:41:7F:78:8A:8C:C6:6B:7D:0A:54:C8:F7

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #9927: Extension2: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.1.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.2.0  -t Root
vfychain -d AllDB -pp -vv     -o OID.2.0  User1CA2.der  -t Root
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #9928: Extension2: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.2.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.1.0  -t CA1
vfychain -d AllDB -pp -vv     -o OID.1.0  User1CA2.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128112871 (0x433da2e7)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:29:55 2012
            Not After : Tue Nov 28 16:29:55 2017
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d3:e6:00:e2:ea:3c:8a:f6:6e:64:96:9b:c5:10:d2:ca:
                    44:a0:5a:85:6f:a6:ea:5d:c8:7e:8a:d5:40:77:ad:b1:
                    de:2d:91:e3:50:b2:a4:42:55:5f:3e:85:27:4f:8b:e3:
                    4c:61:aa:db:d9:2d:36:60:fa:ca:a3:7e:ef:7b:35:50:
                    5f:bc:0e:e1:1e:fa:10:ef:60:24:ff:2e:15:a0:1a:3b:
                    b7:ab:c2:30:13:f8:14:a6:5d:08:c8:60:93:08:f5:21:
                    9c:66:e6:84:04:58:ae:70:7c:a5:df:4a:97:9d:7a:43:
                    1c:f8:b4:81:30:f7:02:6f:85:be:10:8a:83:df:b9:73
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        25:d4:a2:7d:df:35:01:bf:73:63:cd:95:c1:fe:2e:99:
        6c:6d:b2:6a:a7:4d:a0:e2:4e:63:af:e2:36:8d:a0:29:
        26:cd:78:88:89:fe:a2:af:7f:f3:23:e6:8d:e2:1b:85:
        b7:29:85:a4:17:8e:0d:a8:b1:ea:1d:21:80:17:52:6a:
        e0:81:88:48:b3:03:c6:24:7d:6c:db:bc:24:85:1e:ce:
        ba:61:13:36:c3:b3:e2:a5:1d:03:80:e2:70:5c:d7:dc:
        6e:04:c4:21:e7:a6:48:ea:80:c8:b2:f6:fd:59:2e:ad:
        47:79:37:39:70:b5:19:73:2b:64:56:36:18:7f:50:1c
    Fingerprint (MD5):
        1D:0D:D9:2B:4A:5E:5B:86:E1:0D:BD:A4:62:76:88:C6
    Fingerprint (SHA1):
        13:3F:EB:DC:92:4A:20:C4:A6:B4:9F:1F:53:96:E0:E6:E3:5B:D6:F5

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #9929: Extension2: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.1.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.2.0  -t CA1
vfychain -d AllDB -pp -vv     -o OID.2.0  User1CA2.der  -t CA1
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CA1 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #9930: Extension2: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.2.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.1.0  -t CA2
vfychain -d AllDB -pp -vv     -o OID.1.0  User1CA2.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128112872 (0x433da2e8)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Wed Nov 28 16:29:57 2012
            Not After : Tue Nov 28 16:29:57 2017
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d2:c4:ef:9c:95:d4:75:55:24:29:76:d3:fc:51:c9:53:
                    9a:75:8b:92:4e:11:ab:2f:92:8a:ac:8c:3b:9f:1d:f3:
                    4b:c4:ca:b7:14:f6:d2:3d:36:1f:3f:ae:76:cd:d4:7d:
                    56:52:2d:05:4f:ec:5f:56:b4:e1:41:10:5d:1f:ab:07:
                    32:f5:4d:4d:47:6f:fa:84:52:67:28:cd:f0:8f:fa:26:
                    18:e5:65:54:1a:6c:bf:74:5e:fa:74:47:66:e0:d2:c6:
                    fa:1d:53:96:ad:95:8c:6f:5f:0c:9a:21:d6:d8:e4:f5:
                    9c:68:41:62:a8:fe:de:f3:0a:47:4f:9c:96:0f:d0:03
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7c:52:01:24:b2:32:78:10:21:f6:05:39:85:de:78:dd:
        d3:25:59:a5:35:b7:07:64:fe:5e:b8:3e:45:ff:af:94:
        00:3e:a6:5b:33:67:cf:1b:d1:40:2a:ea:e9:c6:5c:0c:
        c2:2d:94:01:aa:a1:e3:c1:04:fe:6d:4b:c5:13:6a:8d:
        fe:c5:82:c4:6f:3a:06:32:64:17:1b:44:81:37:4f:16:
        62:69:d0:bc:0e:5d:a8:e0:29:5f:21:fa:7a:f8:52:44:
        61:2a:32:91:4f:50:48:2c:5d:95:44:b4:bb:70:d9:48:
        9d:6a:8a:41:2e:8d:fd:5d:53:71:6a:29:98:af:f8:4b
    Fingerprint (MD5):
        B3:93:0D:98:8E:F4:04:3C:17:E0:B1:15:1C:A6:F9:24
    Fingerprint (SHA1):
        E9:F2:20:95:EF:8E:BE:C9:4D:4D:92:FE:78:F2:5D:07:A1:92:B5:F9

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Returned value is 0, expected result is pass
chains.sh: #9931: Extension2: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.1.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.2.0  -t CA2
vfychain -d AllDB -pp -vv     -o OID.2.0  User1CA2.der  -t CA2
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CA2 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #9932: Extension2: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.2.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.1.0  -t Root
vfychain -d AllDB -pp -vv     -o OID.1.0  User2CA2.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128112870 (0x433da2e6)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:29:52 2012
            Not After : Tue Nov 28 16:29:52 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:1e:67:06:13:dc:ec:46:72:b0:b0:b9:dc:dc:ee:e4:
                    8a:fd:20:4c:e8:b1:71:5f:6a:39:a1:0f:ba:53:2e:1e:
                    c7:5a:68:16:bd:95:85:fd:12:1d:bc:ef:36:7d:9d:04:
                    c4:7a:86:43:5b:5f:76:3a:7b:7a:be:98:ba:00:d5:14:
                    dd:df:ac:c6:eb:60:ad:6c:bb:eb:26:11:55:dd:65:6a:
                    5f:bf:38:55:7b:3f:8b:19:ca:bc:5d:1f:1f:54:ec:e1:
                    17:1f:b1:97:e8:f2:b3:06:54:a1:a1:ee:c9:8a:ef:86:
                    3d:41:05:2a:be:51:05:88:0c:53:2e:91:c1:e7:35:69
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        75:10:71:d6:88:ad:51:6b:b9:97:58:b0:4a:be:86:b8:
        12:76:ad:38:c2:e9:92:05:56:93:2e:99:5e:e3:ac:5a:
        6e:82:b7:4a:75:f4:65:f2:8b:8f:2a:df:f6:d9:e3:08:
        be:38:88:0e:4c:30:25:17:ba:35:17:c5:5e:9d:dc:0d:
        66:30:da:0c:1b:3b:3b:2d:0c:d7:3f:1a:ce:77:92:7f:
        0e:3b:8b:db:de:ea:ae:ff:4b:17:c2:7a:38:96:f0:85:
        bb:3e:42:d4:a3:dc:41:96:2e:7f:cd:6d:ce:1c:ec:37:
        a9:12:19:1c:19:7a:ea:22:b8:8b:0c:0e:a2:5e:7b:ec
    Fingerprint (MD5):
        BF:34:D4:7F:1D:34:A8:B7:9A:68:80:41:61:4C:5E:1D
    Fingerprint (SHA1):
        11:C4:9F:54:37:26:DE:BE:41:7F:78:8A:8C:C6:6B:7D:0A:54:C8:F7

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #9933: Extension2: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.1.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.2.0  -t Root
vfychain -d AllDB -pp -vv     -o OID.2.0  User2CA2.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128112870 (0x433da2e6)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:29:52 2012
            Not After : Tue Nov 28 16:29:52 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:1e:67:06:13:dc:ec:46:72:b0:b0:b9:dc:dc:ee:e4:
                    8a:fd:20:4c:e8:b1:71:5f:6a:39:a1:0f:ba:53:2e:1e:
                    c7:5a:68:16:bd:95:85:fd:12:1d:bc:ef:36:7d:9d:04:
                    c4:7a:86:43:5b:5f:76:3a:7b:7a:be:98:ba:00:d5:14:
                    dd:df:ac:c6:eb:60:ad:6c:bb:eb:26:11:55:dd:65:6a:
                    5f:bf:38:55:7b:3f:8b:19:ca:bc:5d:1f:1f:54:ec:e1:
                    17:1f:b1:97:e8:f2:b3:06:54:a1:a1:ee:c9:8a:ef:86:
                    3d:41:05:2a:be:51:05:88:0c:53:2e:91:c1:e7:35:69
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        75:10:71:d6:88:ad:51:6b:b9:97:58:b0:4a:be:86:b8:
        12:76:ad:38:c2:e9:92:05:56:93:2e:99:5e:e3:ac:5a:
        6e:82:b7:4a:75:f4:65:f2:8b:8f:2a:df:f6:d9:e3:08:
        be:38:88:0e:4c:30:25:17:ba:35:17:c5:5e:9d:dc:0d:
        66:30:da:0c:1b:3b:3b:2d:0c:d7:3f:1a:ce:77:92:7f:
        0e:3b:8b:db:de:ea:ae:ff:4b:17:c2:7a:38:96:f0:85:
        bb:3e:42:d4:a3:dc:41:96:2e:7f:cd:6d:ce:1c:ec:37:
        a9:12:19:1c:19:7a:ea:22:b8:8b:0c:0e:a2:5e:7b:ec
    Fingerprint (MD5):
        BF:34:D4:7F:1D:34:A8:B7:9A:68:80:41:61:4C:5E:1D
    Fingerprint (SHA1):
        11:C4:9F:54:37:26:DE:BE:41:7F:78:8A:8C:C6:6B:7D:0A:54:C8:F7

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #9934: Extension2: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.2.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.1.0  -t CA1
vfychain -d AllDB -pp -vv     -o OID.1.0  User2CA2.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128112871 (0x433da2e7)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:29:55 2012
            Not After : Tue Nov 28 16:29:55 2017
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d3:e6:00:e2:ea:3c:8a:f6:6e:64:96:9b:c5:10:d2:ca:
                    44:a0:5a:85:6f:a6:ea:5d:c8:7e:8a:d5:40:77:ad:b1:
                    de:2d:91:e3:50:b2:a4:42:55:5f:3e:85:27:4f:8b:e3:
                    4c:61:aa:db:d9:2d:36:60:fa:ca:a3:7e:ef:7b:35:50:
                    5f:bc:0e:e1:1e:fa:10:ef:60:24:ff:2e:15:a0:1a:3b:
                    b7:ab:c2:30:13:f8:14:a6:5d:08:c8:60:93:08:f5:21:
                    9c:66:e6:84:04:58:ae:70:7c:a5:df:4a:97:9d:7a:43:
                    1c:f8:b4:81:30:f7:02:6f:85:be:10:8a:83:df:b9:73
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        25:d4:a2:7d:df:35:01:bf:73:63:cd:95:c1:fe:2e:99:
        6c:6d:b2:6a:a7:4d:a0:e2:4e:63:af:e2:36:8d:a0:29:
        26:cd:78:88:89:fe:a2:af:7f:f3:23:e6:8d:e2:1b:85:
        b7:29:85:a4:17:8e:0d:a8:b1:ea:1d:21:80:17:52:6a:
        e0:81:88:48:b3:03:c6:24:7d:6c:db:bc:24:85:1e:ce:
        ba:61:13:36:c3:b3:e2:a5:1d:03:80:e2:70:5c:d7:dc:
        6e:04:c4:21:e7:a6:48:ea:80:c8:b2:f6:fd:59:2e:ad:
        47:79:37:39:70:b5:19:73:2b:64:56:36:18:7f:50:1c
    Fingerprint (MD5):
        1D:0D:D9:2B:4A:5E:5B:86:E1:0D:BD:A4:62:76:88:C6
    Fingerprint (SHA1):
        13:3F:EB:DC:92:4A:20:C4:A6:B4:9F:1F:53:96:E0:E6:E3:5B:D6:F5

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #9935: Extension2: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.1.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.2.0  -t CA1
vfychain -d AllDB -pp -vv     -o OID.2.0  User2CA2.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128112871 (0x433da2e7)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:29:55 2012
            Not After : Tue Nov 28 16:29:55 2017
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d3:e6:00:e2:ea:3c:8a:f6:6e:64:96:9b:c5:10:d2:ca:
                    44:a0:5a:85:6f:a6:ea:5d:c8:7e:8a:d5:40:77:ad:b1:
                    de:2d:91:e3:50:b2:a4:42:55:5f:3e:85:27:4f:8b:e3:
                    4c:61:aa:db:d9:2d:36:60:fa:ca:a3:7e:ef:7b:35:50:
                    5f:bc:0e:e1:1e:fa:10:ef:60:24:ff:2e:15:a0:1a:3b:
                    b7:ab:c2:30:13:f8:14:a6:5d:08:c8:60:93:08:f5:21:
                    9c:66:e6:84:04:58:ae:70:7c:a5:df:4a:97:9d:7a:43:
                    1c:f8:b4:81:30:f7:02:6f:85:be:10:8a:83:df:b9:73
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: OID.1.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        25:d4:a2:7d:df:35:01:bf:73:63:cd:95:c1:fe:2e:99:
        6c:6d:b2:6a:a7:4d:a0:e2:4e:63:af:e2:36:8d:a0:29:
        26:cd:78:88:89:fe:a2:af:7f:f3:23:e6:8d:e2:1b:85:
        b7:29:85:a4:17:8e:0d:a8:b1:ea:1d:21:80:17:52:6a:
        e0:81:88:48:b3:03:c6:24:7d:6c:db:bc:24:85:1e:ce:
        ba:61:13:36:c3:b3:e2:a5:1d:03:80:e2:70:5c:d7:dc:
        6e:04:c4:21:e7:a6:48:ea:80:c8:b2:f6:fd:59:2e:ad:
        47:79:37:39:70:b5:19:73:2b:64:56:36:18:7f:50:1c
    Fingerprint (MD5):
        1D:0D:D9:2B:4A:5E:5B:86:E1:0D:BD:A4:62:76:88:C6
    Fingerprint (SHA1):
        13:3F:EB:DC:92:4A:20:C4:A6:B4:9F:1F:53:96:E0:E6:E3:5B:D6:F5

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #9936: Extension2: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.2.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.1.0  -t CA2
vfychain -d AllDB -pp -vv     -o OID.1.0  User2CA2.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128112872 (0x433da2e8)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Wed Nov 28 16:29:57 2012
            Not After : Tue Nov 28 16:29:57 2017
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d2:c4:ef:9c:95:d4:75:55:24:29:76:d3:fc:51:c9:53:
                    9a:75:8b:92:4e:11:ab:2f:92:8a:ac:8c:3b:9f:1d:f3:
                    4b:c4:ca:b7:14:f6:d2:3d:36:1f:3f:ae:76:cd:d4:7d:
                    56:52:2d:05:4f:ec:5f:56:b4:e1:41:10:5d:1f:ab:07:
                    32:f5:4d:4d:47:6f:fa:84:52:67:28:cd:f0:8f:fa:26:
                    18:e5:65:54:1a:6c:bf:74:5e:fa:74:47:66:e0:d2:c6:
                    fa:1d:53:96:ad:95:8c:6f:5f:0c:9a:21:d6:d8:e4:f5:
                    9c:68:41:62:a8:fe:de:f3:0a:47:4f:9c:96:0f:d0:03
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7c:52:01:24:b2:32:78:10:21:f6:05:39:85:de:78:dd:
        d3:25:59:a5:35:b7:07:64:fe:5e:b8:3e:45:ff:af:94:
        00:3e:a6:5b:33:67:cf:1b:d1:40:2a:ea:e9:c6:5c:0c:
        c2:2d:94:01:aa:a1:e3:c1:04:fe:6d:4b:c5:13:6a:8d:
        fe:c5:82:c4:6f:3a:06:32:64:17:1b:44:81:37:4f:16:
        62:69:d0:bc:0e:5d:a8:e0:29:5f:21:fa:7a:f8:52:44:
        61:2a:32:91:4f:50:48:2c:5d:95:44:b4:bb:70:d9:48:
        9d:6a:8a:41:2e:8d:fd:5d:53:71:6a:29:98:af:f8:4b
    Fingerprint (MD5):
        B3:93:0D:98:8E:F4:04:3C:17:E0:B1:15:1C:A6:F9:24
    Fingerprint (SHA1):
        E9:F2:20:95:EF:8E:BE:C9:4D:4D:92:FE:78:F2:5D:07:A1:92:B5:F9

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Returned value is 0, expected result is pass
chains.sh: #9937: Extension2: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.1.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.2.0  -t CA2
vfychain -d AllDB -pp -vv     -o OID.2.0  User2CA2.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128112872 (0x433da2e8)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Wed Nov 28 16:29:57 2012
            Not After : Tue Nov 28 16:29:57 2017
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d2:c4:ef:9c:95:d4:75:55:24:29:76:d3:fc:51:c9:53:
                    9a:75:8b:92:4e:11:ab:2f:92:8a:ac:8c:3b:9f:1d:f3:
                    4b:c4:ca:b7:14:f6:d2:3d:36:1f:3f:ae:76:cd:d4:7d:
                    56:52:2d:05:4f:ec:5f:56:b4:e1:41:10:5d:1f:ab:07:
                    32:f5:4d:4d:47:6f:fa:84:52:67:28:cd:f0:8f:fa:26:
                    18:e5:65:54:1a:6c:bf:74:5e:fa:74:47:66:e0:d2:c6:
                    fa:1d:53:96:ad:95:8c:6f:5f:0c:9a:21:d6:d8:e4:f5:
                    9c:68:41:62:a8:fe:de:f3:0a:47:4f:9c:96:0f:d0:03
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: OID.1.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7c:52:01:24:b2:32:78:10:21:f6:05:39:85:de:78:dd:
        d3:25:59:a5:35:b7:07:64:fe:5e:b8:3e:45:ff:af:94:
        00:3e:a6:5b:33:67:cf:1b:d1:40:2a:ea:e9:c6:5c:0c:
        c2:2d:94:01:aa:a1:e3:c1:04:fe:6d:4b:c5:13:6a:8d:
        fe:c5:82:c4:6f:3a:06:32:64:17:1b:44:81:37:4f:16:
        62:69:d0:bc:0e:5d:a8:e0:29:5f:21:fa:7a:f8:52:44:
        61:2a:32:91:4f:50:48:2c:5d:95:44:b4:bb:70:d9:48:
        9d:6a:8a:41:2e:8d:fd:5d:53:71:6a:29:98:af:f8:4b
    Fingerprint (MD5):
        B3:93:0D:98:8E:F4:04:3C:17:E0:B1:15:1C:A6:F9:24
    Fingerprint (SHA1):
        E9:F2:20:95:EF:8E:BE:C9:4D:4D:92:FE:78:F2:5D:07:A1:92:B5:F9

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Returned value is 0, expected result is pass
chains.sh: #9938: Extension2: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.2.0  -t CA2 - PASSED
chains.sh: Creating DB RootCADB
certutil -N -d RootCADB -f RootCADB/dbpasswd
chains.sh: #9939: AnyPolicy: Creating DB RootCADB  - PASSED
chains.sh: Creating Root CA RootCA
certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA  -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -m 1128112875 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #9940: AnyPolicy: Creating Root CA RootCA  - PASSED
chains.sh: Exporting Root CA RootCA.der
certutil -L -d RootCADB -r -n RootCA -o RootCA.der
chains.sh: #9941: AnyPolicy: Exporting Root CA RootCA.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #9942: AnyPolicy: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #9943: AnyPolicy: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1RootCA.der signed by RootCA
certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1128112876   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #9944: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA  - PASSED
chains.sh: Importing certificate CA1RootCA.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der
chains.sh: #9945: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #9946: AnyPolicy: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #9947: AnyPolicy: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1128112877   --extCP --extIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n
0
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter the number of certs in the path permitted to use anyPolicy.
(press Enter for 0) > Is this a critical extension [y/N]?
chains.sh: #9948: AnyPolicy: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
chains.sh: #9949: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB CA3DB
certutil -N -d CA3DB -f CA3DB/dbpasswd
chains.sh: #9950: AnyPolicy: Creating DB CA3DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA3Req.der
certutil -s "CN=CA3 Intermediate, O=CA3, C=US"  -R -2 -d CA3DB -f CA3DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA3Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #9951: AnyPolicy: Creating Intermediate certifiate request CA3Req.der  - PASSED
chains.sh: Creating certficate CA3CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 1128112878   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #9952: AnyPolicy: Creating certficate CA3CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA3CA1.der to CA3DB database
certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der
chains.sh: #9953: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database  - PASSED
chains.sh: Creating DB User1DB
certutil -N -d User1DB -f User1DB/dbpasswd
chains.sh: #9954: AnyPolicy: Creating DB User1DB  - PASSED
chains.sh: Creating EE certifiate request User1Req.der
certutil -s "CN=User1 EE, O=User1, C=US"  -R  -d User1DB -f User1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o User1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #9955: AnyPolicy: Creating EE certifiate request User1Req.der  - PASSED
chains.sh: Creating certficate User1CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1128112879   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #9956: AnyPolicy: Creating certficate User1CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate User1CA2.der to User1DB database
certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der
chains.sh: #9957: AnyPolicy: Importing certificate User1CA2.der to User1DB database  - PASSED
chains.sh: Creating DB User2DB
certutil -N -d User2DB -f User2DB/dbpasswd
chains.sh: #9958: AnyPolicy: Creating DB User2DB  - PASSED
chains.sh: Creating EE certifiate request User2Req.der
certutil -s "CN=User2 EE, O=User2, C=US"  -R  -d User2DB -f User2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o User2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #9959: AnyPolicy: Creating EE certifiate request User2Req.der  - PASSED
chains.sh: Creating certficate User2CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1128112880   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #9960: AnyPolicy: Creating certficate User2CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate User2CA2.der to User2DB database
certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der
chains.sh: #9961: AnyPolicy: Importing certificate User2CA2.der to User2DB database  - PASSED
chains.sh: Creating DB User3DB
certutil -N -d User3DB -f User3DB/dbpasswd
chains.sh: #9962: AnyPolicy: Creating DB User3DB  - PASSED
chains.sh: Creating EE certifiate request User3Req.der
certutil -s "CN=User3 EE, O=User3, C=US"  -R  -d User3DB -f User3DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o User3Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #9963: AnyPolicy: Creating EE certifiate request User3Req.der  - PASSED
chains.sh: Creating certficate User3CA3.der signed by CA3
certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 1128112881   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #9964: AnyPolicy: Creating certficate User3CA3.der signed by CA3  - PASSED
chains.sh: Importing certificate User3CA3.der to User3DB database
certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der
chains.sh: #9965: AnyPolicy: Importing certificate User3CA3.der to User3DB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #9966: AnyPolicy: Creating DB AllDB  - PASSED
chains.sh: Importing certificate RootCA.der to AllDB database
certutil -A -n RootCA  -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der
chains.sh: #9967: AnyPolicy: Importing certificate RootCA.der to AllDB database  - PASSED
chains.sh: Importing certificate CA1RootCA.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der
chains.sh: #9968: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA1.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der
chains.sh: #9969: AnyPolicy: Importing certificate CA2CA1.der to AllDB database  - PASSED
chains.sh: Importing certificate CA3CA1.der to AllDB database
certutil -A -n CA3  -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der
chains.sh: #9970: AnyPolicy: Importing certificate CA3CA1.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.1.0  -t RootCA
vfychain -d AllDB -pp -vv     -o OID.1.0  User1CA2.der  -t RootCA
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128112875 (0x433da2eb)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 16:30:07 2012
            Not After : Tue Nov 28 16:30:07 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    db:47:09:93:fa:f4:56:b5:c5:23:be:31:4e:36:0c:a4:
                    ce:a2:50:d2:0e:1b:95:92:3b:2d:dc:a4:4b:d7:d6:60:
                    6b:3c:64:39:38:f6:c7:e3:db:22:c4:c3:0c:6b:52:ec:
                    7f:45:6c:89:dc:73:23:3d:5d:28:a1:8a:b3:db:04:59:
                    4e:60:a1:15:75:fd:d8:4c:9b:9b:4a:3c:09:4f:92:df:
                    e2:c2:d4:11:94:1e:85:18:32:62:fd:2d:6b:09:20:4f:
                    c0:1f:9a:ba:7e:87:aa:b4:e9:8d:80:33:bd:09:da:7b:
                    ca:db:e2:ba:7e:68:74:ac:ca:c8:fa:93:1d:58:3c:63
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        b7:d5:57:ff:ad:54:ae:7f:19:2b:11:e8:63:fe:b9:49:
        51:44:11:61:82:72:7a:11:b2:1f:f7:c4:11:98:a7:61:
        e3:a1:27:0a:6a:b4:f3:cd:d7:e5:23:13:cd:f1:2c:a6:
        e2:ad:e4:8f:6e:23:f3:79:88:5f:44:bd:4b:bf:1f:dd:
        b0:51:4b:6d:d8:af:f3:04:b5:0b:c0:6e:1d:1a:e5:03:
        49:48:23:15:ac:0d:c8:69:d4:e2:d9:80:43:1b:93:6b:
        71:5c:5a:c4:02:9e:23:d8:66:24:e6:ac:64:7a:db:38:
        b5:4a:02:d6:3a:86:de:18:78:57:a9:45:11:4c:ef:a8
    Fingerprint (MD5):
        6B:12:70:06:C8:16:E5:E2:56:B2:A9:D9:C9:78:EA:88
    Fingerprint (SHA1):
        63:E8:1D:82:F8:50:8F:FB:50:B9:06:EA:6C:AA:00:CC:37:DE:0D:3C

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #9971: AnyPolicy: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.1.0  -t RootCA - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.2.0  -t RootCA
vfychain -d AllDB -pp -vv     -o OID.2.0  User1CA2.der  -t RootCA
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. RootCA [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #9972: AnyPolicy: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.2.0  -t RootCA - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.1.0  -t RootCA
vfychain -d AllDB -pp -vv     -o OID.1.0  User2CA2.der  -t RootCA
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. RootCA [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #9973: AnyPolicy: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.1.0  -t RootCA - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.2.0  -t RootCA
vfychain -d AllDB -pp -vv     -o OID.2.0  User2CA2.der  -t RootCA
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. RootCA [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #9974: AnyPolicy: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.2.0  -t RootCA - PASSED
chains.sh: Verifying certificate(s)  User3CA3.der with flags  -d AllDB    -o OID.1.0  -t RootCA
vfychain -d AllDB -pp -vv     -o OID.1.0  User3CA3.der  -t RootCA
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128112875 (0x433da2eb)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 16:30:07 2012
            Not After : Tue Nov 28 16:30:07 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    db:47:09:93:fa:f4:56:b5:c5:23:be:31:4e:36:0c:a4:
                    ce:a2:50:d2:0e:1b:95:92:3b:2d:dc:a4:4b:d7:d6:60:
                    6b:3c:64:39:38:f6:c7:e3:db:22:c4:c3:0c:6b:52:ec:
                    7f:45:6c:89:dc:73:23:3d:5d:28:a1:8a:b3:db:04:59:
                    4e:60:a1:15:75:fd:d8:4c:9b:9b:4a:3c:09:4f:92:df:
                    e2:c2:d4:11:94:1e:85:18:32:62:fd:2d:6b:09:20:4f:
                    c0:1f:9a:ba:7e:87:aa:b4:e9:8d:80:33:bd:09:da:7b:
                    ca:db:e2:ba:7e:68:74:ac:ca:c8:fa:93:1d:58:3c:63
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        b7:d5:57:ff:ad:54:ae:7f:19:2b:11:e8:63:fe:b9:49:
        51:44:11:61:82:72:7a:11:b2:1f:f7:c4:11:98:a7:61:
        e3:a1:27:0a:6a:b4:f3:cd:d7:e5:23:13:cd:f1:2c:a6:
        e2:ad:e4:8f:6e:23:f3:79:88:5f:44:bd:4b:bf:1f:dd:
        b0:51:4b:6d:d8:af:f3:04:b5:0b:c0:6e:1d:1a:e5:03:
        49:48:23:15:ac:0d:c8:69:d4:e2:d9:80:43:1b:93:6b:
        71:5c:5a:c4:02:9e:23:d8:66:24:e6:ac:64:7a:db:38:
        b5:4a:02:d6:3a:86:de:18:78:57:a9:45:11:4c:ef:a8
    Fingerprint (MD5):
        6B:12:70:06:C8:16:E5:E2:56:B2:A9:D9:C9:78:EA:88
    Fingerprint (SHA1):
        63:E8:1D:82:F8:50:8F:FB:50:B9:06:EA:6C:AA:00:CC:37:DE:0D:3C

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User3 EE,O=User3,C=US"
Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #9975: AnyPolicy: Verifying certificate(s)  User3CA3.der with flags  -d AllDB    -o OID.1.0  -t RootCA - PASSED
chains.sh: Verifying certificate(s)  User3CA3.der with flags  -d AllDB    -o OID.2.0  -t RootCA
vfychain -d AllDB -pp -vv     -o OID.2.0  User3CA3.der  -t RootCA
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. RootCA [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #9976: AnyPolicy: Verifying certificate(s)  User3CA3.der with flags  -d AllDB    -o OID.2.0  -t RootCA - PASSED
chains.sh: Creating DB RootCADB
certutil -N -d RootCADB -f RootCADB/dbpasswd
chains.sh: #9977: AnyPolicyWithLevel: Creating DB RootCADB  - PASSED
chains.sh: Creating Root CA RootCA
certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA  -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -m 1128112882 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #9978: AnyPolicyWithLevel: Creating Root CA RootCA  - PASSED
chains.sh: Exporting Root CA RootCA.der
certutil -L -d RootCADB -r -n RootCA -o RootCA.der
chains.sh: #9979: AnyPolicyWithLevel: Exporting Root CA RootCA.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #9980: AnyPolicyWithLevel: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #9981: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1RootCA.der signed by RootCA
certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1128112883   --extCP --extIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
any
1

n
n
n
1
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter the number of certs in the path permitted to use anyPolicy.
(press Enter for 0) > Is this a critical extension [y/N]?
chains.sh: #9982: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA  - PASSED
chains.sh: Importing certificate CA1RootCA.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der
chains.sh: #9983: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database  - PASSED
chains.sh: Creating DB CA12DB
certutil -N -d CA12DB -f CA12DB/dbpasswd
chains.sh: #9984: AnyPolicyWithLevel: Creating DB CA12DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA12Req.der
certutil -s "CN=CA12 Intermediate, O=CA12, C=US"  -R -2 -d CA12DB -f CA12DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA12Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #9985: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der  - PASSED
chains.sh: Creating certficate CA12CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 1128112884   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #9986: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA12CA1.der to CA12DB database
certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der
chains.sh: #9987: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database  - PASSED
chains.sh: Creating DB CA13DB
certutil -N -d CA13DB -f CA13DB/dbpasswd
chains.sh: #9988: AnyPolicyWithLevel: Creating DB CA13DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA13Req.der
certutil -s "CN=CA13 Intermediate, O=CA13, C=US"  -R -2 -d CA13DB -f CA13DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA13Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #9989: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der  - PASSED
chains.sh: Creating certficate CA13CA12.der signed by CA12
certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 1128112885   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #9990: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12  - PASSED
chains.sh: Importing certificate CA13CA12.der to CA13DB database
certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der
chains.sh: #9991: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #9992: AnyPolicyWithLevel: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o EE1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #9993: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA13.der signed by CA13
certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 1128112886   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #9994: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13  - PASSED
chains.sh: Importing certificate EE1CA13.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der
chains.sh: #9995: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database  - PASSED
chains.sh: Creating DB CA22DB
certutil -N -d CA22DB -f CA22DB/dbpasswd
chains.sh: #9996: AnyPolicyWithLevel: Creating DB CA22DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA22Req.der
certutil -s "CN=CA22 Intermediate, O=CA22, C=US"  -R -2 -d CA22DB -f CA22DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA22Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #9997: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der  - PASSED
chains.sh: Creating certficate CA22CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 1128112887   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #9998: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA22CA1.der to CA22DB database
certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der
chains.sh: #9999: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database  - PASSED
chains.sh: Creating DB CA23DB
certutil -N -d CA23DB -f CA23DB/dbpasswd
chains.sh: #10000: AnyPolicyWithLevel: Creating DB CA23DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA23Req.der
certutil -s "CN=CA23 Intermediate, O=CA23, C=US"  -R -2 -d CA23DB -f CA23DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA23Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10001: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der  - PASSED
chains.sh: Creating certficate CA23CA22.der signed by CA22
certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 1128112888   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10002: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22  - PASSED
chains.sh: Importing certificate CA23CA22.der to CA23DB database
certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der
chains.sh: #10003: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database  - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #10004: AnyPolicyWithLevel: Creating DB EE2DB  - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US"  -R  -d EE2DB -f EE2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o EE2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #10005: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der  - PASSED
chains.sh: Creating certficate EE2CA23.der signed by CA23
certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 1128112889   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10006: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23  - PASSED
chains.sh: Importing certificate EE2CA23.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der
chains.sh: #10007: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database  - PASSED
chains.sh: Creating DB CA32DB
certutil -N -d CA32DB -f CA32DB/dbpasswd
chains.sh: #10008: AnyPolicyWithLevel: Creating DB CA32DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA32Req.der
certutil -s "CN=CA32 Intermediate, O=CA32, C=US"  -R -2 -d CA32DB -f CA32DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA32Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10009: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der  - PASSED
chains.sh: Creating certficate CA32CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 1128112890   --extCP --extIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
any
1

n
n
n
1
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter the number of certs in the path permitted to use anyPolicy.
(press Enter for 0) > Is this a critical extension [y/N]?
chains.sh: #10010: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA32CA1.der to CA32DB database
certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der
chains.sh: #10011: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database  - PASSED
chains.sh: Creating DB CA33DB
certutil -N -d CA33DB -f CA33DB/dbpasswd
chains.sh: #10012: AnyPolicyWithLevel: Creating DB CA33DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA33Req.der
certutil -s "CN=CA33 Intermediate, O=CA33, C=US"  -R -2 -d CA33DB -f CA33DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA33Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10013: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der  - PASSED
chains.sh: Creating certficate CA33CA32.der signed by CA32
certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 1128112891   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10014: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32  - PASSED
chains.sh: Importing certificate CA33CA32.der to CA33DB database
certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der
chains.sh: #10015: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database  - PASSED
chains.sh: Creating DB EE3DB
certutil -N -d EE3DB -f EE3DB/dbpasswd
chains.sh: #10016: AnyPolicyWithLevel: Creating DB EE3DB  - PASSED
chains.sh: Creating EE certifiate request EE3Req.der
certutil -s "CN=EE3 EE, O=EE3, C=US"  -R  -d EE3DB -f EE3DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o EE3Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #10017: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der  - PASSED
chains.sh: Creating certficate EE3CA33.der signed by CA33
certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 1128112892   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10018: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33  - PASSED
chains.sh: Importing certificate EE3CA33.der to EE3DB database
certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der
chains.sh: #10019: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database  - PASSED
chains.sh: Creating DB CA42DB
certutil -N -d CA42DB -f CA42DB/dbpasswd
chains.sh: #10020: AnyPolicyWithLevel: Creating DB CA42DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA42Req.der
certutil -s "CN=CA42 Intermediate, O=CA42, C=US"  -R -2 -d CA42DB -f CA42DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA42Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10021: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der  - PASSED
chains.sh: Creating certficate CA42CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 1128112893   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
any
1

n
y
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10022: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA42CA1.der to CA42DB database
certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der
chains.sh: #10023: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database  - PASSED
chains.sh: Creating DB CA43DB
certutil -N -d CA43DB -f CA43DB/dbpasswd
chains.sh: #10024: AnyPolicyWithLevel: Creating DB CA43DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA43Req.der
certutil -s "CN=CA43 Intermediate, O=CA43, C=US"  -R -2 -d CA43DB -f CA43DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA43Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10025: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der  - PASSED
chains.sh: Creating certficate CA43CA42.der signed by CA42
certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 1128112894   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
any
1

n
y
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10026: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42  - PASSED
chains.sh: Importing certificate CA43CA42.der to CA43DB database
certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der
chains.sh: #10027: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database  - PASSED
chains.sh: Creating DB EE4DB
certutil -N -d EE4DB -f EE4DB/dbpasswd
chains.sh: #10028: AnyPolicyWithLevel: Creating DB EE4DB  - PASSED
chains.sh: Creating EE certifiate request EE4Req.der
certutil -s "CN=EE4 EE, O=EE4, C=US"  -R  -d EE4DB -f EE4DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o EE4Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #10029: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der  - PASSED
chains.sh: Creating certficate EE4CA43.der signed by CA43
certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 1128112895   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10030: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43  - PASSED
chains.sh: Importing certificate EE4CA43.der to EE4DB database
certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der
chains.sh: #10031: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database  - PASSED
chains.sh: Creating DB CA52DB
certutil -N -d CA52DB -f CA52DB/dbpasswd
chains.sh: #10032: AnyPolicyWithLevel: Creating DB CA52DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA52Req.der
certutil -s "CN=CA52 Intermediate, O=CA52, C=US"  -R -2 -d CA52DB -f CA52DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA52Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10033: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der  - PASSED
chains.sh: Creating certficate CA52CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 1128112896   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
any
1

n
y
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10034: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA52CA1.der to CA52DB database
certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der
chains.sh: #10035: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database  - PASSED
chains.sh: Creating DB CA53DB
certutil -N -d CA53DB -f CA53DB/dbpasswd
chains.sh: #10036: AnyPolicyWithLevel: Creating DB CA53DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA53Req.der
certutil -s "CN=CA53 Intermediate, O=CA53, C=US"  -R -2 -d CA53DB -f CA53DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA53Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10037: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der  - PASSED
chains.sh: Creating certficate CA53CA52.der signed by CA52
certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 1128112897   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10038: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52  - PASSED
chains.sh: Importing certificate CA53CA52.der to CA53DB database
certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der
chains.sh: #10039: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database  - PASSED
chains.sh: Creating DB EE5DB
certutil -N -d EE5DB -f EE5DB/dbpasswd
chains.sh: #10040: AnyPolicyWithLevel: Creating DB EE5DB  - PASSED
chains.sh: Creating EE certifiate request EE5Req.der
certutil -s "CN=EE5 EE, O=EE5, C=US"  -R  -d EE5DB -f EE5DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o EE5Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #10041: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der  - PASSED
chains.sh: Creating certficate EE5CA53.der signed by CA53
certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 1128112898   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10042: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53  - PASSED
chains.sh: Importing certificate EE5CA53.der to EE5DB database
certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der
chains.sh: #10043: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database  - PASSED
chains.sh: Creating DB CA61DB
certutil -N -d CA61DB -f CA61DB/dbpasswd
chains.sh: #10044: AnyPolicyWithLevel: Creating DB CA61DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA61Req.der
certutil -s "CN=CA61 Intermediate, O=CA61, C=US"  -R -2 -d CA61DB -f CA61DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA61Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10045: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der  - PASSED
chains.sh: Creating certficate CA61RootCA.der signed by RootCA
certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 1128112899   --extCP --extIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
any
1

n
n
n
5
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter the number of certs in the path permitted to use anyPolicy.
(press Enter for 0) > Is this a critical extension [y/N]?
chains.sh: #10046: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA  - PASSED
chains.sh: Importing certificate CA61RootCA.der to CA61DB database
certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der
chains.sh: #10047: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database  - PASSED
chains.sh: Creating DB CA62DB
certutil -N -d CA62DB -f CA62DB/dbpasswd
chains.sh: #10048: AnyPolicyWithLevel: Creating DB CA62DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA62Req.der
certutil -s "CN=CA62 Intermediate, O=CA62, C=US"  -R -2 -d CA62DB -f CA62DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA62Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10049: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der  - PASSED
chains.sh: Creating certficate CA62CA61.der signed by CA61
certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 1128112900   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10050: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61  - PASSED
chains.sh: Importing certificate CA62CA61.der to CA62DB database
certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der
chains.sh: #10051: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database  - PASSED
chains.sh: Creating DB EE62DB
certutil -N -d EE62DB -f EE62DB/dbpasswd
chains.sh: #10052: AnyPolicyWithLevel: Creating DB EE62DB  - PASSED
chains.sh: Creating EE certifiate request EE62Req.der
certutil -s "CN=EE62 EE, O=EE62, C=US"  -R  -d EE62DB -f EE62DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o EE62Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #10053: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der  - PASSED
chains.sh: Creating certficate EE62CA62.der signed by CA62
certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 1128112901   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10054: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62  - PASSED
chains.sh: Importing certificate EE62CA62.der to EE62DB database
certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der
chains.sh: #10055: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database  - PASSED
chains.sh: Creating DB CA63DB
certutil -N -d CA63DB -f CA63DB/dbpasswd
chains.sh: #10056: AnyPolicyWithLevel: Creating DB CA63DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA63Req.der
certutil -s "CN=CA63 Intermediate, O=CA63, C=US"  -R -2 -d CA63DB -f CA63DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA63Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10057: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der  - PASSED
chains.sh: Creating certficate CA63CA62.der signed by CA62
certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 1128112902   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10058: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62  - PASSED
chains.sh: Importing certificate CA63CA62.der to CA63DB database
certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der
chains.sh: #10059: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database  - PASSED
chains.sh: Creating DB EE63DB
certutil -N -d EE63DB -f EE63DB/dbpasswd
chains.sh: #10060: AnyPolicyWithLevel: Creating DB EE63DB  - PASSED
chains.sh: Creating EE certifiate request EE63Req.der
certutil -s "CN=EE63 EE, O=EE63, C=US"  -R  -d EE63DB -f EE63DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o EE63Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #10061: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der  - PASSED
chains.sh: Creating certficate EE63CA63.der signed by CA63
certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 1128112903   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10062: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63  - PASSED
chains.sh: Importing certificate EE63CA63.der to EE63DB database
certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der
chains.sh: #10063: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database  - PASSED
chains.sh: Creating DB CA64DB
certutil -N -d CA64DB -f CA64DB/dbpasswd
chains.sh: #10064: AnyPolicyWithLevel: Creating DB CA64DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA64Req.der
certutil -s "CN=CA64 Intermediate, O=CA64, C=US"  -R -2 -d CA64DB -f CA64DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA64Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10065: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der  - PASSED
chains.sh: Creating certficate CA64CA63.der signed by CA63
certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 1128112904   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10066: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63  - PASSED
chains.sh: Importing certificate CA64CA63.der to CA64DB database
certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der
chains.sh: #10067: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database  - PASSED
chains.sh: Creating DB EE64DB
certutil -N -d EE64DB -f EE64DB/dbpasswd
chains.sh: #10068: AnyPolicyWithLevel: Creating DB EE64DB  - PASSED
chains.sh: Creating EE certifiate request EE64Req.der
certutil -s "CN=EE64 EE, O=EE64, C=US"  -R  -d EE64DB -f EE64DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o EE64Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #10069: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der  - PASSED
chains.sh: Creating certficate EE64CA64.der signed by CA64
certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 1128112905   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10070: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64  - PASSED
chains.sh: Importing certificate EE64CA64.der to EE64DB database
certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der
chains.sh: #10071: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database  - PASSED
chains.sh: Creating DB CA65DB
certutil -N -d CA65DB -f CA65DB/dbpasswd
chains.sh: #10072: AnyPolicyWithLevel: Creating DB CA65DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA65Req.der
certutil -s "CN=CA65 Intermediate, O=CA65, C=US"  -R -2 -d CA65DB -f CA65DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA65Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10073: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der  - PASSED
chains.sh: Creating certficate CA65CA64.der signed by CA64
certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 1128112906   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10074: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64  - PASSED
chains.sh: Importing certificate CA65CA64.der to CA65DB database
certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der
chains.sh: #10075: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database  - PASSED
chains.sh: Creating DB EE65DB
certutil -N -d EE65DB -f EE65DB/dbpasswd
chains.sh: #10076: AnyPolicyWithLevel: Creating DB EE65DB  - PASSED
chains.sh: Creating EE certifiate request EE65Req.der
certutil -s "CN=EE65 EE, O=EE65, C=US"  -R  -d EE65DB -f EE65DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o EE65Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #10077: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der  - PASSED
chains.sh: Creating certficate EE65CA65.der signed by CA65
certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 1128112907   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10078: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65  - PASSED
chains.sh: Importing certificate EE65CA65.der to EE65DB database
certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der
chains.sh: #10079: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database  - PASSED
chains.sh: Creating DB CA66DB
certutil -N -d CA66DB -f CA66DB/dbpasswd
chains.sh: #10080: AnyPolicyWithLevel: Creating DB CA66DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA66Req.der
certutil -s "CN=CA66 Intermediate, O=CA66, C=US"  -R -2 -d CA66DB -f CA66DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA66Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10081: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der  - PASSED
chains.sh: Creating certficate CA66CA65.der signed by CA65
certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 1128112908   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10082: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65  - PASSED
chains.sh: Importing certificate CA66CA65.der to CA66DB database
certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der
chains.sh: #10083: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database  - PASSED
chains.sh: Creating DB EE66DB
certutil -N -d EE66DB -f EE66DB/dbpasswd
chains.sh: #10084: AnyPolicyWithLevel: Creating DB EE66DB  - PASSED
chains.sh: Creating EE certifiate request EE66Req.der
certutil -s "CN=EE66 EE, O=EE66, C=US"  -R  -d EE66DB -f EE66DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o EE66Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #10085: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der  - PASSED
chains.sh: Creating certficate EE66CA66.der signed by CA66
certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 1128112909   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10086: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66  - PASSED
chains.sh: Importing certificate EE66CA66.der to EE66DB database
certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der
chains.sh: #10087: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database  - PASSED
chains.sh: Creating DB CA67DB
certutil -N -d CA67DB -f CA67DB/dbpasswd
chains.sh: #10088: AnyPolicyWithLevel: Creating DB CA67DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA67Req.der
certutil -s "CN=CA67 Intermediate, O=CA67, C=US"  -R -2 -d CA67DB -f CA67DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA67Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10089: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der  - PASSED
chains.sh: Creating certficate CA67CA66.der signed by CA66
certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 1128112910   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10090: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66  - PASSED
chains.sh: Importing certificate CA67CA66.der to CA67DB database
certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der
chains.sh: #10091: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database  - PASSED
chains.sh: Creating DB EE67DB
certutil -N -d EE67DB -f EE67DB/dbpasswd
chains.sh: #10092: AnyPolicyWithLevel: Creating DB EE67DB  - PASSED
chains.sh: Creating EE certifiate request EE67Req.der
certutil -s "CN=EE67 EE, O=EE67, C=US"  -R  -d EE67DB -f EE67DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o EE67Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #10093: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der  - PASSED
chains.sh: Creating certficate EE67CA67.der signed by CA67
certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 1128112911   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10094: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67  - PASSED
chains.sh: Importing certificate EE67CA67.der to EE67DB database
certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der
chains.sh: #10095: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #10096: AnyPolicyWithLevel: Creating DB AllDB  - PASSED
chains.sh: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128112882 (0x433da2f2)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 16:30:28 2012
            Not After : Tue Nov 28 16:30:28 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bd:aa:6f:fb:4d:45:fd:c1:7d:c7:13:5d:38:ac:df:23:
                    85:a2:a9:7b:ba:5f:ea:de:b9:3f:de:5a:cf:b0:bd:d6:
                    0f:ba:c5:e7:0c:4a:3e:cc:02:c7:46:4d:27:ef:fd:32:
                    7e:07:8d:f1:33:d2:a0:01:72:11:43:b2:03:2d:7a:55:
                    e5:42:3d:a4:f7:3a:25:78:ae:99:d0:a7:94:d7:ca:fc:
                    19:af:9d:0d:1b:9d:73:9d:97:eb:8c:9c:24:fe:5e:13:
                    a6:f6:cf:b3:a5:4f:3f:d7:7d:9a:04:d7:08:d8:e4:60:
                    10:40:9b:d1:98:c7:32:8e:44:63:ac:ef:cc:61:d6:e3
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        95:d6:49:38:d5:b7:ad:0d:e5:b0:4a:e9:a3:e3:fa:ce:
        3c:3f:e6:81:0d:41:4a:c3:58:0a:d3:88:52:50:ef:41:
        8e:b7:d2:1c:42:6e:c7:b9:e1:0b:6b:d7:9a:a2:5f:e9:
        d2:b2:dc:f8:01:ce:ec:30:2d:41:21:ff:6a:93:db:ad:
        a0:d2:87:7e:eb:09:35:c8:08:67:2c:f3:5d:e1:dc:67:
        e3:bb:6e:aa:17:e0:ae:56:3b:5a:e0:2a:60:74:16:65:
        34:ae:13:fc:b2:bf:f2:2c:08:e1:9b:f8:a3:ff:21:d2:
        88:a2:55:b4:4d:78:9d:52:44:e6:5c:9e:1f:2c:ed:79
    Fingerprint (MD5):
        FC:70:B9:CF:BB:04:80:49:44:E5:8F:1B:6E:FC:E7:EF
    Fingerprint (SHA1):
        56:7E:5E:30:AD:4F:99:7D:31:D4:80:01:25:19:CE:8F:90:8A:16:7D


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US"
Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #10097: AnyPolicyWithLevel: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.0  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10098: AnyPolicyWithLevel: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.5.29.32.0  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128112882 (0x433da2f2)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 16:30:28 2012
            Not After : Tue Nov 28 16:30:28 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bd:aa:6f:fb:4d:45:fd:c1:7d:c7:13:5d:38:ac:df:23:
                    85:a2:a9:7b:ba:5f:ea:de:b9:3f:de:5a:cf:b0:bd:d6:
                    0f:ba:c5:e7:0c:4a:3e:cc:02:c7:46:4d:27:ef:fd:32:
                    7e:07:8d:f1:33:d2:a0:01:72:11:43:b2:03:2d:7a:55:
                    e5:42:3d:a4:f7:3a:25:78:ae:99:d0:a7:94:d7:ca:fc:
                    19:af:9d:0d:1b:9d:73:9d:97:eb:8c:9c:24:fe:5e:13:
                    a6:f6:cf:b3:a5:4f:3f:d7:7d:9a:04:d7:08:d8:e4:60:
                    10:40:9b:d1:98:c7:32:8e:44:63:ac:ef:cc:61:d6:e3
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        95:d6:49:38:d5:b7:ad:0d:e5:b0:4a:e9:a3:e3:fa:ce:
        3c:3f:e6:81:0d:41:4a:c3:58:0a:d3:88:52:50:ef:41:
        8e:b7:d2:1c:42:6e:c7:b9:e1:0b:6b:d7:9a:a2:5f:e9:
        d2:b2:dc:f8:01:ce:ec:30:2d:41:21:ff:6a:93:db:ad:
        a0:d2:87:7e:eb:09:35:c8:08:67:2c:f3:5d:e1:dc:67:
        e3:bb:6e:aa:17:e0:ae:56:3b:5a:e0:2a:60:74:16:65:
        34:ae:13:fc:b2:bf:f2:2c:08:e1:9b:f8:a3:ff:21:d2:
        88:a2:55:b4:4d:78:9d:52:44:e6:5c:9e:1f:2c:ed:79
    Fingerprint (MD5):
        FC:70:B9:CF:BB:04:80:49:44:E5:8F:1B:6E:FC:E7:EF
    Fingerprint (SHA1):
        56:7E:5E:30:AD:4F:99:7D:31:D4:80:01:25:19:CE:8F:90:8A:16:7D


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US"
Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #10099: AnyPolicyWithLevel: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10100: AnyPolicyWithLevel: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.0  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10101: AnyPolicyWithLevel: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.5.29.32.0  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10102: AnyPolicyWithLevel: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags  -d AllDB     -t RootCA.der
vfychain -d AllDB -pp -vv      EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128112882 (0x433da2f2)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 16:30:28 2012
            Not After : Tue Nov 28 16:30:28 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bd:aa:6f:fb:4d:45:fd:c1:7d:c7:13:5d:38:ac:df:23:
                    85:a2:a9:7b:ba:5f:ea:de:b9:3f:de:5a:cf:b0:bd:d6:
                    0f:ba:c5:e7:0c:4a:3e:cc:02:c7:46:4d:27:ef:fd:32:
                    7e:07:8d:f1:33:d2:a0:01:72:11:43:b2:03:2d:7a:55:
                    e5:42:3d:a4:f7:3a:25:78:ae:99:d0:a7:94:d7:ca:fc:
                    19:af:9d:0d:1b:9d:73:9d:97:eb:8c:9c:24:fe:5e:13:
                    a6:f6:cf:b3:a5:4f:3f:d7:7d:9a:04:d7:08:d8:e4:60:
                    10:40:9b:d1:98:c7:32:8e:44:63:ac:ef:cc:61:d6:e3
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        95:d6:49:38:d5:b7:ad:0d:e5:b0:4a:e9:a3:e3:fa:ce:
        3c:3f:e6:81:0d:41:4a:c3:58:0a:d3:88:52:50:ef:41:
        8e:b7:d2:1c:42:6e:c7:b9:e1:0b:6b:d7:9a:a2:5f:e9:
        d2:b2:dc:f8:01:ce:ec:30:2d:41:21:ff:6a:93:db:ad:
        a0:d2:87:7e:eb:09:35:c8:08:67:2c:f3:5d:e1:dc:67:
        e3:bb:6e:aa:17:e0:ae:56:3b:5a:e0:2a:60:74:16:65:
        34:ae:13:fc:b2:bf:f2:2c:08:e1:9b:f8:a3:ff:21:d2:
        88:a2:55:b4:4d:78:9d:52:44:e6:5c:9e:1f:2c:ed:79
    Fingerprint (MD5):
        FC:70:B9:CF:BB:04:80:49:44:E5:8F:1B:6E:FC:E7:EF
    Fingerprint (SHA1):
        56:7E:5E:30:AD:4F:99:7D:31:D4:80:01:25:19:CE:8F:90:8A:16:7D


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US"
Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #10103: AnyPolicyWithLevel: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags  -d AllDB     -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10104: AnyPolicyWithLevel: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.0  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10105: AnyPolicyWithLevel: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.5.29.32.0  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10106: AnyPolicyWithLevel: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags  -d AllDB     -t RootCA.der
vfychain -d AllDB -pp -vv      EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128112882 (0x433da2f2)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 16:30:28 2012
            Not After : Tue Nov 28 16:30:28 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bd:aa:6f:fb:4d:45:fd:c1:7d:c7:13:5d:38:ac:df:23:
                    85:a2:a9:7b:ba:5f:ea:de:b9:3f:de:5a:cf:b0:bd:d6:
                    0f:ba:c5:e7:0c:4a:3e:cc:02:c7:46:4d:27:ef:fd:32:
                    7e:07:8d:f1:33:d2:a0:01:72:11:43:b2:03:2d:7a:55:
                    e5:42:3d:a4:f7:3a:25:78:ae:99:d0:a7:94:d7:ca:fc:
                    19:af:9d:0d:1b:9d:73:9d:97:eb:8c:9c:24:fe:5e:13:
                    a6:f6:cf:b3:a5:4f:3f:d7:7d:9a:04:d7:08:d8:e4:60:
                    10:40:9b:d1:98:c7:32:8e:44:63:ac:ef:cc:61:d6:e3
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        95:d6:49:38:d5:b7:ad:0d:e5:b0:4a:e9:a3:e3:fa:ce:
        3c:3f:e6:81:0d:41:4a:c3:58:0a:d3:88:52:50:ef:41:
        8e:b7:d2:1c:42:6e:c7:b9:e1:0b:6b:d7:9a:a2:5f:e9:
        d2:b2:dc:f8:01:ce:ec:30:2d:41:21:ff:6a:93:db:ad:
        a0:d2:87:7e:eb:09:35:c8:08:67:2c:f3:5d:e1:dc:67:
        e3:bb:6e:aa:17:e0:ae:56:3b:5a:e0:2a:60:74:16:65:
        34:ae:13:fc:b2:bf:f2:2c:08:e1:9b:f8:a3:ff:21:d2:
        88:a2:55:b4:4d:78:9d:52:44:e6:5c:9e:1f:2c:ed:79
    Fingerprint (MD5):
        FC:70:B9:CF:BB:04:80:49:44:E5:8F:1B:6E:FC:E7:EF
    Fingerprint (SHA1):
        56:7E:5E:30:AD:4F:99:7D:31:D4:80:01:25:19:CE:8F:90:8A:16:7D


Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US"
Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US"
Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #10107: AnyPolicyWithLevel: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags  -d AllDB     -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128112882 (0x433da2f2)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 16:30:28 2012
            Not After : Tue Nov 28 16:30:28 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bd:aa:6f:fb:4d:45:fd:c1:7d:c7:13:5d:38:ac:df:23:
                    85:a2:a9:7b:ba:5f:ea:de:b9:3f:de:5a:cf:b0:bd:d6:
                    0f:ba:c5:e7:0c:4a:3e:cc:02:c7:46:4d:27:ef:fd:32:
                    7e:07:8d:f1:33:d2:a0:01:72:11:43:b2:03:2d:7a:55:
                    e5:42:3d:a4:f7:3a:25:78:ae:99:d0:a7:94:d7:ca:fc:
                    19:af:9d:0d:1b:9d:73:9d:97:eb:8c:9c:24:fe:5e:13:
                    a6:f6:cf:b3:a5:4f:3f:d7:7d:9a:04:d7:08:d8:e4:60:
                    10:40:9b:d1:98:c7:32:8e:44:63:ac:ef:cc:61:d6:e3
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        95:d6:49:38:d5:b7:ad:0d:e5:b0:4a:e9:a3:e3:fa:ce:
        3c:3f:e6:81:0d:41:4a:c3:58:0a:d3:88:52:50:ef:41:
        8e:b7:d2:1c:42:6e:c7:b9:e1:0b:6b:d7:9a:a2:5f:e9:
        d2:b2:dc:f8:01:ce:ec:30:2d:41:21:ff:6a:93:db:ad:
        a0:d2:87:7e:eb:09:35:c8:08:67:2c:f3:5d:e1:dc:67:
        e3:bb:6e:aa:17:e0:ae:56:3b:5a:e0:2a:60:74:16:65:
        34:ae:13:fc:b2:bf:f2:2c:08:e1:9b:f8:a3:ff:21:d2:
        88:a2:55:b4:4d:78:9d:52:44:e6:5c:9e:1f:2c:ed:79
    Fingerprint (MD5):
        FC:70:B9:CF:BB:04:80:49:44:E5:8F:1B:6E:FC:E7:EF
    Fingerprint (SHA1):
        56:7E:5E:30:AD:4F:99:7D:31:D4:80:01:25:19:CE:8F:90:8A:16:7D


Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US"
Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US"
Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #10108: AnyPolicyWithLevel: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.0  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10109: AnyPolicyWithLevel: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.5.29.32.0  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128112882 (0x433da2f2)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 16:30:28 2012
            Not After : Tue Nov 28 16:30:28 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bd:aa:6f:fb:4d:45:fd:c1:7d:c7:13:5d:38:ac:df:23:
                    85:a2:a9:7b:ba:5f:ea:de:b9:3f:de:5a:cf:b0:bd:d6:
                    0f:ba:c5:e7:0c:4a:3e:cc:02:c7:46:4d:27:ef:fd:32:
                    7e:07:8d:f1:33:d2:a0:01:72:11:43:b2:03:2d:7a:55:
                    e5:42:3d:a4:f7:3a:25:78:ae:99:d0:a7:94:d7:ca:fc:
                    19:af:9d:0d:1b:9d:73:9d:97:eb:8c:9c:24:fe:5e:13:
                    a6:f6:cf:b3:a5:4f:3f:d7:7d:9a:04:d7:08:d8:e4:60:
                    10:40:9b:d1:98:c7:32:8e:44:63:ac:ef:cc:61:d6:e3
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        95:d6:49:38:d5:b7:ad:0d:e5:b0:4a:e9:a3:e3:fa:ce:
        3c:3f:e6:81:0d:41:4a:c3:58:0a:d3:88:52:50:ef:41:
        8e:b7:d2:1c:42:6e:c7:b9:e1:0b:6b:d7:9a:a2:5f:e9:
        d2:b2:dc:f8:01:ce:ec:30:2d:41:21:ff:6a:93:db:ad:
        a0:d2:87:7e:eb:09:35:c8:08:67:2c:f3:5d:e1:dc:67:
        e3:bb:6e:aa:17:e0:ae:56:3b:5a:e0:2a:60:74:16:65:
        34:ae:13:fc:b2:bf:f2:2c:08:e1:9b:f8:a3:ff:21:d2:
        88:a2:55:b4:4d:78:9d:52:44:e6:5c:9e:1f:2c:ed:79
    Fingerprint (MD5):
        FC:70:B9:CF:BB:04:80:49:44:E5:8F:1B:6E:FC:E7:EF
    Fingerprint (SHA1):
        56:7E:5E:30:AD:4F:99:7D:31:D4:80:01:25:19:CE:8F:90:8A:16:7D


Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US"
Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US"
Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #10110: AnyPolicyWithLevel: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10111: AnyPolicyWithLevel: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.0  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10112: AnyPolicyWithLevel: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.5.29.32.0  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10113: AnyPolicyWithLevel: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags  -d AllDB     -t RootCA.der
vfychain -d AllDB -pp -vv      EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128112882 (0x433da2f2)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 16:30:28 2012
            Not After : Tue Nov 28 16:30:28 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bd:aa:6f:fb:4d:45:fd:c1:7d:c7:13:5d:38:ac:df:23:
                    85:a2:a9:7b:ba:5f:ea:de:b9:3f:de:5a:cf:b0:bd:d6:
                    0f:ba:c5:e7:0c:4a:3e:cc:02:c7:46:4d:27:ef:fd:32:
                    7e:07:8d:f1:33:d2:a0:01:72:11:43:b2:03:2d:7a:55:
                    e5:42:3d:a4:f7:3a:25:78:ae:99:d0:a7:94:d7:ca:fc:
                    19:af:9d:0d:1b:9d:73:9d:97:eb:8c:9c:24:fe:5e:13:
                    a6:f6:cf:b3:a5:4f:3f:d7:7d:9a:04:d7:08:d8:e4:60:
                    10:40:9b:d1:98:c7:32:8e:44:63:ac:ef:cc:61:d6:e3
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        95:d6:49:38:d5:b7:ad:0d:e5:b0:4a:e9:a3:e3:fa:ce:
        3c:3f:e6:81:0d:41:4a:c3:58:0a:d3:88:52:50:ef:41:
        8e:b7:d2:1c:42:6e:c7:b9:e1:0b:6b:d7:9a:a2:5f:e9:
        d2:b2:dc:f8:01:ce:ec:30:2d:41:21:ff:6a:93:db:ad:
        a0:d2:87:7e:eb:09:35:c8:08:67:2c:f3:5d:e1:dc:67:
        e3:bb:6e:aa:17:e0:ae:56:3b:5a:e0:2a:60:74:16:65:
        34:ae:13:fc:b2:bf:f2:2c:08:e1:9b:f8:a3:ff:21:d2:
        88:a2:55:b4:4d:78:9d:52:44:e6:5c:9e:1f:2c:ed:79
    Fingerprint (MD5):
        FC:70:B9:CF:BB:04:80:49:44:E5:8F:1B:6E:FC:E7:EF
    Fingerprint (SHA1):
        56:7E:5E:30:AD:4F:99:7D:31:D4:80:01:25:19:CE:8F:90:8A:16:7D


Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US"
Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US"
Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #10114: AnyPolicyWithLevel: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags  -d AllDB     -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128112882 (0x433da2f2)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 16:30:28 2012
            Not After : Tue Nov 28 16:30:28 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bd:aa:6f:fb:4d:45:fd:c1:7d:c7:13:5d:38:ac:df:23:
                    85:a2:a9:7b:ba:5f:ea:de:b9:3f:de:5a:cf:b0:bd:d6:
                    0f:ba:c5:e7:0c:4a:3e:cc:02:c7:46:4d:27:ef:fd:32:
                    7e:07:8d:f1:33:d2:a0:01:72:11:43:b2:03:2d:7a:55:
                    e5:42:3d:a4:f7:3a:25:78:ae:99:d0:a7:94:d7:ca:fc:
                    19:af:9d:0d:1b:9d:73:9d:97:eb:8c:9c:24:fe:5e:13:
                    a6:f6:cf:b3:a5:4f:3f:d7:7d:9a:04:d7:08:d8:e4:60:
                    10:40:9b:d1:98:c7:32:8e:44:63:ac:ef:cc:61:d6:e3
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        95:d6:49:38:d5:b7:ad:0d:e5:b0:4a:e9:a3:e3:fa:ce:
        3c:3f:e6:81:0d:41:4a:c3:58:0a:d3:88:52:50:ef:41:
        8e:b7:d2:1c:42:6e:c7:b9:e1:0b:6b:d7:9a:a2:5f:e9:
        d2:b2:dc:f8:01:ce:ec:30:2d:41:21:ff:6a:93:db:ad:
        a0:d2:87:7e:eb:09:35:c8:08:67:2c:f3:5d:e1:dc:67:
        e3:bb:6e:aa:17:e0:ae:56:3b:5a:e0:2a:60:74:16:65:
        34:ae:13:fc:b2:bf:f2:2c:08:e1:9b:f8:a3:ff:21:d2:
        88:a2:55:b4:4d:78:9d:52:44:e6:5c:9e:1f:2c:ed:79
    Fingerprint (MD5):
        FC:70:B9:CF:BB:04:80:49:44:E5:8F:1B:6E:FC:E7:EF
    Fingerprint (SHA1):
        56:7E:5E:30:AD:4F:99:7D:31:D4:80:01:25:19:CE:8F:90:8A:16:7D


Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US"
Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US"
Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US"
Returned value is 0, expected result is pass
chains.sh: #10115: AnyPolicyWithLevel: Verifying certificate(s)  EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128112882 (0x433da2f2)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 16:30:28 2012
            Not After : Tue Nov 28 16:30:28 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bd:aa:6f:fb:4d:45:fd:c1:7d:c7:13:5d:38:ac:df:23:
                    85:a2:a9:7b:ba:5f:ea:de:b9:3f:de:5a:cf:b0:bd:d6:
                    0f:ba:c5:e7:0c:4a:3e:cc:02:c7:46:4d:27:ef:fd:32:
                    7e:07:8d:f1:33:d2:a0:01:72:11:43:b2:03:2d:7a:55:
                    e5:42:3d:a4:f7:3a:25:78:ae:99:d0:a7:94:d7:ca:fc:
                    19:af:9d:0d:1b:9d:73:9d:97:eb:8c:9c:24:fe:5e:13:
                    a6:f6:cf:b3:a5:4f:3f:d7:7d:9a:04:d7:08:d8:e4:60:
                    10:40:9b:d1:98:c7:32:8e:44:63:ac:ef:cc:61:d6:e3
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        95:d6:49:38:d5:b7:ad:0d:e5:b0:4a:e9:a3:e3:fa:ce:
        3c:3f:e6:81:0d:41:4a:c3:58:0a:d3:88:52:50:ef:41:
        8e:b7:d2:1c:42:6e:c7:b9:e1:0b:6b:d7:9a:a2:5f:e9:
        d2:b2:dc:f8:01:ce:ec:30:2d:41:21:ff:6a:93:db:ad:
        a0:d2:87:7e:eb:09:35:c8:08:67:2c:f3:5d:e1:dc:67:
        e3:bb:6e:aa:17:e0:ae:56:3b:5a:e0:2a:60:74:16:65:
        34:ae:13:fc:b2:bf:f2:2c:08:e1:9b:f8:a3:ff:21:d2:
        88:a2:55:b4:4d:78:9d:52:44:e6:5c:9e:1f:2c:ed:79
    Fingerprint (MD5):
        FC:70:B9:CF:BB:04:80:49:44:E5:8F:1B:6E:FC:E7:EF
    Fingerprint (SHA1):
        56:7E:5E:30:AD:4F:99:7D:31:D4:80:01:25:19:CE:8F:90:8A:16:7D


Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US"
Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US"
Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US"
Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US"
Returned value is 0, expected result is pass
chains.sh: #10116: AnyPolicyWithLevel: Verifying certificate(s)  EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128112882 (0x433da2f2)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 16:30:28 2012
            Not After : Tue Nov 28 16:30:28 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bd:aa:6f:fb:4d:45:fd:c1:7d:c7:13:5d:38:ac:df:23:
                    85:a2:a9:7b:ba:5f:ea:de:b9:3f:de:5a:cf:b0:bd:d6:
                    0f:ba:c5:e7:0c:4a:3e:cc:02:c7:46:4d:27:ef:fd:32:
                    7e:07:8d:f1:33:d2:a0:01:72:11:43:b2:03:2d:7a:55:
                    e5:42:3d:a4:f7:3a:25:78:ae:99:d0:a7:94:d7:ca:fc:
                    19:af:9d:0d:1b:9d:73:9d:97:eb:8c:9c:24:fe:5e:13:
                    a6:f6:cf:b3:a5:4f:3f:d7:7d:9a:04:d7:08:d8:e4:60:
                    10:40:9b:d1:98:c7:32:8e:44:63:ac:ef:cc:61:d6:e3
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        95:d6:49:38:d5:b7:ad:0d:e5:b0:4a:e9:a3:e3:fa:ce:
        3c:3f:e6:81:0d:41:4a:c3:58:0a:d3:88:52:50:ef:41:
        8e:b7:d2:1c:42:6e:c7:b9:e1:0b:6b:d7:9a:a2:5f:e9:
        d2:b2:dc:f8:01:ce:ec:30:2d:41:21:ff:6a:93:db:ad:
        a0:d2:87:7e:eb:09:35:c8:08:67:2c:f3:5d:e1:dc:67:
        e3:bb:6e:aa:17:e0:ae:56:3b:5a:e0:2a:60:74:16:65:
        34:ae:13:fc:b2:bf:f2:2c:08:e1:9b:f8:a3:ff:21:d2:
        88:a2:55:b4:4d:78:9d:52:44:e6:5c:9e:1f:2c:ed:79
    Fingerprint (MD5):
        FC:70:B9:CF:BB:04:80:49:44:E5:8F:1B:6E:FC:E7:EF
    Fingerprint (SHA1):
        56:7E:5E:30:AD:4F:99:7D:31:D4:80:01:25:19:CE:8F:90:8A:16:7D


Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US"
Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US"
Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US"
Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US"
Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US"
Returned value is 0, expected result is pass
chains.sh: #10117: AnyPolicyWithLevel: Verifying certificate(s)  EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128112882 (0x433da2f2)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 16:30:28 2012
            Not After : Tue Nov 28 16:30:28 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bd:aa:6f:fb:4d:45:fd:c1:7d:c7:13:5d:38:ac:df:23:
                    85:a2:a9:7b:ba:5f:ea:de:b9:3f:de:5a:cf:b0:bd:d6:
                    0f:ba:c5:e7:0c:4a:3e:cc:02:c7:46:4d:27:ef:fd:32:
                    7e:07:8d:f1:33:d2:a0:01:72:11:43:b2:03:2d:7a:55:
                    e5:42:3d:a4:f7:3a:25:78:ae:99:d0:a7:94:d7:ca:fc:
                    19:af:9d:0d:1b:9d:73:9d:97:eb:8c:9c:24:fe:5e:13:
                    a6:f6:cf:b3:a5:4f:3f:d7:7d:9a:04:d7:08:d8:e4:60:
                    10:40:9b:d1:98:c7:32:8e:44:63:ac:ef:cc:61:d6:e3
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        95:d6:49:38:d5:b7:ad:0d:e5:b0:4a:e9:a3:e3:fa:ce:
        3c:3f:e6:81:0d:41:4a:c3:58:0a:d3:88:52:50:ef:41:
        8e:b7:d2:1c:42:6e:c7:b9:e1:0b:6b:d7:9a:a2:5f:e9:
        d2:b2:dc:f8:01:ce:ec:30:2d:41:21:ff:6a:93:db:ad:
        a0:d2:87:7e:eb:09:35:c8:08:67:2c:f3:5d:e1:dc:67:
        e3:bb:6e:aa:17:e0:ae:56:3b:5a:e0:2a:60:74:16:65:
        34:ae:13:fc:b2:bf:f2:2c:08:e1:9b:f8:a3:ff:21:d2:
        88:a2:55:b4:4d:78:9d:52:44:e6:5c:9e:1f:2c:ed:79
    Fingerprint (MD5):
        FC:70:B9:CF:BB:04:80:49:44:E5:8F:1B:6E:FC:E7:EF
    Fingerprint (SHA1):
        56:7E:5E:30:AD:4F:99:7D:31:D4:80:01:25:19:CE:8F:90:8A:16:7D


Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US"
Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US"
Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US"
Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US"
Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US"
Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US"
Returned value is 0, expected result is pass
chains.sh: #10118: AnyPolicyWithLevel: Verifying certificate(s)  EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128112882 (0x433da2f2)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 16:30:28 2012
            Not After : Tue Nov 28 16:30:28 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bd:aa:6f:fb:4d:45:fd:c1:7d:c7:13:5d:38:ac:df:23:
                    85:a2:a9:7b:ba:5f:ea:de:b9:3f:de:5a:cf:b0:bd:d6:
                    0f:ba:c5:e7:0c:4a:3e:cc:02:c7:46:4d:27:ef:fd:32:
                    7e:07:8d:f1:33:d2:a0:01:72:11:43:b2:03:2d:7a:55:
                    e5:42:3d:a4:f7:3a:25:78:ae:99:d0:a7:94:d7:ca:fc:
                    19:af:9d:0d:1b:9d:73:9d:97:eb:8c:9c:24:fe:5e:13:
                    a6:f6:cf:b3:a5:4f:3f:d7:7d:9a:04:d7:08:d8:e4:60:
                    10:40:9b:d1:98:c7:32:8e:44:63:ac:ef:cc:61:d6:e3
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        95:d6:49:38:d5:b7:ad:0d:e5:b0:4a:e9:a3:e3:fa:ce:
        3c:3f:e6:81:0d:41:4a:c3:58:0a:d3:88:52:50:ef:41:
        8e:b7:d2:1c:42:6e:c7:b9:e1:0b:6b:d7:9a:a2:5f:e9:
        d2:b2:dc:f8:01:ce:ec:30:2d:41:21:ff:6a:93:db:ad:
        a0:d2:87:7e:eb:09:35:c8:08:67:2c:f3:5d:e1:dc:67:
        e3:bb:6e:aa:17:e0:ae:56:3b:5a:e0:2a:60:74:16:65:
        34:ae:13:fc:b2:bf:f2:2c:08:e1:9b:f8:a3:ff:21:d2:
        88:a2:55:b4:4d:78:9d:52:44:e6:5c:9e:1f:2c:ed:79
    Fingerprint (MD5):
        FC:70:B9:CF:BB:04:80:49:44:E5:8F:1B:6E:FC:E7:EF
    Fingerprint (SHA1):
        56:7E:5E:30:AD:4F:99:7D:31:D4:80:01:25:19:CE:8F:90:8A:16:7D


Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US"
Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US"
Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US"
Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US"
Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US"
Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US"
Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US"
Returned value is 0, expected result is pass
chains.sh: #10119: AnyPolicyWithLevel: Verifying certificate(s)  EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10120: AnyPolicyWithLevel: Verifying certificate(s)  EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #10121: explicitPolicy: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -m 1128112912 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #10122: explicitPolicy: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #10123: explicitPolicy: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB nonEVCADB
certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd
chains.sh: #10124: explicitPolicy: Creating DB nonEVCADB  - PASSED
chains.sh: Creating Intermediate certifiate request nonEVCAReq.der
certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US"  -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o nonEVCAReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10125: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der  - PASSED
chains.sh: Creating certficate nonEVCARoot.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 1128112913   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #10126: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root  - PASSED
chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database
certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der
chains.sh: #10127: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database  - PASSED
chains.sh: Creating DB EVCADB
certutil -N -d EVCADB -f EVCADB/dbpasswd
chains.sh: #10128: explicitPolicy: Creating DB EVCADB  - PASSED
chains.sh: Creating Intermediate certifiate request EVCAReq.der
certutil -s "CN=EVCA Intermediate, O=EVCA, C=US"  -R -2 -d EVCADB -f EVCADB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o EVCAReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10129: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der  - PASSED
chains.sh: Creating certficate EVCARoot.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 1128112914   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10130: explicitPolicy: Creating certficate EVCARoot.der signed by Root  - PASSED
chains.sh: Importing certificate EVCARoot.der to EVCADB database
certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der
chains.sh: #10131: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database  - PASSED
chains.sh: Creating DB otherEVCADB
certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd
chains.sh: #10132: explicitPolicy: Creating DB otherEVCADB  - PASSED
chains.sh: Creating Intermediate certifiate request otherEVCAReq.der
certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US"  -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o otherEVCAReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10133: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der  - PASSED
chains.sh: Creating certficate otherEVCARoot.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 1128112915   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10134: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root  - PASSED
chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database
certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der
chains.sh: #10135: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database  - PASSED
chains.sh: Creating DB validEVDB
certutil -N -d validEVDB -f validEVDB/dbpasswd
chains.sh: #10136: explicitPolicy: Creating DB validEVDB  - PASSED
chains.sh: Creating EE certifiate request validEVReq.der
certutil -s "CN=validEV EE, O=validEV, C=US"  -R  -d validEVDB -f validEVDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o validEVReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #10137: explicitPolicy: Creating EE certifiate request validEVReq.der  - PASSED
chains.sh: Creating certficate validEVEVCA.der signed by EVCA
certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 1128112916   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10138: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA  - PASSED
chains.sh: Importing certificate validEVEVCA.der to validEVDB database
certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der
chains.sh: #10139: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database  - PASSED
chains.sh: Creating DB invalidEVDB
certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd
chains.sh: #10140: explicitPolicy: Creating DB invalidEVDB  - PASSED
chains.sh: Creating EE certifiate request invalidEVReq.der
certutil -s "CN=invalidEV EE, O=invalidEV, C=US"  -R  -d invalidEVDB -f invalidEVDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o invalidEVReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #10141: explicitPolicy: Creating EE certifiate request invalidEVReq.der  - PASSED
chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA
certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 1128112917   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10142: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA  - PASSED
chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database
certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der
chains.sh: #10143: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database  - PASSED
chains.sh: Creating DB wrongEVOIDDB
certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd
chains.sh: #10144: explicitPolicy: Creating DB wrongEVOIDDB  - PASSED
chains.sh: Creating EE certifiate request wrongEVOIDReq.der
certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US"  -R  -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o wrongEVOIDReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #10145: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der  - PASSED
chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA
certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 1128112918   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10146: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA  - PASSED
chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database
certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der
chains.sh: #10147: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #10148: explicitPolicy: Creating DB AllDB  - PASSED
chains.sh: Verifying certificate(s)  validEVEVCA.der EVCARoot.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der
vfychain -d AllDB -pp -vv     -o OID.1.0  validEVEVCA.der EVCARoot.der Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128112912 (0x433da310)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:31:38 2012
            Not After : Tue Nov 28 16:31:38 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    dd:15:a3:e1:61:46:3e:ad:22:5f:60:89:f3:57:1b:32:
                    4f:ef:d6:db:89:ee:ce:87:b5:8e:39:53:b4:a1:58:19:
                    55:16:21:14:0f:40:68:5b:b0:35:20:e2:8f:3f:bd:ae:
                    46:c5:20:f9:5d:f0:03:1a:ed:94:9b:07:6d:0e:e9:0f:
                    a8:68:49:f3:9a:c4:b8:35:52:75:83:47:94:e3:f7:95:
                    ba:8b:09:83:e6:f0:16:f0:66:c7:e1:11:bc:78:1a:0b:
                    76:57:7f:96:df:18:ee:1f:39:cc:6f:ec:88:80:a5:fd:
                    c4:d4:23:3a:ec:19:ee:37:0d:9b:b0:df:4f:2d:09:6d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        0c:1d:b5:af:ed:8c:a1:d5:77:2d:24:73:34:f7:c3:f2:
        50:df:fc:5a:d1:1c:88:17:b4:62:47:dc:1a:d0:67:9d:
        6e:96:ed:7c:2c:23:6b:09:28:3b:fd:d8:61:22:fa:48:
        7c:bc:ed:1c:48:fa:3a:ad:31:d0:d5:62:2d:32:99:08:
        dd:a7:8f:cb:0e:0b:40:f5:fc:f8:36:15:61:1e:49:20:
        3d:ab:b8:c4:8f:0b:df:d4:eb:98:5a:7c:61:e4:cc:c5:
        cb:38:53:96:d8:b0:04:99:10:dd:c6:cf:c5:47:28:94:
        40:56:00:a5:3d:11:c6:db:1f:c4:97:1f:8c:a9:ec:b2
    Fingerprint (MD5):
        DD:FD:C9:54:9D:18:C3:DC:83:51:A5:74:42:27:73:19
    Fingerprint (SHA1):
        A1:C1:17:8C:14:35:D9:AD:DA:94:7D:16:04:C0:EF:05:A3:4C:5B:6F


Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US"
Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US"
Returned value is 0, expected result is pass
chains.sh: #10149: explicitPolicy: Verifying certificate(s)  validEVEVCA.der EVCARoot.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der
vfychain -d AllDB -pp -vv     -o OID.1.0  invalidEVnonEVCA.der nonEVCARoot.der Root.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10150: explicitPolicy: Verifying certificate(s)  invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der
vfychain -d AllDB -pp -vv     -o OID.1.0  wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10151: explicitPolicy: Verifying certificate(s)  wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #10152: explicitPolicy: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  validEVEVCA.der EVCARoot.der with flags  -d AllDB    -o OID.1.0 
vfychain -d AllDB -pp -vv     -o OID.1.0  validEVEVCA.der EVCARoot.der 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128112912 (0x433da310)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:31:38 2012
            Not After : Tue Nov 28 16:31:38 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    dd:15:a3:e1:61:46:3e:ad:22:5f:60:89:f3:57:1b:32:
                    4f:ef:d6:db:89:ee:ce:87:b5:8e:39:53:b4:a1:58:19:
                    55:16:21:14:0f:40:68:5b:b0:35:20:e2:8f:3f:bd:ae:
                    46:c5:20:f9:5d:f0:03:1a:ed:94:9b:07:6d:0e:e9:0f:
                    a8:68:49:f3:9a:c4:b8:35:52:75:83:47:94:e3:f7:95:
                    ba:8b:09:83:e6:f0:16:f0:66:c7:e1:11:bc:78:1a:0b:
                    76:57:7f:96:df:18:ee:1f:39:cc:6f:ec:88:80:a5:fd:
                    c4:d4:23:3a:ec:19:ee:37:0d:9b:b0:df:4f:2d:09:6d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        0c:1d:b5:af:ed:8c:a1:d5:77:2d:24:73:34:f7:c3:f2:
        50:df:fc:5a:d1:1c:88:17:b4:62:47:dc:1a:d0:67:9d:
        6e:96:ed:7c:2c:23:6b:09:28:3b:fd:d8:61:22:fa:48:
        7c:bc:ed:1c:48:fa:3a:ad:31:d0:d5:62:2d:32:99:08:
        dd:a7:8f:cb:0e:0b:40:f5:fc:f8:36:15:61:1e:49:20:
        3d:ab:b8:c4:8f:0b:df:d4:eb:98:5a:7c:61:e4:cc:c5:
        cb:38:53:96:d8:b0:04:99:10:dd:c6:cf:c5:47:28:94:
        40:56:00:a5:3d:11:c6:db:1f:c4:97:1f:8c:a9:ec:b2
    Fingerprint (MD5):
        DD:FD:C9:54:9D:18:C3:DC:83:51:A5:74:42:27:73:19
    Fingerprint (SHA1):
        A1:C1:17:8C:14:35:D9:AD:DA:94:7D:16:04:C0:EF:05:A3:4C:5B:6F

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US"
Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US"
Returned value is 0, expected result is pass
chains.sh: #10153: explicitPolicy: Verifying certificate(s)  validEVEVCA.der EVCARoot.der with flags  -d AllDB    -o OID.1.0  - PASSED
chains.sh: Verifying certificate(s)  invalidEVnonEVCA.der nonEVCARoot.der with flags  -d AllDB    -o OID.1.0 
vfychain -d AllDB -pp -vv     -o OID.1.0  invalidEVnonEVCA.der nonEVCARoot.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10154: explicitPolicy: Verifying certificate(s)  invalidEVnonEVCA.der nonEVCARoot.der with flags  -d AllDB    -o OID.1.0  - PASSED
chains.sh: Verifying certificate(s)  wrongEVOIDotherEVCA.der otherEVCARoot.der with flags  -d AllDB    -o OID.1.0 
vfychain -d AllDB -pp -vv     -o OID.1.0  wrongEVOIDotherEVCA.der otherEVCARoot.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10155: explicitPolicy: Verifying certificate(s)  wrongEVOIDotherEVCA.der otherEVCARoot.der with flags  -d AllDB    -o OID.1.0  - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #10156: Mapping: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -m 1128112919 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #10157: Mapping: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #10158: Mapping: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #10159: Mapping: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10160: Mapping: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1128112920   --extCP --extPM < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n
OID.1.0
OID.1.1
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N]
Is this a critical extension [y/N]?
chains.sh: #10161: Mapping: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
chains.sh: #10162: Mapping: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #10163: Mapping: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10164: Mapping: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1128112921   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.1.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10165: Mapping: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
chains.sh: #10166: Mapping: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB UserDB
certutil -N -d UserDB -f UserDB/dbpasswd
chains.sh: #10167: Mapping: Creating DB UserDB  - PASSED
chains.sh: Creating EE certifiate request UserReq.der
certutil -s "CN=User EE, O=User, C=US"  -R  -d UserDB -f UserDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o UserReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #10168: Mapping: Creating EE certifiate request UserReq.der  - PASSED
chains.sh: Creating certficate UserCA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1128112922   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.1.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10169: Mapping: Creating certficate UserCA2.der signed by CA2  - PASSED
chains.sh: Importing certificate UserCA2.der to UserDB database
certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der
chains.sh: #10170: Mapping: Importing certificate UserCA2.der to UserDB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #10171: Mapping: Creating DB AllDB  - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #10172: Mapping: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA1Root.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der
chains.sh: #10173: Mapping: Importing certificate CA1Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA1.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der
chains.sh: #10174: Mapping: Importing certificate CA2CA1.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t Root
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128112919 (0x433da317)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:31:52 2012
            Not After : Tue Nov 28 16:31:52 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    db:01:b7:cf:29:70:f3:b4:c3:b1:a0:2d:ae:bc:a7:65:
                    30:3d:59:de:86:e3:35:d6:ee:1d:71:2c:30:12:42:e9:
                    c0:0b:1c:a1:f9:ee:8f:cc:13:bc:cc:80:b2:3e:27:9f:
                    ea:33:b2:16:00:86:e6:a0:dc:e7:58:24:44:54:66:c6:
                    d6:a8:dc:79:33:e0:eb:70:1d:a3:a6:7e:85:17:b2:17:
                    25:d8:22:a4:2b:c7:42:f8:06:ec:48:e0:35:5b:81:c7:
                    04:3c:cd:20:ba:88:8c:9d:20:27:cb:0d:fa:d2:90:72:
                    32:bc:e6:c2:b7:68:ae:af:bc:4c:6f:f2:92:bc:01:f5
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        0f:6e:9f:d5:02:a7:02:52:3a:c9:9c:82:54:06:d6:5c:
        ee:00:2e:bc:ec:e3:7e:d7:42:54:eb:e4:c3:b6:ba:f0:
        7a:c1:52:c5:20:1e:a9:ee:96:06:cf:77:97:07:43:e1:
        b8:84:b5:38:58:d3:69:57:f0:95:83:49:df:41:00:b5:
        65:64:0d:bb:71:7f:f4:3d:dd:96:16:90:47:f3:d0:a6:
        42:90:c1:09:6d:de:47:2a:de:72:55:61:43:0d:2d:21:
        7e:19:c6:8a:14:a2:09:6a:c3:0c:ea:95:72:1a:cc:0d:
        ec:81:81:9e:f7:0c:5e:9e:92:5b:87:58:7e:04:66:b2
    Fingerprint (MD5):
        92:5A:E4:B4:2E:EE:2B:05:D5:A3:A1:A9:D7:89:37:B8
    Fingerprint (SHA1):
        49:42:C7:C9:A5:37:8C:00:BA:59:76:4C:6A:1F:2A:43:7F:A9:A1:3F

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #10175: Mapping: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.1  -t Root
vfychain -d AllDB -pp -vv     -o OID.1.1  UserCA2.der  -t Root
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10176: Mapping: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.1  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t CA1
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der  -t CA1
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CA1 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10177: Mapping: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.1  -t CA1
vfychain -d AllDB -pp -vv     -o OID.1.1  UserCA2.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128112920 (0x433da318)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:31:54 2012
            Not After : Tue Nov 28 16:31:54 2017
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c7:ca:e4:36:a0:fe:f1:41:f0:08:a2:09:47:84:2c:df:
                    fd:c5:d4:70:e5:10:0f:18:d5:21:20:b1:1f:84:09:f3:
                    8f:f3:45:2f:6d:3b:c9:38:72:44:fc:6e:4a:32:52:d6:
                    7d:fb:f4:f5:20:5c:01:f5:58:9f:99:98:d6:8c:6e:7f:
                    4c:ee:c1:6f:43:f1:b6:37:c3:31:46:48:d0:d9:ed:34:
                    e3:2d:a7:f0:d6:c8:48:1e:e8:70:e1:ba:cd:4e:d5:f7:
                    cc:cf:7b:85:d2:01:51:19:e6:70:63:2d:4e:a8:d4:39:
                    0a:e9:39:f9:37:84:1e:6e:46:7c:aa:10:dd:2a:7b:db
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policy Mappings
            Data: Sequence {
                Sequence {
                    OID.1.0
                    User Defined Policy OID
                }
            }

            Name: Certificate Policies
            Data: 
                Policy Name: OID.1.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        00:eb:36:f8:aa:d9:42:6a:8d:31:93:bd:23:80:e0:b6:
        0a:dc:34:d7:1a:13:eb:3a:76:84:dc:6c:60:53:34:c4:
        1b:19:54:d8:58:d0:c8:23:58:80:9b:8c:27:72:b7:c6:
        18:96:82:af:62:45:4d:82:30:25:16:78:99:78:ab:f2:
        ab:3a:1d:f5:13:ba:14:8a:26:ee:75:6b:06:7b:fa:55:
        70:e9:80:13:52:a9:79:ff:6e:6b:49:ee:ed:55:92:1e:
        3d:ab:fc:d0:bb:cb:05:c9:c9:58:a2:24:1f:ea:6c:f0:
        e6:c4:c6:2e:57:b6:ad:19:9a:8b:0c:00:02:dd:d2:f4
    Fingerprint (MD5):
        28:4B:B8:AD:43:E2:A2:C1:82:73:F9:A8:4F:0A:DE:70
    Fingerprint (SHA1):
        BA:6B:8D:C6:83:EA:F1:80:39:3E:C8:28:45:67:C8:D6:6A:A3:42:90

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #10178: Mapping: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.1  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t CA2
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der  -t CA2
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CA2 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10179: Mapping: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.1  -t CA2
vfychain -d AllDB -pp -vv     -o OID.1.1  UserCA2.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128112921 (0x433da319)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Wed Nov 28 16:31:56 2012
            Not After : Tue Nov 28 16:31:56 2017
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ca:6d:be:13:0f:04:88:d3:d3:c7:4f:93:47:f0:c8:73:
                    2b:9b:f5:54:a1:23:99:97:72:03:23:0c:5e:6d:e6:72:
                    0c:9f:9c:f7:ed:25:12:e8:12:63:21:df:38:1e:0f:b7:
                    4a:30:d1:cf:e1:d2:2e:70:12:29:e2:56:83:3d:22:ca:
                    0a:7a:b2:cc:53:b3:6d:e2:1c:58:f5:4a:57:3c:fa:96:
                    5a:84:48:b5:ed:ba:26:58:0c:66:0f:b0:10:bc:ce:56:
                    4e:4a:be:76:2b:c9:ff:e1:79:e4:ec:d2:4a:1e:2d:cb:
                    41:5c:38:d0:33:5b:7f:60:4d:85:a2:c0:7f:45:0f:61
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        56:a4:68:25:99:c0:6f:16:48:7d:9c:0d:94:14:ca:0f:
        bc:b9:05:70:eb:88:e6:cc:cb:33:cf:7b:38:a0:ae:c7:
        e4:23:6e:24:81:f2:a8:15:28:65:27:4b:e9:52:cd:65:
        a3:91:53:13:5b:37:c3:19:dd:85:7a:ba:d6:e9:c2:e6:
        2a:b5:15:8e:65:f8:fc:cf:62:6b:58:fd:92:4d:64:a3:
        8d:f6:72:92:f0:e5:91:ff:30:46:b6:4e:5a:7a:09:19:
        97:c2:72:58:c9:33:9f:41:d3:8e:cd:2f:73:14:6d:32:
        ee:ef:e5:4f:a4:40:06:65:f1:c4:8e:05:6d:9d:07:70
    Fingerprint (MD5):
        89:BE:64:47:0E:7F:4E:FB:02:F3:A5:EB:6E:AD:DB:CD
    Fingerprint (SHA1):
        FC:0C:05:16:33:1E:E3:41:33:E2:6F:9C:E8:BE:56:B3:19:DE:9C:09

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Returned value is 0, expected result is pass
chains.sh: #10180: Mapping: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.1  -t CA2 - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #10181: Mapping2: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -m 1128112923 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #10182: Mapping2: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #10183: Mapping2: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #10184: Mapping2: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10185: Mapping2: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1128112924   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10186: Mapping2: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
chains.sh: #10187: Mapping2: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #10188: Mapping2: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10189: Mapping2: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1128112925   --extCP --extPM < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n
OID.1.0
OID.1.1
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N]
Is this a critical extension [y/N]?
chains.sh: #10190: Mapping2: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
chains.sh: #10191: Mapping2: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB CA3DB
certutil -N -d CA3DB -f CA3DB/dbpasswd
chains.sh: #10192: Mapping2: Creating DB CA3DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA3Req.der
certutil -s "CN=CA3 Intermediate, O=CA3, C=US"  -R -2 -d CA3DB -f CA3DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA3Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10193: Mapping2: Creating Intermediate certifiate request CA3Req.der  - PASSED
chains.sh: Creating certficate CA3CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 1128112926   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.1.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10194: Mapping2: Creating certficate CA3CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate CA3CA2.der to CA3DB database
certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der
chains.sh: #10195: Mapping2: Importing certificate CA3CA2.der to CA3DB database  - PASSED
chains.sh: Creating DB UserDB
certutil -N -d UserDB -f UserDB/dbpasswd
chains.sh: #10196: Mapping2: Creating DB UserDB  - PASSED
chains.sh: Creating EE certifiate request UserReq.der
certutil -s "CN=User EE, O=User, C=US"  -R  -d UserDB -f UserDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o UserReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #10197: Mapping2: Creating EE certifiate request UserReq.der  - PASSED
chains.sh: Creating certficate UserCA3.der signed by CA3
certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 1128112927   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.1.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10198: Mapping2: Creating certficate UserCA3.der signed by CA3  - PASSED
chains.sh: Importing certificate UserCA3.der to UserDB database
certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der
chains.sh: #10199: Mapping2: Importing certificate UserCA3.der to UserDB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #10200: Mapping2: Creating DB AllDB  - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #10201: Mapping2: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA1Root.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der
chains.sh: #10202: Mapping2: Importing certificate CA1Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA1.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der
chains.sh: #10203: Mapping2: Importing certificate CA2CA1.der to AllDB database  - PASSED
chains.sh: Importing certificate CA3CA2.der to AllDB database
certutil -A -n CA3  -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der
chains.sh: #10204: Mapping2: Importing certificate CA3CA2.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.0  -t Root
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA3.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128112923 (0x433da31b)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:32:02 2012
            Not After : Tue Nov 28 16:32:02 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    be:23:da:2d:70:b5:81:ff:da:67:20:25:21:fb:75:d8:
                    7e:2a:ff:0a:9c:74:7c:d2:a7:5c:cb:fc:81:f3:b9:1a:
                    c7:05:05:ac:01:6f:cc:7e:97:2d:c0:da:b7:7e:85:c7:
                    7f:85:6b:10:34:6d:f7:9d:91:17:10:0f:d4:97:f3:f5:
                    fb:56:4b:4f:ad:c3:3b:4c:1e:15:6b:fe:80:2d:c4:5b:
                    49:c4:51:82:f1:9b:a6:61:2c:41:3d:3f:09:9d:73:4a:
                    72:8b:c6:ec:dd:4b:6f:4f:db:26:0e:24:97:17:b3:07:
                    01:c5:c4:6d:7c:fc:c3:48:a8:cb:34:9c:a2:0b:2e:cb
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        b3:0f:7e:92:52:51:d0:2b:5a:28:d9:45:09:52:0e:7b:
        1e:4c:a2:b8:40:4d:b2:a4:5b:b1:6d:1f:a4:98:e1:52:
        d6:b7:4b:98:4c:b1:46:6f:63:f4:b6:ea:5c:5e:f4:5c:
        05:e7:28:4e:3b:4e:75:48:e5:17:5d:f1:86:b3:b0:41:
        4b:d1:5d:ee:07:d4:55:ee:4e:6b:90:84:b9:d5:e2:47:
        5c:e7:c8:dd:97:c9:53:03:76:8a:eb:ae:46:9b:25:e5:
        45:59:05:dd:de:2c:27:5e:f4:84:b4:80:a2:02:9e:f6:
        bd:41:db:36:e3:65:6e:09:f8:a7:9f:d4:46:49:57:67
    Fingerprint (MD5):
        D4:7F:3E:88:B1:06:1A:0D:47:5E:47:3C:F7:F9:56:34
    Fingerprint (SHA1):
        57:C8:7A:53:21:52:D4:8E:46:66:48:B9:95:F8:86:36:57:68:BB:CA

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US"
Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #10205: Mapping2: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.1  -t Root
vfychain -d AllDB -pp -vv     -o OID.1.1  UserCA3.der  -t Root
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10206: Mapping2: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.1  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.0  -t CA1
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA3.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128112924 (0x433da31c)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:32:05 2012
            Not After : Tue Nov 28 16:32:05 2017
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ae:1b:cc:03:94:ec:5a:b4:a8:d2:ff:72:2c:e0:a6:b4:
                    a9:59:cd:f3:54:32:f4:63:e4:02:ec:af:3a:36:f8:24:
                    a5:73:20:9f:77:b4:5d:15:e7:11:98:39:4a:7b:7c:cf:
                    a1:2b:64:0c:ec:a9:ab:fb:d0:ee:1b:06:58:24:b4:f2:
                    a5:20:7b:f3:0b:16:e1:ed:27:f3:20:40:74:a2:08:3e:
                    bc:6e:3d:6d:97:a6:48:9b:07:e0:cf:ae:06:f3:82:d9:
                    5a:cd:59:4f:eb:88:a6:dd:1a:23:03:2f:77:79:7d:7d:
                    ee:78:2d:4b:fe:88:59:b8:fa:2e:af:d5:18:e9:64:ab
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        4a:d4:7a:88:4a:ca:41:07:63:5e:b5:f2:0e:52:3c:4e:
        ce:5c:99:c3:74:09:0a:7c:38:0d:40:21:c4:2e:32:e6:
        a1:df:3e:47:89:ba:33:65:bb:94:78:5e:de:b3:c0:26:
        3d:7c:8a:7a:8b:8b:b1:c7:3e:e7:3d:ee:e1:2c:84:d1:
        6c:75:11:be:97:86:0a:88:33:a2:2d:ef:24:b7:d3:8b:
        4b:a4:25:dc:6c:52:78:be:b4:18:0b:b2:6c:b2:f3:a5:
        27:ec:29:0b:cc:f8:ba:95:a0:fe:4d:7e:5e:fc:bb:ff:
        91:ce:54:1a:27:d9:80:02:54:b8:4d:b2:5a:9f:9f:38
    Fingerprint (MD5):
        E2:C4:46:8F:81:3D:19:60:41:1D:31:89:30:00:07:B0
    Fingerprint (SHA1):
        A9:38:F3:D9:A3:A9:4C:7D:20:E0:4B:70:6C:01:43:2E:CD:92:0D:39

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US"
Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #10207: Mapping2: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.1  -t CA1
vfychain -d AllDB -pp -vv     -o OID.1.1  UserCA3.der  -t CA1
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. CA1 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10208: Mapping2: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.1  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.0  -t CA2
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA3.der  -t CA2
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CA2 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10209: Mapping2: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.1  -t CA2
vfychain -d AllDB -pp -vv     -o OID.1.1  UserCA3.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128112925 (0x433da31d)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Wed Nov 28 16:32:06 2012
            Not After : Tue Nov 28 16:32:06 2017
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c9:3a:9d:e0:1a:25:6a:76:7a:9d:49:ab:9d:1c:c9:6a:
                    69:28:3f:27:69:b6:75:c9:82:ae:60:cf:81:f3:bf:ad:
                    4a:75:41:2e:90:dc:83:e7:66:1c:c4:f8:36:4f:e7:f6:
                    90:28:b1:51:1e:9c:1f:80:fa:de:ce:fa:31:31:ac:5c:
                    f5:89:45:31:ae:c7:71:bc:cd:48:05:b7:de:93:6b:b9:
                    28:73:2d:07:53:68:fc:41:d4:eb:ce:de:fc:2a:fc:bf:
                    5a:ef:17:26:63:9d:81:de:c2:31:c2:70:b6:02:68:36:
                    bc:18:ac:b6:09:75:56:18:d7:de:59:fd:d7:3b:08:bb
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policy Mappings
            Data: Sequence {
                Sequence {
                    OID.1.0
                    User Defined Policy OID
                }
            }

            Name: Certificate Policies
            Data: 
                Policy Name: OID.1.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3e:7c:91:6b:b2:3d:66:c4:7f:3e:ec:30:32:69:71:ac:
        87:d6:96:f6:12:33:7a:6c:5f:6b:20:2c:18:30:99:35:
        d5:a0:09:2d:cb:5f:1e:e6:3c:5e:9e:cd:d9:ad:15:03:
        76:7f:63:b0:9e:dc:85:c5:86:d7:e5:6b:64:de:21:02:
        c4:fd:90:07:41:41:1f:bb:5c:e5:4c:42:7e:1e:14:e4:
        97:e0:98:86:27:37:1b:70:d5:ec:1e:55:51:56:b9:5e:
        e9:5e:c3:41:58:23:89:66:d0:7e:77:fb:12:47:30:76:
        22:7d:39:ce:13:33:19:27:cf:87:40:11:4f:a2:27:f6
    Fingerprint (MD5):
        86:D4:77:F1:4C:22:2D:A6:85:D1:59:83:FA:1D:69:46
    Fingerprint (SHA1):
        93:5B:A3:A8:0C:0B:60:E0:31:62:2B:05:D4:BC:94:6A:B5:C3:1F:42

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US"
Returned value is 0, expected result is pass
chains.sh: #10210: Mapping2: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.1  -t CA2 - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #10211: AIA: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -m 1128112928 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #10212: AIA: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #10213: AIA: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #10214: AIA: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10215: AIA: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1128112929   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #10216: AIA: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
chains.sh: #10217: AIA: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #10218: AIA: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10219: AIA: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1128112930   --extAIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8556/buildnss02-10869-CA1Root-1128112838.der
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #10220: AIA: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
chains.sh: #10221: AIA: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB UserDB
certutil -N -d UserDB -f UserDB/dbpasswd
chains.sh: #10222: AIA: Creating DB UserDB  - PASSED
chains.sh: Creating EE certifiate request UserReq.der
certutil -s "CN=User EE, O=User, C=US"  -R  -d UserDB -f UserDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o UserReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #10223: AIA: Creating EE certifiate request UserReq.der  - PASSED
chains.sh: Creating certficate UserCA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1128112931   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #10224: AIA: Creating certficate UserCA2.der signed by CA2  - PASSED
chains.sh: Importing certificate UserCA2.der to UserDB database
certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der
chains.sh: #10225: AIA: Importing certificate UserCA2.der to UserDB database  - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags  -d UserDB     -t Root.der
vfychain -d UserDB -pp -vv      UserCA2.der CA2CA1.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]:
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=CA1 Intermediate,O=CA1,C=US
Returned value is 1, expected result is fail
chains.sh: #10226: AIA: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags  -d UserDB     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags  -d UserDB -f    -t Root.der
vfychain -d UserDB -pp -vv  -f    UserCA2.der CA2CA1.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]:
  ERROR -5961: TCP connection reset by peer
Returned value is 1, expected result is pass
chains.sh: #10227: AIA: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags  -d UserDB -f    -t Root.der - FAILED
chains.sh: Creating DB ArmyDB
certutil -N -d ArmyDB -f ArmyDB/dbpasswd
chains.sh: #10228: BridgeWithAIA: Creating DB ArmyDB  - PASSED
chains.sh: Creating Root CA Army
certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army  -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -m 1128112932 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #10229: BridgeWithAIA: Creating Root CA Army  - PASSED
chains.sh: Exporting Root CA Army.der
certutil -L -d ArmyDB -r -n Army -o Army.der
chains.sh: #10230: BridgeWithAIA: Exporting Root CA Army.der  - PASSED
chains.sh: Creating DB NavyDB
certutil -N -d NavyDB -f NavyDB/dbpasswd
chains.sh: #10231: BridgeWithAIA: Creating DB NavyDB  - PASSED
chains.sh: Creating Root CA Navy
certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy  -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -m 1128112933 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #10232: BridgeWithAIA: Creating Root CA Navy  - PASSED
chains.sh: Exporting Root CA Navy.der
certutil -L -d NavyDB -r -n Navy -o Navy.der
chains.sh: #10233: BridgeWithAIA: Exporting Root CA Navy.der  - PASSED
chains.sh: Creating DB BridgeDB
certutil -N -d BridgeDB -f BridgeDB/dbpasswd
chains.sh: #10234: BridgeWithAIA: Creating DB BridgeDB  - PASSED
chains.sh: Creating Bridge certifiate request BridgeReq.der
certutil -s "CN=Bridge Bridge, O=Bridge, C=US"  -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o BridgeReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10235: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der  - PASSED
chains.sh: Creating certficate BridgeArmy.der signed by Army
certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1128112934 -7 Bridge@Army  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #10236: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army  - PASSED
chains.sh: Importing certificate BridgeArmy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der
chains.sh: #10237: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database  - PASSED
chains.sh: Creating certficate BridgeNavy.der signed by Navy
certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1128112935 -7 Bridge@Navy  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #10238: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy  - PASSED
chains.sh: Importing certificate BridgeNavy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der
chains.sh: #10239: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database  - PASSED
chains.sh: Generating PKCS7 package from BridgeDB database
cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7
chains.sh: #10240: BridgeWithAIA: Generating PKCS7 package from BridgeDB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #10241: BridgeWithAIA: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10242: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Bridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1128112936   --extAIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8556/buildnss02-10869-Bridge-1128112839.p7
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #10243: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate CA1Bridge.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der
chains.sh: #10244: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #10245: BridgeWithAIA: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o EE1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #10246: BridgeWithAIA: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1128112937   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #10247: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE1CA1.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der
chains.sh: #10248: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database  - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB     -t Army.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]:
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Bridge Bridge,O=Bridge,C=US
Returned value is 1, expected result is fail
chains.sh: #10249: BridgeWithAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB     -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB -f    -t Army.der
vfychain -d EE1DB -pp -vv  -f    EE1CA1.der CA1Bridge.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]:
  ERROR -5961: TCP connection reset by peer
Returned value is 1, expected result is pass
chains.sh: #10250: BridgeWithAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB -f    -t Army.der - FAILED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB -f    -t Navy.der
vfychain -d EE1DB -pp -vv  -f    EE1CA1.der CA1Bridge.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]:
  ERROR -5961: TCP connection reset by peer
Returned value is 1, expected result is pass
chains.sh: #10251: BridgeWithAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB -f    -t Navy.der - FAILED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeArmy.der with flags  -d EE1DB -f    -t Navy.der
vfychain -d EE1DB -pp -vv  -f    EE1CA1.der CA1Bridge.der BridgeArmy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. bridge@army [Certificate Authority]:
Email Address(es): bridge@army
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Army ROOT CA,O=Army,C=US
  ERROR -5961: TCP connection reset by peer
Returned value is 1, expected result is pass
chains.sh: #10252: BridgeWithAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeArmy.der with flags  -d EE1DB -f    -t Navy.der - FAILED
chains.sh: Creating DB ArmyDB
certutil -N -d ArmyDB -f ArmyDB/dbpasswd
chains.sh: #10253: BridgeWithHalfAIA: Creating DB ArmyDB  - PASSED
chains.sh: Creating Root CA Army
certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army  -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -m 1128112938 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #10254: BridgeWithHalfAIA: Creating Root CA Army  - PASSED
chains.sh: Exporting Root CA Army.der
certutil -L -d ArmyDB -r -n Army -o Army.der
chains.sh: #10255: BridgeWithHalfAIA: Exporting Root CA Army.der  - PASSED
chains.sh: Creating DB NavyDB
certutil -N -d NavyDB -f NavyDB/dbpasswd
chains.sh: #10256: BridgeWithHalfAIA: Creating DB NavyDB  - PASSED
chains.sh: Creating Root CA Navy
certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy  -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -m 1128112939 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #10257: BridgeWithHalfAIA: Creating Root CA Navy  - PASSED
chains.sh: Exporting Root CA Navy.der
certutil -L -d NavyDB -r -n Navy -o Navy.der
chains.sh: #10258: BridgeWithHalfAIA: Exporting Root CA Navy.der  - PASSED
chains.sh: Creating DB BridgeDB
certutil -N -d BridgeDB -f BridgeDB/dbpasswd
chains.sh: #10259: BridgeWithHalfAIA: Creating DB BridgeDB  - PASSED
chains.sh: Creating Bridge certifiate request BridgeReq.der
certutil -s "CN=Bridge Bridge, O=Bridge, C=US"  -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o BridgeReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10260: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der  - PASSED
chains.sh: Creating certficate BridgeArmy.der signed by Army
certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1128112940 -7 Bridge@Army  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #10261: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army  - PASSED
chains.sh: Importing certificate BridgeArmy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der
chains.sh: #10262: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database  - PASSED
chains.sh: Creating certficate BridgeNavy.der signed by Navy
certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1128112941 -7 Bridge@Navy  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #10263: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy  - PASSED
chains.sh: Importing certificate BridgeNavy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der
chains.sh: #10264: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database  - PASSED
chains.sh: Generating PKCS7 package from BridgeDB database
cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7
chains.sh: #10265: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #10266: BridgeWithHalfAIA: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10267: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Bridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1128112942   --extAIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8556/buildnss02-10869-Bridge-1128112840.p7
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #10268: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate CA1Bridge.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der
chains.sh: #10269: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #10270: BridgeWithHalfAIA: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o EE1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #10271: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1128112943   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #10272: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE1CA1.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der
chains.sh: #10273: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #10274: BridgeWithHalfAIA: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10275: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2Bridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1128112944   --extAIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8556/buildnss02-10869-BridgeNavy-1128112841.der
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #10276: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate CA2Bridge.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der
chains.sh: #10277: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database  - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #10278: BridgeWithHalfAIA: Creating DB EE2DB  - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US"  -R  -d EE2DB -f EE2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o EE2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #10279: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der  - PASSED
chains.sh: Creating certficate EE2CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1128112945   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #10280: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate EE2CA2.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der
chains.sh: #10281: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database  - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB     -t Army.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]:
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Bridge Bridge,O=Bridge,C=US
Returned value is 1, expected result is fail
chains.sh: #10282: BridgeWithHalfAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB     -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB -f    -t Army.der
vfychain -d EE1DB -pp -vv  -f    EE1CA1.der CA1Bridge.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]:
  ERROR -5961: TCP connection reset by peer
Returned value is 1, expected result is pass
chains.sh: #10283: BridgeWithHalfAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB -f    -t Army.der - FAILED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB -f    -t Navy.der
vfychain -d EE1DB -pp -vv  -f    EE1CA1.der CA1Bridge.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]:
  ERROR -5961: TCP connection reset by peer
Returned value is 1, expected result is pass
chains.sh: #10284: BridgeWithHalfAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB -f    -t Navy.der - FAILED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeArmy.der with flags  -d EE1DB -f    -t Navy.der
vfychain -d EE1DB -pp -vv  -f    EE1CA1.der CA1Bridge.der BridgeArmy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. bridge@army [Certificate Authority]:
Email Address(es): bridge@army
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Army ROOT CA,O=Army,C=US
  ERROR -5961: TCP connection reset by peer
Returned value is 1, expected result is pass
chains.sh: #10285: BridgeWithHalfAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeArmy.der with flags  -d EE1DB -f    -t Navy.der - FAILED
chains.sh: Verifying certificate(s)  EE2CA2.der BridgeArmy.der with flags  -d EE1DB -f    -t Army.der
vfychain -d EE1DB -pp -vv  -f    EE2CA2.der BridgeArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=EE2 EE,O=EE2,C=US :
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=CA2 Intermediate,O=CA2,C=US
Returned value is 1, expected result is fail
chains.sh: #10286: BridgeWithHalfAIA: Verifying certificate(s)  EE2CA2.der BridgeArmy.der with flags  -d EE1DB -f    -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeArmy.der with flags  -d EE1DB -f    -t Army.der
vfychain -d EE1DB -pp -vv  -f    EE2CA2.der CA2Bridge.der BridgeArmy.der  -t Army.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128112938 (0x433da32a)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Wed Nov 28 16:32:43 2012
            Not After : Tue Nov 28 16:32:43 2062
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e0:bc:98:d9:d5:fe:cc:b9:6c:57:82:78:21:b1:ef:21:
                    28:87:70:3f:ef:b6:b7:10:e9:e4:68:d7:07:09:8c:8b:
                    81:f3:c4:35:c2:ab:7d:d4:ed:92:0f:d4:16:db:2d:90:
                    f7:b9:5d:21:b6:b8:b5:a5:07:97:42:2d:c3:ea:88:2b:
                    98:b4:be:0a:78:f4:10:ab:36:e0:34:48:b5:2d:0c:4c:
                    8f:ee:2a:37:a7:c0:9d:0e:03:d6:37:e3:7f:94:32:0a:
                    3f:ad:7a:07:40:9d:3f:04:8f:ab:1f:a3:01:d7:26:81:
                    a6:db:18:df:8d:2d:11:3c:e0:b9:95:ae:53:0b:a1:f7
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        4f:a0:1c:b4:2f:6f:1c:11:83:5c:60:b3:5a:23:62:30:
        c4:38:1b:04:66:db:56:e0:aa:27:77:08:8f:c9:32:5e:
        b9:5b:e0:60:95:a0:d2:f8:6f:29:d2:88:aa:aa:e0:30:
        04:b0:7d:a5:5a:a7:85:c3:d2:45:28:8e:85:77:04:32:
        e6:b0:cf:58:71:e2:0a:c5:e7:1c:29:19:bd:ec:9f:ee:
        1b:9c:72:ce:08:02:5b:b7:98:62:75:fe:cf:36:53:98:
        2a:df:af:e8:0c:20:4f:ad:83:0e:fa:00:6e:38:bf:1f:
        81:87:1f:dd:f9:51:04:8a:78:57:eb:e5:c7:c2:e9:44
    Fingerprint (MD5):
        B7:46:9C:AA:9F:DB:C8:43:CA:80:9A:21:9A:C7:A4:14
    Fingerprint (SHA1):
        08:4B:C4:1A:D9:5C:35:EB:31:6A:2F:73:A3:86:E3:AD:57:07:AA:1B


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #10287: BridgeWithHalfAIA: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeArmy.der with flags  -d EE1DB -f    -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der with flags  -d EE1DB -f    -t Navy.der
vfychain -d EE1DB -pp -vv  -f    EE2CA2.der CA2Bridge.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]:
  ERROR -5961: TCP connection reset by peer
Returned value is 1, expected result is pass
chains.sh: #10288: BridgeWithHalfAIA: Verifying certificate(s)  EE2CA2.der CA2Bridge.der with flags  -d EE1DB -f    -t Navy.der - FAILED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeArmy.der with flags  -d EE1DB -f    -t Navy.der
vfychain -d EE1DB -pp -vv  -f    EE2CA2.der CA2Bridge.der BridgeArmy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. bridge@army [Certificate Authority]:
Email Address(es): bridge@army
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Army ROOT CA,O=Army,C=US
  ERROR -5961: TCP connection reset by peer
Returned value is 1, expected result is pass
chains.sh: #10289: BridgeWithHalfAIA: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeArmy.der with flags  -d EE1DB -f    -t Navy.der - FAILED
chains.sh: Creating DB ArmyDB
certutil -N -d ArmyDB -f ArmyDB/dbpasswd
chains.sh: #10290: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB  - PASSED
chains.sh: Creating Root CA Army
certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army  -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -m 1128112946 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #10291: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army  - PASSED
chains.sh: Exporting Root CA Army.der
certutil -L -d ArmyDB -r -n Army -o Army.der
chains.sh: #10292: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der  - PASSED
chains.sh: Creating DB NavyDB
certutil -N -d NavyDB -f NavyDB/dbpasswd
chains.sh: #10293: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB  - PASSED
chains.sh: Creating Root CA Navy
certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy  -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -m 1128112947 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #10294: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy  - PASSED
chains.sh: Exporting Root CA Navy.der
certutil -L -d NavyDB -r -n Navy -o Navy.der
chains.sh: #10295: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der  - PASSED
chains.sh: Creating DB CAArmyDB
certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd
chains.sh: #10296: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB  - PASSED
chains.sh: Creating Intermediate certifiate request CAArmyReq.der
certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US"  -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CAArmyReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10297: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der  - PASSED
chains.sh: Creating certficate CAArmyArmy.der signed by Army
certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 1128112948   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.1.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10298: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army  - PASSED
chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database
certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der
chains.sh: #10299: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database  - PASSED
chains.sh: Creating DB CANavyDB
certutil -N -d CANavyDB -f CANavyDB/dbpasswd
chains.sh: #10300: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB  - PASSED
chains.sh: Creating Intermediate certifiate request CANavyReq.der
certutil -s "CN=CANavy Intermediate, O=CANavy, C=US"  -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CANavyReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10301: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der  - PASSED
chains.sh: Creating certficate CANavyNavy.der signed by Navy
certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 1128112949   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.2.0
1

n
y
OID.2.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10302: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy  - PASSED
chains.sh: Importing certificate CANavyNavy.der to CANavyDB database
certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der
chains.sh: #10303: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database  - PASSED
chains.sh: Creating DB BridgeDB
certutil -N -d BridgeDB -f BridgeDB/dbpasswd
chains.sh: #10304: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB  - PASSED
chains.sh: Creating Bridge certifiate request BridgeReq.der
certutil -s "CN=Bridge Bridge, O=Bridge, C=US"  -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o BridgeReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10305: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der  - PASSED
chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy
certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 1128112950 -7 Bridge@CAArmy  --extCP --extPM < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.1.1
1

n
n
n
OID.1.1
OID.2.1
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N]
Is this a critical extension [y/N]?
chains.sh: #10306: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy  - PASSED
chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der
chains.sh: #10307: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database  - PASSED
chains.sh: Creating certficate BridgeCANavy.der signed by CANavy
certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 1128112951 -7 Bridge@CANavy  --extCP --extPM < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.2.0
1

n
y
OID.2.1
1

n
n
n
OID.2.1
OID.1.1
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N]
Is this a critical extension [y/N]?
chains.sh: #10308: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy  - PASSED
chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der
chains.sh: #10309: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database  - PASSED
chains.sh: Generating PKCS7 package from BridgeDB database
cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7
chains.sh: #10310: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #10311: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10312: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Bridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1128112952   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.1.1
1

n
y
OID.2.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10313: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate CA1Bridge.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der
chains.sh: #10314: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #10315: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10316: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2Bridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1128112953   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10317: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate CA2Bridge.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der
chains.sh: #10318: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #10319: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o EE1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #10320: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1128112954   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.2.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10321: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE1CA1.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der
chains.sh: #10322: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database  - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #10323: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB  - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US"  -R  -d EE2DB -f EE2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o EE2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #10324: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der  - PASSED
chains.sh: Creating certficate EE2CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1128112955   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10325: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate EE2CA2.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der
chains.sh: #10326: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database  - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.1.0  -t Army.der
vfychain  -pp -vv     -o OID.1.0  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10327: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.1.0  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.1.1  -t Army.der
vfychain  -pp -vv     -o OID.1.1  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128112946 (0x433da332)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Wed Nov 28 16:33:14 2012
            Not After : Tue Nov 28 16:33:14 2062
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b4:fb:98:e3:15:37:e7:d2:29:98:1c:62:f1:bc:81:fc:
                    e0:1d:1a:61:7d:ed:5a:42:72:33:b4:9b:e5:57:c4:cf:
                    9b:a9:0e:3f:80:42:d5:c0:fe:21:5d:59:89:ba:c3:a1:
                    62:59:c1:9f:42:80:58:7a:27:bb:b6:6c:23:b1:61:7c:
                    7e:c3:b1:3b:8a:f7:24:44:ce:b5:78:c5:63:b6:7e:4c:
                    c3:df:35:8f:e8:c5:93:89:bd:08:82:88:b8:06:e8:f5:
                    6e:14:dc:e6:34:91:62:b4:71:dd:26:0e:dc:bb:21:1a:
                    d9:fa:03:99:46:97:09:6a:1e:0b:32:c3:14:99:5d:13
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        68:1a:78:e9:99:62:62:d3:8e:ae:10:6f:f2:fe:6c:5a:
        b3:72:0c:62:7b:93:f6:67:78:00:a0:21:78:b4:36:af:
        3b:91:e4:0c:d5:a3:bb:af:5b:6a:fb:7b:6d:99:81:b0:
        83:ad:da:83:8c:70:89:15:bb:c2:8f:6f:2b:0f:93:7c:
        da:1b:cc:e0:47:2d:4c:a2:01:6e:40:12:0f:b4:9f:3f:
        3f:ad:38:fe:44:e8:08:f8:2e:bc:a0:dd:49:6d:6e:76:
        88:5e:8d:f5:70:9a:c7:57:3e:a5:56:3b:97:2c:c7:fd:
        b2:fa:0c:69:b7:62:e6:db:0f:5f:33:b8:ce:c0:d0:11
    Fingerprint (MD5):
        D7:23:03:AC:2C:AB:3A:86:AE:68:5E:D7:3A:AC:D5:8A
    Fingerprint (SHA1):
        18:D6:A1:80:76:01:2E:72:17:0D:2F:6F:2C:A8:2B:8B:51:EE:39:2F


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US"
Returned value is 0, expected result is pass
chains.sh: #10328: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.1.1  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.2.0  -t Army.der
vfychain  -pp -vv     -o OID.2.0  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10329: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.2.0  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.2.1  -t Army.der
vfychain  -pp -vv     -o OID.2.1  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10330: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.2.1  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.1.0  -t Navy.der
vfychain  -pp -vv     -o OID.1.0  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10331: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.1.0  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.1.1  -t Navy.der
vfychain  -pp -vv     -o OID.1.1  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10332: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.1.1  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.2.0  -t Navy.der
vfychain  -pp -vv     -o OID.2.0  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10333: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.2.0  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.2.1  -t Navy.der
vfychain  -pp -vv     -o OID.2.1  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10334: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.2.1  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.1.0  -t Navy.der
vfychain  -pp -vv     -o OID.1.0  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10335: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.1.0  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.1.1  -t Navy.der
vfychain  -pp -vv     -o OID.1.1  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10336: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.1.1  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.2.0  -t Navy.der
vfychain  -pp -vv     -o OID.2.0  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128112947 (0x433da333)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 16:33:17 2012
            Not After : Tue Nov 28 16:33:17 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c3:9f:fc:3a:41:7c:f8:b5:73:94:49:e2:a3:87:23:b0:
                    24:c8:42:db:48:ad:9a:d9:07:79:1e:1c:cb:5f:03:f9:
                    21:43:5f:df:ee:e9:34:74:16:95:3f:de:8a:86:74:05:
                    16:2c:2a:34:bb:4c:fe:ce:ba:b4:10:e7:ee:0f:9a:5f:
                    fe:fe:86:a0:af:57:ce:ed:5e:09:02:cd:d7:63:02:f6:
                    08:83:be:18:2f:68:c0:8d:bd:7b:93:d9:a7:71:ab:5c:
                    a1:4d:4a:a7:2d:ff:a6:95:84:e9:37:15:2e:4d:b1:92:
                    fc:1d:f1:b6:8b:75:d9:32:4c:a3:0b:df:ff:50:87:1f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        46:79:21:78:3e:61:d5:d1:3a:bd:48:e0:b5:76:88:58:
        c4:f1:3b:4f:ee:9f:2e:59:a9:00:11:7a:cf:ef:56:aa:
        c8:34:af:e2:15:40:5f:8b:60:f4:52:0c:5d:a7:b5:2f:
        a9:bd:0e:0d:b5:0b:c5:8d:c8:e8:85:31:c3:ec:13:bd:
        93:a1:b2:5f:d6:30:88:9f:71:da:37:51:e7:e9:ef:d7:
        8a:bf:62:19:f1:3e:3b:3f:79:5b:71:f1:3c:8b:b4:ef:
        4f:79:b2:3f:62:0e:31:c8:15:0f:bd:20:1f:9e:18:11:
        8a:9a:cc:d6:1d:34:71:e7:d8:af:61:c2:71:90:bc:cb
    Fingerprint (MD5):
        C5:AA:F2:BB:86:B0:DA:01:ED:AC:3B:50:3A:AF:33:7E
    Fingerprint (SHA1):
        5A:C5:56:86:3E:E7:3F:BA:89:DF:A4:9E:68:66:95:D3:FC:F3:5C:69


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US"
Returned value is 0, expected result is pass
chains.sh: #10337: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.2.0  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.2.1  -t Navy.der
vfychain  -pp -vv     -o OID.2.1  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10338: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.2.1  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.1.0  -t Army.der
vfychain  -pp -vv     -o OID.1.0  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10339: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.1.0  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.1.1  -t Army.der
vfychain  -pp -vv     -o OID.1.1  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10340: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.1.1  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.2.0  -t Army.der
vfychain  -pp -vv     -o OID.2.0  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10341: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.2.0  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.2.1  -t Army.der
vfychain  -pp -vv     -o OID.2.1  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10342: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.2.1  -t Army.der - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #10343: RealCerts: Creating DB AllDB  - PASSED
chains.sh: Importing certificate TestCA.ca.cert to AllDB database
certutil -A -n TestCA.ca  -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/TestCA.ca.cert
chains.sh: #10344: RealCerts: Importing certificate TestCA.ca.cert to AllDB database  - PASSED
chains.sh: Importing certificate TestUser50.cert to AllDB database
certutil -A -n TestUser50  -t "" -d AllDB -f AllDB/dbpasswd -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/TestUser50.cert
chains.sh: #10345: RealCerts: Importing certificate TestUser50.cert to AllDB database  - PASSED
chains.sh: Importing certificate TestUser51.cert to AllDB database
certutil -A -n TestUser51  -t "" -d AllDB -f AllDB/dbpasswd -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/TestUser51.cert
chains.sh: #10346: RealCerts: Importing certificate TestUser51.cert to AllDB database  - PASSED
chains.sh: Importing certificate PayPalRootCA.cert to AllDB database
certutil -A -n PayPalRootCA  -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/PayPalRootCA.cert
chains.sh: #10347: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database  - PASSED
chains.sh: Importing certificate PayPalICA.cert to AllDB database
certutil -A -n PayPalICA  -t "" -d AllDB -f AllDB/dbpasswd -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/PayPalICA.cert
chains.sh: #10348: RealCerts: Importing certificate PayPalICA.cert to AllDB database  - PASSED
chains.sh: Importing certificate PayPalEE.cert to AllDB database
certutil -A -n PayPalEE  -t "" -d AllDB -f AllDB/dbpasswd -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/PayPalEE.cert
chains.sh: #10349: RealCerts: Importing certificate PayPalEE.cert to AllDB database  - PASSED
chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database
certutil -A -n BrAirWaysBadSig  -t "" -d AllDB -f AllDB/dbpasswd -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/BrAirWaysBadSig.cert
chains.sh: #10350: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  TestUser50.cert with flags  -d AllDB    
vfychain -d AllDB -pp -vv      /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/TestUser50.cert 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Mar 19 21:04:25 2008
            Not After : Tue Mar 19 21:04:25 2058
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e6:a7:fb:18:60:23:4e:1f:bf:76:e3:9f:4d:ee:69:61:
                    fa:17:51:d8:fa:ed:9b:5a:8d:77:eb:bd:cf:3a:33:82:
                    9b:ef:08:fb:8f:7e:b9:53:65:b6:9f:e4:a1:e6:d9:ae:
                    c5:66:16:6f:eb:ae:59:e6:e2:ab:af:53:37:67:e2:03:
                    a6:ec:29:e4:2d:65:3f:51:c8:29:44:c0:f5:d8:a5:c0:
                    a3:e8:7c:f5:78:88:1e:39:1b:f9:af:85:c6:45:dc:3b:
                    2c:df:27:4d:c3:36:72:cf:d8:b2:61:58:8f:43:bc:d9:
                    aa:9a:55:96:99:d1:c2:56:42:4a:f8:b1:a3:25:b4:fd
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        b1:93:e9:b7:f6:40:fc:3d:20:5d:b6:e7:bd:a6:5d:0e:
        0c:cf:09:ac:09:70:cc:e1:12:e7:c8:f4:3d:53:8f:18:
        57:b9:c7:5c:60:66:fa:83:e1:82:78:e1:d9:21:66:dc:
        58:e1:03:b4:c3:75:6f:a4:3f:25:73:02:b5:e8:e2:38:
        5c:b1:61:eb:dc:86:15:3e:3c:c7:f6:db:94:b8:08:62:
        57:44:92:fe:5c:15:fb:67:7a:d4:83:22:44:ef:4f:55:
        0b:5b:b9:ec:0b:f3:da:c5:03:f2:39:e9:5b:dc:b9:6a:
        f5:01:9b:02:5f:d5:6f:0d:4d:2b:7a:0d:38:eb:84:d7
    Fingerprint (MD5):
        35:D0:B2:A4:9D:E6:0A:4C:D6:04:28:C9:B5:5F:18:27
    Fingerprint (SHA1):
        52:7C:99:B3:6C:71:6D:F8:22:66:4E:60:D0:08:90:A7:90:94:FB:AC

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=TestUser50,E=TestUser50@bogus.com,O=BOGUS NSS,L=Mo
    untain View,ST=California,C=US"
Returned value is 0, expected result is pass
chains.sh: #10351: RealCerts: Verifying certificate(s)  TestUser50.cert with flags  -d AllDB     - PASSED
chains.sh: Verifying certificate(s)  TestUser51.cert with flags  -d AllDB    
vfychain -d AllDB -pp -vv      /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/TestUser51.cert 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Mar 19 21:04:25 2008
            Not After : Tue Mar 19 21:04:25 2058
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e6:a7:fb:18:60:23:4e:1f:bf:76:e3:9f:4d:ee:69:61:
                    fa:17:51:d8:fa:ed:9b:5a:8d:77:eb:bd:cf:3a:33:82:
                    9b:ef:08:fb:8f:7e:b9:53:65:b6:9f:e4:a1:e6:d9:ae:
                    c5:66:16:6f:eb:ae:59:e6:e2:ab:af:53:37:67:e2:03:
                    a6:ec:29:e4:2d:65:3f:51:c8:29:44:c0:f5:d8:a5:c0:
                    a3:e8:7c:f5:78:88:1e:39:1b:f9:af:85:c6:45:dc:3b:
                    2c:df:27:4d:c3:36:72:cf:d8:b2:61:58:8f:43:bc:d9:
                    aa:9a:55:96:99:d1:c2:56:42:4a:f8:b1:a3:25:b4:fd
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        b1:93:e9:b7:f6:40:fc:3d:20:5d:b6:e7:bd:a6:5d:0e:
        0c:cf:09:ac:09:70:cc:e1:12:e7:c8:f4:3d:53:8f:18:
        57:b9:c7:5c:60:66:fa:83:e1:82:78:e1:d9:21:66:dc:
        58:e1:03:b4:c3:75:6f:a4:3f:25:73:02:b5:e8:e2:38:
        5c:b1:61:eb:dc:86:15:3e:3c:c7:f6:db:94:b8:08:62:
        57:44:92:fe:5c:15:fb:67:7a:d4:83:22:44:ef:4f:55:
        0b:5b:b9:ec:0b:f3:da:c5:03:f2:39:e9:5b:dc:b9:6a:
        f5:01:9b:02:5f:d5:6f:0d:4d:2b:7a:0d:38:eb:84:d7
    Fingerprint (MD5):
        35:D0:B2:A4:9D:E6:0A:4C:D6:04:28:C9:B5:5F:18:27
    Fingerprint (SHA1):
        52:7C:99:B3:6C:71:6D:F8:22:66:4E:60:D0:08:90:A7:90:94:FB:AC

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=TestUser51,E=TestUser51@bogus.com,O=BOGUS NSS,L=Mo
    untain View,ST=California,C=US"
Returned value is 0, expected result is pass
chains.sh: #10352: RealCerts: Verifying certificate(s)  TestUser51.cert with flags  -d AllDB     - PASSED
chains.sh: Verifying certificate(s)  PayPalEE.cert with flags  -d AllDB    -o OID.2.16.840.1.113733.1.7.23.6 
vfychain -d AllDB -pp -vv     -o OID.2.16.840.1.113733.1.7.23.6  /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/PayPalEE.cert 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            58:f3:9e:5c:01:2b:19:47:21:a9:8e:e4:ee:e0:f8:bf
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "OU=Class 3 Public Primary Certification Authority,O="VeriSig
            n, Inc.",C=US"
        Validity:
            Not Before: Wed Nov 08 00:00:00 2006
            Not After : Sun Nov 07 23:59:59 2021
        Subject: "CN=VeriSign Class 3 Public Primary Certification Authority 
            - G5,OU="(c) 2006 VeriSign, Inc. - For authorized use only",OU=Ve
            riSign Trust Network,O="VeriSign, Inc.",C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    af:24:08:08:29:7a:35:9e:60:0c:aa:e7:4b:3b:4e:dc:
                    7c:bc:3c:45:1c:bb:2b:e0:fe:29:02:f9:57:08:a3:64:
                    85:15:27:f5:f1:ad:c8:31:89:5d:22:e8:2a:aa:a6:42:
                    b3:8f:f8:b9:55:b7:b1:b7:4b:b3:fe:8f:7e:07:57:ec:
                    ef:43:db:66:62:15:61:cf:60:0d:a4:d8:de:f8:e0:c3:
                    62:08:3d:54:13:eb:49:ca:59:54:85:26:e5:2b:8f:1b:
                    9f:eb:f5:a1:91:c2:33:49:d8:43:63:6a:52:4b:d2:8f:
                    e8:70:51:4d:d1:89:69:7b:c7:70:f6:b3:dc:12:74:db:
                    7b:5d:4b:56:d3:96:bf:15:77:a1:b0:f4:a2:25:f2:af:
                    1c:92:67:18:e5:f4:06:04:ef:90:b9:e4:00:e4:dd:3a:
                    b5:19:ff:02:ba:f4:3c:ee:e0:8b:eb:37:8b:ec:f4:d7:
                    ac:f2:f6:f0:3d:af:dd:75:91:33:19:1d:1c:40:cb:74:
                    24:19:21:93:d9:14:fe:ac:2a:52:c7:8f:d5:04:49:e4:
                    8d:63:47:88:3c:69:83:cb:fe:47:bd:2b:7e:4f:c5:95:
                    ae:0e:9d:d4:d1:43:c0:67:73:e3:14:08:7e:e5:3f:9f:
                    73:b8:33:0a:cf:5d:3f:34:87:96:8a:ee:53:e8:25:15
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: CRL Distribution Points
            Distribution point:
                URI: "http://crl.verisign.com/pca3.crl"

            Name: Certificate Key Usage
            Critical: True
            Usages: Certificate Signing
                    CRL Signing

            Name: OID.1.3.6.1.5.5.7.1.12
            Data: Sequence {
                [1]: {
                    [0]: {
                        Sequence {
                            Sequence {
                                Sequence {
                                    "image/gif"
                                    Sequence {
                                        Sequence {
                                            Sequence {
                                                SHA-1
                                            }
                                            8f:e5:d3:1a:86:ac:8d:8e:6b:c3:cf:
                                            80:6a:d4:48:18:2c:7b:19:2e
                                        }
                                    }
                                    Sequence {
                                        "http://logo.verisign.com/vslogo.gif"
                                    }
                                }
                            }
                        }
                    }
                }
            }

            Name: Certificate Policies
            Data: 
                Policy Name: Certificate Policies AnyPolicy
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                    Policy Qualifier Data: "https://www.verisign.com/cps"

            Name: Certificate Subject Key ID
            Data:
                7f:d3:65:a7:c2:dd:ec:bb:f0:30:09:f3:43:39:fa:02:
                af:33:31:33

            Name: Certificate Authority Key Identifier
            Issuer: 
                Directory Name: "OU=Class 3 Public Primary Certification Auth
                    ority,O="VeriSign, Inc.",C=US"
            Serial Number:
                70:ba:e4:1d:10:d9:29:34:b6:38:ca:7b:03:cc:ba:bf

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:15:49:5e:6b:26:ce:ee:98:e7:4d:a5:92:3f:75:6a:
        f0:33:0b:fa:09:dc:28:92:ab:8d:6a:31:41:d9:47:31:
        47:46:09:a1:39:05:3e:66:65:19:8b:32:bf:61:2c:1c:
        d5:6a:03:6f:44:dc:3b:af:ef:1b:93:58:d6:bd:ce:d0:
        ed:b6:89:77:51:15:59:32:28:c5:7a:89:8c:da:3e:6d:
        5c:75:ac:86:d4:c7:9e:fd:38:3e:96:73:40:87:34:6a:
        84:4e:31:a8:d2:a2:b9:3c:4e:06:dd:cb:b2:7c:ae:e1:
        d5:9f:1e:74:e5:24:f0:cf:e4:9b:ec:25:ea:cd:ec:f6
    Fingerprint (MD5):
        C8:DE:26:6F:0A:C4:1C:6D:46:9C:CC:AD:0A:C4:D5:1C
    Fingerprint (SHA1):
        87:50:7F:E5:19:BD:E7:A1:19:AE:A3:2F:77:9D:76:30:5D:7A:69:13

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=www.paypal.com,OU=PayPal Production,O="PayPal, Inc
    .",STREET=2211 N 1st St,L=San Jose,ST=California,postalCode=95131-2021,C=
    US,serialNumber=3014267,businessCategory=Private Organization,incorporati
    onState=Delaware,incorporationCountry=US"
Certificate 2 Subject: "CN=VeriSign Class 3 Extended Validation SSL CA,OU=Ter
    ms of use at https://www.verisign.com/rpa (c)06,OU=VeriSign Trust Network
    ,O="VeriSign, Inc.",C=US"
Returned value is 0, expected result is pass
chains.sh: #10353: RealCerts: Verifying certificate(s)  PayPalEE.cert with flags  -d AllDB    -o OID.2.16.840.1.113733.1.7.23.6  - PASSED
chains.sh: Verifying certificate(s)  BrAirWaysBadSig.cert with flags  -d AllDB    
vfychain -d AllDB -pp -vv      /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/BrAirWaysBadSig.cert 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. BrAirWaysBadSig :
  ERROR -8181: Peer's Certificate has expired.
Returned value is 1, expected result is fail
chains.sh: #10354: RealCerts: Verifying certificate(s)  BrAirWaysBadSig.cert with flags  -d AllDB     - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #10355: DSA: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -m 1128112956 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #10356: DSA: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #10357: DSA: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #10358: DSA: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10359: DSA: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1128112957   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #10360: DSA: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
chains.sh: #10361: DSA: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #10362: DSA: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R  -d EE1DB -f EE1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o EE1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #10363: DSA: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1128112958   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #10364: DSA: Creating certficate EE1CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE1CA1.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der
chains.sh: #10365: DSA: Importing certificate EE1CA1.der to EE1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #10366: DSA: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10367: DSA: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 1128112959   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #10368: DSA: Creating certficate CA2Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA2Root.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der
chains.sh: #10369: DSA: Importing certificate CA2Root.der to CA2DB database  - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #10370: DSA: Creating DB EE2DB  - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R  -d EE2DB -f EE2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o EE2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #10371: DSA: Creating EE certifiate request EE2Req.der  - PASSED
chains.sh: Creating certficate EE2CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1128112960   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #10372: DSA: Creating certficate EE2CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate EE2CA2.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der
chains.sh: #10373: DSA: Importing certificate EE2CA2.der to EE2DB database  - PASSED
chains.sh: Creating DB CA3DB
certutil -N -d CA3DB -f CA3DB/dbpasswd
chains.sh: #10374: DSA: Creating DB CA3DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA3Req.der
certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA3Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10375: DSA: Creating Intermediate certifiate request CA3Req.der  - PASSED
chains.sh: Creating certficate CA3Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 1128112961   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #10376: DSA: Creating certficate CA3Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA3Root.der to CA3DB database
certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der
chains.sh: #10377: DSA: Importing certificate CA3Root.der to CA3DB database  - PASSED
chains.sh: Creating DB EE3DB
certutil -N -d EE3DB -f EE3DB/dbpasswd
chains.sh: #10378: DSA: Creating DB EE3DB  - PASSED
chains.sh: Creating EE certifiate request EE3Req.der
certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R  -d EE3DB -f EE3DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o EE3Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #10379: DSA: Creating EE certifiate request EE3Req.der  - PASSED
chains.sh: Creating certficate EE3CA3.der signed by CA3
certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 1128112962   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #10380: DSA: Creating certficate EE3CA3.der signed by CA3  - PASSED
chains.sh: Importing certificate EE3CA3.der to EE3DB database
certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der
chains.sh: #10381: DSA: Importing certificate EE3CA3.der to EE3DB database  - PASSED
chains.sh: Creating DB CA4DB
certutil -N -d CA4DB -f CA4DB/dbpasswd
chains.sh: #10382: DSA: Creating DB CA4DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA4Req.der
certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA4Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10383: DSA: Creating Intermediate certifiate request CA4Req.der  - PASSED
chains.sh: Creating certficate CA4Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 1128112963   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #10384: DSA: Creating certficate CA4Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA4Root.der to CA4DB database
certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der
chains.sh: #10385: DSA: Importing certificate CA4Root.der to CA4DB database  - PASSED
chains.sh: Creating DB EE4DB
certutil -N -d EE4DB -f EE4DB/dbpasswd
chains.sh: #10386: DSA: Creating DB EE4DB  - PASSED
chains.sh: Creating EE certifiate request EE4Req.der
certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R  -d EE4DB -f EE4DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o EE4Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #10387: DSA: Creating EE certifiate request EE4Req.der  - PASSED
chains.sh: Creating certficate EE4CA4.der signed by CA4
certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 1128112964   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #10388: DSA: Creating certficate EE4CA4.der signed by CA4  - PASSED
chains.sh: Importing certificate EE4CA4.der to EE4DB database
certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der
chains.sh: #10389: DSA: Importing certificate EE4CA4.der to EE4DB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #10390: DSA: Creating DB AllDB  - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Root.der with flags  -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv      EE1CA1.der CA1Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128112956 (0x433da33c)
        Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:33:47 2012
            Not After : Tue Nov 28 16:33:47 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: ANSI X9.57 DSA Signature
                Args:
                    30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44:
                    db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb:
                    c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f:
                    41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69:
                    fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8:
                    89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3:
                    c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52:
                    29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db:
                    ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44:
                    29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02:
                    81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:
                    00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:
                    f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:
                    31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:
                    da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:
                    54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:
                    83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:
                    f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:
                    a5:10
            DSA Public Key:
                Prime:
                    98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c:
                    b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04:
                    82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f:
                    af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a:
                    4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad:
                    af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65:
                    c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe:
                    18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d
                Subprime:
                    b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1:
                    76:27:03:81
                Base:
                    04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04:
                    4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c:
                    f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50:
                    82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e:
                    57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b:
                    5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87:
                    60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb:
                    35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10
                PublicValue:
                    33:2b:56:1f:7a:27:8b:bd:80:7d:a2:93:c3:d0:fd:cc:
                    3d:bb:35:75:29:8a:9a:d1:79:1b:1e:d1:33:8b:96:41:
                    c0:1a:b8:da:bb:f2:e8:98:7a:7b:c4:0b:db:18:85:51:
                    f2:26:68:5e:41:50:99:14:8b:8d:28:25:c0:55:23:5e:
                    cd:82:d0:10:67:ab:c6:9a:60:c4:de:7f:54:f5:b0:55:
                    09:de:a2:e8:fe:26:20:1d:4c:ba:31:db:92:a8:1f:d3:
                    f7:27:57:f1:f7:d0:d9:25:88:ac:d8:86:60:c2:6a:13:
                    d5:f5:37:81:03:4c:5e:e3:44:82:dc:c5:e1:db:51:ff
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
    Signature:
        30:2d:02:15:00:a8:a6:b1:4e:73:b1:82:f8:37:d4:3b:
        cb:fb:e5:d7:14:b2:50:ce:b7:02:14:3d:53:89:68:7d:
        d9:a5:54:44:7d:d7:ab:89:64:67:de:91:c3:2d:50
    Fingerprint (MD5):
        1D:67:10:C1:30:CE:14:2E:61:2D:FE:72:B3:1D:49:C7
    Fingerprint (SHA1):
        97:C9:D8:8D:74:99:02:8C:1F:4E:85:FA:0F:15:65:B8:B2:18:73:44


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #10391: DSA: Verifying certificate(s)  EE1CA1.der CA1Root.der with flags  -d AllDB     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Root.der with flags  -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv      EE2CA2.der CA2Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128112956 (0x433da33c)
        Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:33:47 2012
            Not After : Tue Nov 28 16:33:47 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: ANSI X9.57 DSA Signature
                Args:
                    30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44:
                    db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb:
                    c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f:
                    41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69:
                    fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8:
                    89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3:
                    c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52:
                    29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db:
                    ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44:
                    29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02:
                    81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:
                    00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:
                    f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:
                    31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:
                    da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:
                    54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:
                    83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:
                    f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:
                    a5:10
            DSA Public Key:
                Prime:
                    98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c:
                    b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04:
                    82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f:
                    af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a:
                    4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad:
                    af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65:
                    c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe:
                    18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d
                Subprime:
                    b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1:
                    76:27:03:81
                Base:
                    04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04:
                    4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c:
                    f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50:
                    82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e:
                    57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b:
                    5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87:
                    60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb:
                    35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10
                PublicValue:
                    33:2b:56:1f:7a:27:8b:bd:80:7d:a2:93:c3:d0:fd:cc:
                    3d:bb:35:75:29:8a:9a:d1:79:1b:1e:d1:33:8b:96:41:
                    c0:1a:b8:da:bb:f2:e8:98:7a:7b:c4:0b:db:18:85:51:
                    f2:26:68:5e:41:50:99:14:8b:8d:28:25:c0:55:23:5e:
                    cd:82:d0:10:67:ab:c6:9a:60:c4:de:7f:54:f5:b0:55:
                    09:de:a2:e8:fe:26:20:1d:4c:ba:31:db:92:a8:1f:d3:
                    f7:27:57:f1:f7:d0:d9:25:88:ac:d8:86:60:c2:6a:13:
                    d5:f5:37:81:03:4c:5e:e3:44:82:dc:c5:e1:db:51:ff
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
    Signature:
        30:2d:02:15:00:a8:a6:b1:4e:73:b1:82:f8:37:d4:3b:
        cb:fb:e5:d7:14:b2:50:ce:b7:02:14:3d:53:89:68:7d:
        d9:a5:54:44:7d:d7:ab:89:64:67:de:91:c3:2d:50
    Fingerprint (MD5):
        1D:67:10:C1:30:CE:14:2E:61:2D:FE:72:B3:1D:49:C7
    Fingerprint (SHA1):
        97:C9:D8:8D:74:99:02:8C:1F:4E:85:FA:0F:15:65:B8:B2:18:73:44


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #10392: DSA: Verifying certificate(s)  EE2CA2.der CA2Root.der with flags  -d AllDB     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE3CA3.der CA3Root.der with flags  -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv      EE3CA3.der CA3Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128112956 (0x433da33c)
        Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:33:47 2012
            Not After : Tue Nov 28 16:33:47 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: ANSI X9.57 DSA Signature
                Args:
                    30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44:
                    db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb:
                    c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f:
                    41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69:
                    fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8:
                    89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3:
                    c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52:
                    29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db:
                    ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44:
                    29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02:
                    81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:
                    00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:
                    f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:
                    31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:
                    da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:
                    54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:
                    83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:
                    f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:
                    a5:10
            DSA Public Key:
                Prime:
                    98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c:
                    b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04:
                    82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f:
                    af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a:
                    4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad:
                    af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65:
                    c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe:
                    18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d
                Subprime:
                    b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1:
                    76:27:03:81
                Base:
                    04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04:
                    4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c:
                    f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50:
                    82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e:
                    57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b:
                    5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87:
                    60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb:
                    35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10
                PublicValue:
                    33:2b:56:1f:7a:27:8b:bd:80:7d:a2:93:c3:d0:fd:cc:
                    3d:bb:35:75:29:8a:9a:d1:79:1b:1e:d1:33:8b:96:41:
                    c0:1a:b8:da:bb:f2:e8:98:7a:7b:c4:0b:db:18:85:51:
                    f2:26:68:5e:41:50:99:14:8b:8d:28:25:c0:55:23:5e:
                    cd:82:d0:10:67:ab:c6:9a:60:c4:de:7f:54:f5:b0:55:
                    09:de:a2:e8:fe:26:20:1d:4c:ba:31:db:92:a8:1f:d3:
                    f7:27:57:f1:f7:d0:d9:25:88:ac:d8:86:60:c2:6a:13:
                    d5:f5:37:81:03:4c:5e:e3:44:82:dc:c5:e1:db:51:ff
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
    Signature:
        30:2d:02:15:00:a8:a6:b1:4e:73:b1:82:f8:37:d4:3b:
        cb:fb:e5:d7:14:b2:50:ce:b7:02:14:3d:53:89:68:7d:
        d9:a5:54:44:7d:d7:ab:89:64:67:de:91:c3:2d:50
    Fingerprint (MD5):
        1D:67:10:C1:30:CE:14:2E:61:2D:FE:72:B3:1D:49:C7
    Fingerprint (SHA1):
        97:C9:D8:8D:74:99:02:8C:1F:4E:85:FA:0F:15:65:B8:B2:18:73:44


Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US"
Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US"
Returned value is 0, expected result is pass
chains.sh: #10393: DSA: Verifying certificate(s)  EE3CA3.der CA3Root.der with flags  -d AllDB     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE4CA4.der CA4Root.der with flags  -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv      EE4CA4.der CA4Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1128112956 (0x433da33c)
        Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:33:47 2012
            Not After : Tue Nov 28 16:33:47 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: ANSI X9.57 DSA Signature
                Args:
                    30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44:
                    db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb:
                    c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f:
                    41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69:
                    fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8:
                    89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3:
                    c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52:
                    29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db:
                    ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44:
                    29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02:
                    81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:
                    00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:
                    f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:
                    31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:
                    da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:
                    54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:
                    83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:
                    f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:
                    a5:10
            DSA Public Key:
                Prime:
                    98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c:
                    b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04:
                    82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f:
                    af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a:
                    4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad:
                    af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65:
                    c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe:
                    18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d
                Subprime:
                    b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1:
                    76:27:03:81
                Base:
                    04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04:
                    4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c:
                    f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50:
                    82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e:
                    57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b:
                    5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87:
                    60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb:
                    35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10
                PublicValue:
                    33:2b:56:1f:7a:27:8b:bd:80:7d:a2:93:c3:d0:fd:cc:
                    3d:bb:35:75:29:8a:9a:d1:79:1b:1e:d1:33:8b:96:41:
                    c0:1a:b8:da:bb:f2:e8:98:7a:7b:c4:0b:db:18:85:51:
                    f2:26:68:5e:41:50:99:14:8b:8d:28:25:c0:55:23:5e:
                    cd:82:d0:10:67:ab:c6:9a:60:c4:de:7f:54:f5:b0:55:
                    09:de:a2:e8:fe:26:20:1d:4c:ba:31:db:92:a8:1f:d3:
                    f7:27:57:f1:f7:d0:d9:25:88:ac:d8:86:60:c2:6a:13:
                    d5:f5:37:81:03:4c:5e:e3:44:82:dc:c5:e1:db:51:ff
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
    Signature:
        30:2d:02:15:00:a8:a6:b1:4e:73:b1:82:f8:37:d4:3b:
        cb:fb:e5:d7:14:b2:50:ce:b7:02:14:3d:53:89:68:7d:
        d9:a5:54:44:7d:d7:ab:89:64:67:de:91:c3:2d:50
    Fingerprint (MD5):
        1D:67:10:C1:30:CE:14:2E:61:2D:FE:72:B3:1D:49:C7
    Fingerprint (SHA1):
        97:C9:D8:8D:74:99:02:8C:1F:4E:85:FA:0F:15:65:B8:B2:18:73:44


Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US"
Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US"
Returned value is 0, expected result is pass
chains.sh: #10394: DSA: Verifying certificate(s)  EE4CA4.der CA4Root.der with flags  -d AllDB     -t Root.der - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #10395: Revocation: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -m 10 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #10396: Revocation: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #10397: Revocation: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA0DB
certutil -N -d CA0DB -f CA0DB/dbpasswd
chains.sh: #10398: Revocation: Creating DB CA0DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA0Req.der
certutil -s "CN=CA0 Intermediate, O=CA0, C=US"  -R -2 -d CA0DB -f CA0DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA0Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10399: Revocation: Creating Intermediate certifiate request CA0Req.der  - PASSED
chains.sh: Creating certficate CA0Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #10400: Revocation: Creating certficate CA0Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA0Root.der to CA0DB database
certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der
chains.sh: #10401: Revocation: Importing certificate CA0Root.der to CA0DB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #10402: Revocation: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10403: Revocation: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #10404: Revocation: Creating certficate CA1CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate CA1CA0.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der
chains.sh: #10405: Revocation: Importing certificate CA1CA0.der to CA1DB database  - PASSED
chains.sh: Creating DB EE11DB
certutil -N -d EE11DB -f EE11DB/dbpasswd
chains.sh: #10406: Revocation: Creating DB EE11DB  - PASSED
chains.sh: Creating EE certifiate request EE11Req.der
certutil -s "CN=EE11 EE, O=EE11, C=US"  -R  -d EE11DB -f EE11DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o EE11Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #10407: Revocation: Creating EE certifiate request EE11Req.der  - PASSED
chains.sh: Creating certficate EE11CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #10408: Revocation: Creating certficate EE11CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE11CA1.der to EE11DB database
certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der
chains.sh: #10409: Revocation: Importing certificate EE11CA1.der to EE11DB database  - PASSED
chains.sh: Creating DB EE12DB
certutil -N -d EE12DB -f EE12DB/dbpasswd
chains.sh: #10410: Revocation: Creating DB EE12DB  - PASSED
chains.sh: Creating EE certifiate request EE12Req.der
certutil -s "CN=EE12 EE, O=EE12, C=US"  -R  -d EE12DB -f EE12DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o EE12Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #10411: Revocation: Creating EE certifiate request EE12Req.der  - PASSED
chains.sh: Creating certficate EE12CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #10412: Revocation: Creating certficate EE12CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE12CA1.der to EE12DB database
certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der
chains.sh: #10413: Revocation: Importing certificate EE12CA1.der to EE12DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #10414: Revocation: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10415: Revocation: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #10416: Revocation: Creating certficate CA2CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate CA2CA0.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der
chains.sh: #10417: Revocation: Importing certificate CA2CA0.der to CA2DB database  - PASSED
chains.sh: Creating DB EE21DB
certutil -N -d EE21DB -f EE21DB/dbpasswd
chains.sh: #10418: Revocation: Creating DB EE21DB  - PASSED
chains.sh: Creating EE certifiate request EE21Req.der
certutil -s "CN=EE21 EE, O=EE21, C=US"  -R  -d EE21DB -f EE21DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o EE21Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #10419: Revocation: Creating EE certifiate request EE21Req.der  - PASSED
chains.sh: Creating certficate EE21CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #10420: Revocation: Creating certficate EE21CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate EE21CA2.der to EE21DB database
certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der
chains.sh: #10421: Revocation: Importing certificate EE21CA2.der to EE21DB database  - PASSED
chains.sh: Create CRL for RootDB
crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl
=== Crlutil input data ===
update=20121128163429Z
nextupdate=20131128163429Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=Root ROOT CA,O=Root,C=US"
    This Update: Wed Nov 28 16:34:29 2012
    Next Update: Thu Nov 28 16:34:29 2013
    CRL Extensions:
chains.sh: #10422: Revocation: Create CRL for RootDB  - PASSED
chains.sh: Create CRL for CA0DB
crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl
=== Crlutil input data ===
update=20121128163430Z
nextupdate=20131128163430Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA0 Intermediate,O=CA0,C=US"
    This Update: Wed Nov 28 16:34:30 2012
    Next Update: Thu Nov 28 16:34:30 2013
    CRL Extensions:
chains.sh: #10423: Revocation: Create CRL for CA0DB  - PASSED
chains.sh: Create CRL for CA1DB
crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl
=== Crlutil input data ===
update=20121128163430Z
nextupdate=20131128163430Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
    This Update: Wed Nov 28 16:34:30 2012
    Next Update: Thu Nov 28 16:34:30 2013
    CRL Extensions:
chains.sh: #10424: Revocation: Create CRL for CA1DB  - PASSED
chains.sh: Create CRL for CA2DB
crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl
=== Crlutil input data ===
update=20121128163430Z
nextupdate=20131128163430Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA2 Intermediate,O=CA2,C=US"
    This Update: Wed Nov 28 16:34:30 2012
    Next Update: Thu Nov 28 16:34:30 2013
    CRL Extensions:
chains.sh: #10425: Revocation: Create CRL for CA2DB  - PASSED
chains.sh: Revoking certificate with SN 14 issued by CA1
crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl
=== Crlutil input data ===
update=20121128163431Z
addcert 14 20121128163431Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
    This Update: Wed Nov 28 16:34:31 2012
    Next Update: Thu Nov 28 16:34:30 2013
    Entry 1 (0x1):
        Serial Number: 14 (0xe)
        Revocation Date: Wed Nov 28 16:34:31 2012
    CRL Extensions:
chains.sh: #10426: Revocation: Revoking certificate with SN 14 issued by CA1  - PASSED
chains.sh: Revoking certificate with SN 15 issued by CA0
crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl
=== Crlutil input data ===
update=20121128163432Z
addcert 15 20121128163432Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA0 Intermediate,O=CA0,C=US"
    This Update: Wed Nov 28 16:34:32 2012
    Next Update: Thu Nov 28 16:34:30 2013
    Entry 1 (0x1):
        Serial Number: 15 (0xf)
        Revocation Date: Wed Nov 28 16:34:32 2012
    CRL Extensions:
chains.sh: #10427: Revocation: Revoking certificate with SN 15 issued by CA0  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #10428: Revocation: Creating DB AllDB  - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #10429: Revocation: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing CRL Root.crl to AllDB database
crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl
chains.sh: #10430: Revocation: Importing CRL Root.crl to AllDB database  - PASSED
chains.sh: Importing certificate CA0Root.der to AllDB database
certutil -A -n CA0  -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der
chains.sh: #10431: Revocation: Importing certificate CA0Root.der to AllDB database  - PASSED
chains.sh: Importing CRL CA0.crl to AllDB database
crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl
chains.sh: #10432: Revocation: Importing CRL CA0.crl to AllDB database  - PASSED
chains.sh: Importing certificate CA1CA0.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der
chains.sh: #10433: Revocation: Importing certificate CA1CA0.der to AllDB database  - PASSED
chains.sh: Importing CRL CA1.crl to AllDB database
crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl
chains.sh: #10434: Revocation: Importing CRL CA1.crl to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA0.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der
chains.sh: #10435: Revocation: Importing certificate CA2CA0.der to AllDB database  - PASSED
chains.sh: Importing CRL CA2.crl to AllDB database
crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl
chains.sh: #10436: Revocation: Importing CRL CA2.crl to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  EE11CA1.der with flags  -g leaf -m crl -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv  -g leaf -m crl     EE11CA1.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 10 (0xa)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:34:12 2012
            Not After : Tue Nov 28 16:34:12 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:ab:5f:2c:4a:c1:c0:ef:30:ba:13:b0:2a:d9:be:ac:
                    35:c0:5a:fb:a4:c4:3a:12:e0:4f:6e:dd:7a:7e:fa:53:
                    8b:4e:cd:4b:b6:5b:4b:db:ce:c7:4d:b7:52:3d:3b:db:
                    26:1a:bc:43:9b:f7:b3:d0:0e:12:b4:a9:7d:b3:98:72:
                    06:38:23:0b:50:be:c7:26:65:df:fc:a2:1f:5f:8b:b3:
                    a9:9a:53:f0:06:7f:7e:7f:e6:1f:5c:2e:43:58:4d:21:
                    3c:77:83:4d:9a:a7:55:1b:19:5d:a7:4b:2b:f7:04:42:
                    d5:db:c7:08:9c:db:cb:2e:3d:26:99:36:88:0d:6e:4d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        14:9c:89:45:b9:18:84:5c:e6:56:98:9e:36:12:e7:f3:
        e5:73:6d:0b:a7:7c:70:c1:0f:b3:80:a2:18:5d:6d:7e:
        99:da:3c:20:95:bd:3f:6a:9b:ae:d5:bd:3c:53:2f:33:
        cc:27:da:cc:cc:04:d3:54:1e:79:40:81:48:d8:d9:35:
        75:65:18:e6:32:a5:77:d5:7e:39:81:dc:fa:df:9d:fd:
        08:29:4b:b5:8f:47:c7:18:9d:d4:3a:b5:b2:31:f3:bc:
        69:8b:02:a9:09:7d:c1:5a:15:b3:ae:2d:2a:7d:fd:23:
        62:2f:f5:21:00:13:65:4f:9e:74:d3:c8:52:16:87:7f
    Fingerprint (MD5):
        1F:C3:D2:06:79:21:5D:CF:06:59:B8:CF:8B:9A:30:7C
    Fingerprint (SHA1):
        67:95:70:8E:3F:D4:2E:EF:DB:F3:06:36:DF:3D:89:D0:92:2A:34:91

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US"
Returned value is 0, expected result is pass
chains.sh: #10437: Revocation: Verifying certificate(s)  EE11CA1.der with flags  -g leaf -m crl -d AllDB     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE12CA1.der with flags  -g leaf -m crl -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv  -g leaf -m crl     EE12CA1.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #10438: Revocation: Verifying certificate(s)  EE12CA1.der with flags  -g leaf -m crl -d AllDB     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE11CA1.der with flags  -g chain -m crl -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv  -g chain -m crl     EE11CA1.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 10 (0xa)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 16:34:12 2012
            Not After : Tue Nov 28 16:34:12 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:ab:5f:2c:4a:c1:c0:ef:30:ba:13:b0:2a:d9:be:ac:
                    35:c0:5a:fb:a4:c4:3a:12:e0:4f:6e:dd:7a:7e:fa:53:
                    8b:4e:cd:4b:b6:5b:4b:db:ce:c7:4d:b7:52:3d:3b:db:
                    26:1a:bc:43:9b:f7:b3:d0:0e:12:b4:a9:7d:b3:98:72:
                    06:38:23:0b:50:be:c7:26:65:df:fc:a2:1f:5f:8b:b3:
                    a9:9a:53:f0:06:7f:7e:7f:e6:1f:5c:2e:43:58:4d:21:
                    3c:77:83:4d:9a:a7:55:1b:19:5d:a7:4b:2b:f7:04:42:
                    d5:db:c7:08:9c:db:cb:2e:3d:26:99:36:88:0d:6e:4d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        14:9c:89:45:b9:18:84:5c:e6:56:98:9e:36:12:e7:f3:
        e5:73:6d:0b:a7:7c:70:c1:0f:b3:80:a2:18:5d:6d:7e:
        99:da:3c:20:95:bd:3f:6a:9b:ae:d5:bd:3c:53:2f:33:
        cc:27:da:cc:cc:04:d3:54:1e:79:40:81:48:d8:d9:35:
        75:65:18:e6:32:a5:77:d5:7e:39:81:dc:fa:df:9d:fd:
        08:29:4b:b5:8f:47:c7:18:9d:d4:3a:b5:b2:31:f3:bc:
        69:8b:02:a9:09:7d:c1:5a:15:b3:ae:2d:2a:7d:fd:23:
        62:2f:f5:21:00:13:65:4f:9e:74:d3:c8:52:16:87:7f
    Fingerprint (MD5):
        1F:C3:D2:06:79:21:5D:CF:06:59:B8:CF:8B:9A:30:7C
    Fingerprint (SHA1):
        67:95:70:8E:3F:D4:2E:EF:DB:F3:06:36:DF:3D:89:D0:92:2A:34:91

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US"
Returned value is 0, expected result is pass
chains.sh: #10439: Revocation: Verifying certificate(s)  EE11CA1.der with flags  -g chain -m crl -d AllDB     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE21CA2.der with flags  -g chain -m crl -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv  -g chain -m crl     EE21CA2.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #10440: Revocation: Verifying certificate(s)  EE21CA2.der with flags  -g chain -m crl -d AllDB     -t Root.der - PASSED
chains.sh: #10441: Test that OCSP server is reachable - PASSED
chains.sh: Creating DB OCSPRootDB
certutil -N -d OCSPRootDB -f OCSPRootDB/dbpasswd
chains.sh: #10442: OCSP: Creating DB OCSPRootDB  - PASSED
chains.sh: Importing certificate OCSPRoot.cert to OCSPRootDB database
certutil -A -n OCSPRoot  -t "CT,C,C" -d OCSPRootDB -f OCSPRootDB/dbpasswd -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPRoot.cert
chains.sh: #10443: OCSP: Importing certificate OCSPRoot.cert to OCSPRootDB database  - PASSED
chains.sh: Creating DB OCSPCA1DB
certutil -N -d OCSPCA1DB -f OCSPCA1DB/dbpasswd
chains.sh: #10444: OCSP: Creating DB OCSPCA1DB  - PASSED
chains.sh: Importing p12 key OCSPCA1.p12 to OCSPCA1DB database
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/dist/Linux3.6_x86_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPCA1DB -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.p12 -k OCSPCA1DB/dbpasswd -W nssnss
pk12util: PKCS12 IMPORT SUCCESSFUL
chains.sh: #10445: OCSP: Importing p12 key OCSPCA1.p12 to OCSPCA1DB database  - PASSED
chains.sh: Create CRL for OCSPCA1DB
crlutil -G -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl
=== Crlutil input data ===
update=20121128163442Z
nextupdate=20131128163442Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
    This Update: Wed Nov 28 16:34:42 2012
    Next Update: Thu Nov 28 16:34:42 2013
    CRL Extensions:
chains.sh: #10446: OCSP: Create CRL for OCSPCA1DB  - PASSED
chains.sh: Revoking certificate with SN 3 issued by OCSPCA1
crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl
=== Crlutil input data ===
update=20121128163443Z
addcert 3 20121128163443Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
    This Update: Wed Nov 28 16:34:43 2012
    Next Update: Thu Nov 28 16:34:42 2013
    Entry 1 (0x1):
        Serial Number: 3 (0x3)
        Revocation Date: Wed Nov 28 16:34:43 2012
    CRL Extensions:
chains.sh: #10447: OCSP: Revoking certificate with SN 3 issued by OCSPCA1  - PASSED
chains.sh: Revoking certificate with SN 4 issued by OCSPCA1
crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl
=== Crlutil input data ===
update=20121128163444Z
addcert 4 20121128163444Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
    This Update: Wed Nov 28 16:34:44 2012
    Next Update: Thu Nov 28 16:34:42 2013
    Entry 1 (0x1):
        Serial Number: 4 (0x4)
        Revocation Date: Wed Nov 28 16:34:44 2012
    Entry 2 (0x2):
        Serial Number: 3 (0x3)
        Revocation Date: Wed Nov 28 16:34:43 2012
    CRL Extensions:
chains.sh: #10448: OCSP: Revoking certificate with SN 4 issued by OCSPCA1  - PASSED
chains.sh: Verifying certificate(s)  OCSPEE11.cert OCSPCA1.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -h requireFreshInfo -m ocsp     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE11.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.cert  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 403173846 (0x1807f1d6)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Tue Apr 03 15:38:45 2012
            Not After : Mon Apr 03 15:38:45 2062
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a3:ba:e2:4a:07:35:35:5b:82:33:f6:c4:a2:55:4d:f2:
                    45:9f:04:79:0d:a1:9a:03:14:7c:16:4f:65:27:ef:f5:
                    54:77:b2:f6:34:2b:a6:2b:81:dc:d1:59:12:99:c8:ab:
                    f1:20:ee:4b:07:da:e7:c5:e4:fe:1a:a9:f8:6c:0f:86:
                    e8:03:59:e6:7c:83:47:eb:97:e2:12:4f:88:29:44:b5:
                    fa:2b:2c:df:2c:ca:c6:06:70:af:8f:94:d3:b7:50:6b:
                    87:1a:dc:83:ac:f3:3c:b8:48:69:3c:10:37:a9:06:8c:
                    18:e4:d6:03:3b:c1:5d:5f:3b:eb:e6:4d:a9:24:89:7d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        21:b9:29:4b:3a:1c:cc:5b:86:87:ca:8f:a0:b8:72:98:
        a3:03:49:fb:dd:2f:36:8f:5f:ee:c9:e4:f8:e6:65:3d:
        aa:89:7d:f0:ac:1b:a4:1f:db:b3:9d:f9:1b:ed:7d:1b:
        3d:ec:d7:eb:76:99:4d:fd:4d:28:d1:12:9b:16:7a:35:
        fd:86:1f:36:1d:bd:5e:df:f7:7f:3c:27:28:a4:a1:00:
        30:60:78:f3:fb:5c:74:c8:1d:68:cf:5c:7f:28:eb:61:
        44:1d:2e:9c:be:8d:b9:82:95:19:55:e8:93:9c:f5:ed:
        8d:29:7d:72:74:bf:c0:b9:a8:da:9d:ed:2b:a1:ec:40
    Fingerprint (MD5):
        B6:F2:BD:B0:9A:5A:44:F8:0A:F4:1B:7E:95:31:F6:4D
    Fingerprint (SHA1):
        35:38:60:77:26:C7:1F:A5:AE:AE:16:E2:A5:C4:DD:26:BD:71:EB:99

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE11 EE,O=OCSPEE11,C=US"
Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #10449: OCSP: Verifying certificate(s)  OCSPEE11.cert OCSPCA1.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE12.cert OCSPCA1.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -h requireFreshInfo -m ocsp     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE12.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.cert  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #10450: OCSP: Verifying certificate(s)  OCSPEE12.cert OCSPCA1.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE15.cert OCSPCA1.cert with flags  -g leaf -m ocsp -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -m ocsp     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE15.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.cert  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 403173846 (0x1807f1d6)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Tue Apr 03 15:38:45 2012
            Not After : Mon Apr 03 15:38:45 2062
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a3:ba:e2:4a:07:35:35:5b:82:33:f6:c4:a2:55:4d:f2:
                    45:9f:04:79:0d:a1:9a:03:14:7c:16:4f:65:27:ef:f5:
                    54:77:b2:f6:34:2b:a6:2b:81:dc:d1:59:12:99:c8:ab:
                    f1:20:ee:4b:07:da:e7:c5:e4:fe:1a:a9:f8:6c:0f:86:
                    e8:03:59:e6:7c:83:47:eb:97:e2:12:4f:88:29:44:b5:
                    fa:2b:2c:df:2c:ca:c6:06:70:af:8f:94:d3:b7:50:6b:
                    87:1a:dc:83:ac:f3:3c:b8:48:69:3c:10:37:a9:06:8c:
                    18:e4:d6:03:3b:c1:5d:5f:3b:eb:e6:4d:a9:24:89:7d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        21:b9:29:4b:3a:1c:cc:5b:86:87:ca:8f:a0:b8:72:98:
        a3:03:49:fb:dd:2f:36:8f:5f:ee:c9:e4:f8:e6:65:3d:
        aa:89:7d:f0:ac:1b:a4:1f:db:b3:9d:f9:1b:ed:7d:1b:
        3d:ec:d7:eb:76:99:4d:fd:4d:28:d1:12:9b:16:7a:35:
        fd:86:1f:36:1d:bd:5e:df:f7:7f:3c:27:28:a4:a1:00:
        30:60:78:f3:fb:5c:74:c8:1d:68:cf:5c:7f:28:eb:61:
        44:1d:2e:9c:be:8d:b9:82:95:19:55:e8:93:9c:f5:ed:
        8d:29:7d:72:74:bf:c0:b9:a8:da:9d:ed:2b:a1:ec:40
    Fingerprint (MD5):
        B6:F2:BD:B0:9A:5A:44:F8:0A:F4:1B:7E:95:31:F6:4D
    Fingerprint (SHA1):
        35:38:60:77:26:C7:1F:A5:AE:AE:16:E2:A5:C4:DD:26:BD:71:EB:99

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE15 EE,O=OCSPEE15,C=US"
Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #10451: OCSP: Verifying certificate(s)  OCSPEE15.cert OCSPCA1.cert with flags  -g leaf -m ocsp -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE15.cert OCSPCA1.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -h requireFreshInfo -m ocsp     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE15.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.cert  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #10452: OCSP: Verifying certificate(s)  OCSPEE15.cert OCSPCA1.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE21.cert OCSPCA2.cert with flags  -g leaf -m ocsp -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -m ocsp     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE21.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA2.cert  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 403173846 (0x1807f1d6)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Tue Apr 03 15:38:45 2012
            Not After : Mon Apr 03 15:38:45 2062
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a3:ba:e2:4a:07:35:35:5b:82:33:f6:c4:a2:55:4d:f2:
                    45:9f:04:79:0d:a1:9a:03:14:7c:16:4f:65:27:ef:f5:
                    54:77:b2:f6:34:2b:a6:2b:81:dc:d1:59:12:99:c8:ab:
                    f1:20:ee:4b:07:da:e7:c5:e4:fe:1a:a9:f8:6c:0f:86:
                    e8:03:59:e6:7c:83:47:eb:97:e2:12:4f:88:29:44:b5:
                    fa:2b:2c:df:2c:ca:c6:06:70:af:8f:94:d3:b7:50:6b:
                    87:1a:dc:83:ac:f3:3c:b8:48:69:3c:10:37:a9:06:8c:
                    18:e4:d6:03:3b:c1:5d:5f:3b:eb:e6:4d:a9:24:89:7d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        21:b9:29:4b:3a:1c:cc:5b:86:87:ca:8f:a0:b8:72:98:
        a3:03:49:fb:dd:2f:36:8f:5f:ee:c9:e4:f8:e6:65:3d:
        aa:89:7d:f0:ac:1b:a4:1f:db:b3:9d:f9:1b:ed:7d:1b:
        3d:ec:d7:eb:76:99:4d:fd:4d:28:d1:12:9b:16:7a:35:
        fd:86:1f:36:1d:bd:5e:df:f7:7f:3c:27:28:a4:a1:00:
        30:60:78:f3:fb:5c:74:c8:1d:68:cf:5c:7f:28:eb:61:
        44:1d:2e:9c:be:8d:b9:82:95:19:55:e8:93:9c:f5:ed:
        8d:29:7d:72:74:bf:c0:b9:a8:da:9d:ed:2b:a1:ec:40
    Fingerprint (MD5):
        B6:F2:BD:B0:9A:5A:44:F8:0A:F4:1B:7E:95:31:F6:4D
    Fingerprint (SHA1):
        35:38:60:77:26:C7:1F:A5:AE:AE:16:E2:A5:C4:DD:26:BD:71:EB:99

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE21 EE,O=OCSPEE21,C=US"
Certificate 2 Subject: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #10453: OCSP: Verifying certificate(s)  OCSPEE21.cert OCSPCA2.cert with flags  -g leaf -m ocsp -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE21.cert OCSPCA2.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -h requireFreshInfo -m ocsp     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE21.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA2.cert  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #10454: OCSP: Verifying certificate(s)  OCSPEE21.cert OCSPCA2.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE21.cert OCSPCA2.cert with flags  -g chain -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g chain -h requireFreshInfo -m ocsp     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE21.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA2.cert  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #10455: OCSP: Verifying certificate(s)  OCSPEE21.cert OCSPCA2.cert with flags  -g chain -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE31.cert OCSPCA3.cert with flags  -g leaf -m ocsp -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -m ocsp     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE31.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA3.cert  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 403173846 (0x1807f1d6)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Tue Apr 03 15:38:45 2012
            Not After : Mon Apr 03 15:38:45 2062
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a3:ba:e2:4a:07:35:35:5b:82:33:f6:c4:a2:55:4d:f2:
                    45:9f:04:79:0d:a1:9a:03:14:7c:16:4f:65:27:ef:f5:
                    54:77:b2:f6:34:2b:a6:2b:81:dc:d1:59:12:99:c8:ab:
                    f1:20:ee:4b:07:da:e7:c5:e4:fe:1a:a9:f8:6c:0f:86:
                    e8:03:59:e6:7c:83:47:eb:97:e2:12:4f:88:29:44:b5:
                    fa:2b:2c:df:2c:ca:c6:06:70:af:8f:94:d3:b7:50:6b:
                    87:1a:dc:83:ac:f3:3c:b8:48:69:3c:10:37:a9:06:8c:
                    18:e4:d6:03:3b:c1:5d:5f:3b:eb:e6:4d:a9:24:89:7d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        21:b9:29:4b:3a:1c:cc:5b:86:87:ca:8f:a0:b8:72:98:
        a3:03:49:fb:dd:2f:36:8f:5f:ee:c9:e4:f8:e6:65:3d:
        aa:89:7d:f0:ac:1b:a4:1f:db:b3:9d:f9:1b:ed:7d:1b:
        3d:ec:d7:eb:76:99:4d:fd:4d:28:d1:12:9b:16:7a:35:
        fd:86:1f:36:1d:bd:5e:df:f7:7f:3c:27:28:a4:a1:00:
        30:60:78:f3:fb:5c:74:c8:1d:68:cf:5c:7f:28:eb:61:
        44:1d:2e:9c:be:8d:b9:82:95:19:55:e8:93:9c:f5:ed:
        8d:29:7d:72:74:bf:c0:b9:a8:da:9d:ed:2b:a1:ec:40
    Fingerprint (MD5):
        B6:F2:BD:B0:9A:5A:44:F8:0A:F4:1B:7E:95:31:F6:4D
    Fingerprint (SHA1):
        35:38:60:77:26:C7:1F:A5:AE:AE:16:E2:A5:C4:DD:26:BD:71:EB:99

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE31 EE,O=OCSPEE31,C=US"
Certificate 2 Subject: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US"
Returned value is 0, expected result is pass
chains.sh: #10456: OCSP: Verifying certificate(s)  OCSPEE31.cert OCSPCA3.cert with flags  -g leaf -m ocsp -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE31.cert OCSPCA3.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -h requireFreshInfo -m ocsp     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE31.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA3.cert  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #10457: OCSP: Verifying certificate(s)  OCSPEE31.cert OCSPCA3.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE12.cert OCSPCA1.cert with flags  -g leaf -m ocsp -s doNotUse -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -m ocsp -s doNotUse     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE12.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.cert  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 403173846 (0x1807f1d6)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Tue Apr 03 15:38:45 2012
            Not After : Mon Apr 03 15:38:45 2062
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a3:ba:e2:4a:07:35:35:5b:82:33:f6:c4:a2:55:4d:f2:
                    45:9f:04:79:0d:a1:9a:03:14:7c:16:4f:65:27:ef:f5:
                    54:77:b2:f6:34:2b:a6:2b:81:dc:d1:59:12:99:c8:ab:
                    f1:20:ee:4b:07:da:e7:c5:e4:fe:1a:a9:f8:6c:0f:86:
                    e8:03:59:e6:7c:83:47:eb:97:e2:12:4f:88:29:44:b5:
                    fa:2b:2c:df:2c:ca:c6:06:70:af:8f:94:d3:b7:50:6b:
                    87:1a:dc:83:ac:f3:3c:b8:48:69:3c:10:37:a9:06:8c:
                    18:e4:d6:03:3b:c1:5d:5f:3b:eb:e6:4d:a9:24:89:7d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        21:b9:29:4b:3a:1c:cc:5b:86:87:ca:8f:a0:b8:72:98:
        a3:03:49:fb:dd:2f:36:8f:5f:ee:c9:e4:f8:e6:65:3d:
        aa:89:7d:f0:ac:1b:a4:1f:db:b3:9d:f9:1b:ed:7d:1b:
        3d:ec:d7:eb:76:99:4d:fd:4d:28:d1:12:9b:16:7a:35:
        fd:86:1f:36:1d:bd:5e:df:f7:7f:3c:27:28:a4:a1:00:
        30:60:78:f3:fb:5c:74:c8:1d:68:cf:5c:7f:28:eb:61:
        44:1d:2e:9c:be:8d:b9:82:95:19:55:e8:93:9c:f5:ed:
        8d:29:7d:72:74:bf:c0:b9:a8:da:9d:ed:2b:a1:ec:40
    Fingerprint (MD5):
        B6:F2:BD:B0:9A:5A:44:F8:0A:F4:1B:7E:95:31:F6:4D
    Fingerprint (SHA1):
        35:38:60:77:26:C7:1F:A5:AE:AE:16:E2:A5:C4:DD:26:BD:71:EB:99

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE12 EE,O=OCSPEE12,C=US"
Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #10458: OCSP: Verifying certificate(s)  OCSPEE12.cert OCSPCA1.cert with flags  -g leaf -m ocsp -s doNotUse -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE12.cert OCSPCA1.cert with flags  -g leaf -m ocsp -s forbidFetching -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -m ocsp -s forbidFetching     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE12.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.cert  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 403173846 (0x1807f1d6)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Tue Apr 03 15:38:45 2012
            Not After : Mon Apr 03 15:38:45 2062
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a3:ba:e2:4a:07:35:35:5b:82:33:f6:c4:a2:55:4d:f2:
                    45:9f:04:79:0d:a1:9a:03:14:7c:16:4f:65:27:ef:f5:
                    54:77:b2:f6:34:2b:a6:2b:81:dc:d1:59:12:99:c8:ab:
                    f1:20:ee:4b:07:da:e7:c5:e4:fe:1a:a9:f8:6c:0f:86:
                    e8:03:59:e6:7c:83:47:eb:97:e2:12:4f:88:29:44:b5:
                    fa:2b:2c:df:2c:ca:c6:06:70:af:8f:94:d3:b7:50:6b:
                    87:1a:dc:83:ac:f3:3c:b8:48:69:3c:10:37:a9:06:8c:
                    18:e4:d6:03:3b:c1:5d:5f:3b:eb:e6:4d:a9:24:89:7d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        21:b9:29:4b:3a:1c:cc:5b:86:87:ca:8f:a0:b8:72:98:
        a3:03:49:fb:dd:2f:36:8f:5f:ee:c9:e4:f8:e6:65:3d:
        aa:89:7d:f0:ac:1b:a4:1f:db:b3:9d:f9:1b:ed:7d:1b:
        3d:ec:d7:eb:76:99:4d:fd:4d:28:d1:12:9b:16:7a:35:
        fd:86:1f:36:1d:bd:5e:df:f7:7f:3c:27:28:a4:a1:00:
        30:60:78:f3:fb:5c:74:c8:1d:68:cf:5c:7f:28:eb:61:
        44:1d:2e:9c:be:8d:b9:82:95:19:55:e8:93:9c:f5:ed:
        8d:29:7d:72:74:bf:c0:b9:a8:da:9d:ed:2b:a1:ec:40
    Fingerprint (MD5):
        B6:F2:BD:B0:9A:5A:44:F8:0A:F4:1B:7E:95:31:F6:4D
    Fingerprint (SHA1):
        35:38:60:77:26:C7:1F:A5:AE:AE:16:E2:A5:C4:DD:26:BD:71:EB:99

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE12 EE,O=OCSPEE12,C=US"
Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #10459: OCSP: Verifying certificate(s)  OCSPEE12.cert OCSPCA1.cert with flags  -g leaf -m ocsp -s forbidFetching -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE15.cert OCSPCA1.cert with flags  -g leaf -m ocsp -s failIfNoInfo -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -m ocsp -s failIfNoInfo     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE15.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.cert  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8071: The OCSP server experienced an internal error.
Returned value is 1, expected result is fail
chains.sh: #10460: OCSP: Verifying certificate(s)  OCSPEE15.cert OCSPCA1.cert with flags  -g leaf -m ocsp -s failIfNoInfo -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE21.cert OCSPCA2.cert with flags  -g leaf -m ocsp -s failIfNoInfo -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -m ocsp -s failIfNoInfo     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE21.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA2.cert  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #10461: OCSP: Verifying certificate(s)  OCSPEE21.cert OCSPCA2.cert with flags  -g leaf -m ocsp -s failIfNoInfo -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE13.cert OCSPCA1.cert with flags  -g leaf -h testLocalInfoFirst -m ocsp -d OCSPCA1DB     -t OCSPCA1
vfychain -d OCSPCA1DB -pp -vv  -g leaf -h testLocalInfoFirst -m ocsp     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE13.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.cert  -t OCSPCA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Tue Apr 03 15:38:46 2012
            Not After : Mon Apr 03 15:38:46 2017
        Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c1:b0:47:12:51:37:68:7d:39:cb:ee:e3:32:2c:ad:b5:
                    44:2c:72:7f:c8:e9:32:79:d9:7d:b9:69:94:bc:5a:9e:
                    5a:3b:0f:e2:07:e5:b2:76:04:73:32:ee:92:8d:a1:2f:
                    ed:e4:e0:5a:92:28:ca:bb:48:fc:5c:44:dc:9a:c0:3b:
                    88:84:0a:bd:6b:4a:c9:18:37:51:e3:a3:3a:e0:40:5c:
                    53:0d:04:ed:c7:18:34:25:5a:5e:00:f5:0d:29:ef:fa:
                    69:e3:6d:96:e3:1e:5b:8a:4e:3e:77:e7:45:16:81:6f:
                    21:01:2c:8d:b1:fa:57:06:f0:9b:95:1a:c3:0d:25:25
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Authority Information Access
            Method: PKIX Online Certificate Status Protocol
            Location: 
                URI: "http://ocsp.kuix.de:2600"

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        88:c4:da:b7:3d:84:1d:1c:ca:f8:c1:2e:46:59:c2:33:
        93:64:38:f9:2a:87:32:ca:ec:e0:ef:ff:cc:1f:9d:96:
        a6:42:b0:cd:8f:b3:85:3a:59:64:34:c1:0d:bb:24:c5:
        36:f6:28:93:a0:3b:58:b8:93:87:c5:6e:f2:64:23:b9:
        c4:a9:53:82:bd:0a:12:92:58:90:01:b1:11:a6:65:aa:
        a9:72:94:60:96:38:fd:e3:9e:14:5b:4e:ed:0d:99:e2:
        94:6a:50:84:88:00:1e:14:a7:ed:20:69:95:9b:cb:b7:
        61:11:b8:14:7a:1e:19:3c:bb:38:5b:97:e0:ad:9f:2e
    Fingerprint (MD5):
        6E:22:37:7A:94:F2:07:60:87:6B:9D:CF:64:C9:D9:37
    Fingerprint (SHA1):
        92:63:FD:E1:AA:A4:45:54:F7:E8:B7:5F:92:8F:74:06:3E:96:BA:47

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User

Certificate 1 Subject: "CN=OCSPEE13 EE,O=OCSPEE13,C=US"
Returned value is 0, expected result is pass
chains.sh: #10462: OCSP: Verifying certificate(s)  OCSPEE13.cert OCSPCA1.cert with flags  -g leaf -h testLocalInfoFirst -m ocsp -d OCSPCA1DB     -t OCSPCA1 - PASSED
chains.sh: Creating DB OCSPRoot1DB
certutil -N -d OCSPRoot1DB -f OCSPRoot1DB/dbpasswd
chains.sh: #10463: OCSP: Creating DB OCSPRoot1DB  - PASSED
chains.sh: Importing certificate OCSPRoot.cert to OCSPRoot1DB database
certutil -A -n OCSPRoot  -t "CT,C,C" -d OCSPRoot1DB -f OCSPRoot1DB/dbpasswd -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPRoot.cert
chains.sh: #10464: OCSP: Importing certificate OCSPRoot.cert to OCSPRoot1DB database  - PASSED
chains.sh: Verifying certificate(s)  OCSPEE23.cert OCSPCA2.cert with flags  -g chain -m ocsp -g leaf -m ocsp -d OCSPRoot1DB     -t OCSPRoot
vfychain -d OCSPRoot1DB -pp -vv  -g chain -m ocsp -g leaf -m ocsp     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE23.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA2.cert  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #10465: OCSP: Verifying certificate(s)  OCSPEE23.cert OCSPCA2.cert with flags  -g chain -m ocsp -g leaf -m ocsp -d OCSPRoot1DB     -t OCSPRoot - PASSED
chains.sh: Creating DB OCSPRoot2DB
certutil -N -d OCSPRoot2DB -f OCSPRoot2DB/dbpasswd
chains.sh: #10466: OCSP: Creating DB OCSPRoot2DB  - PASSED
chains.sh: Importing certificate OCSPRoot.cert to OCSPRoot2DB database
certutil -A -n OCSPRoot  -t "T,," -d OCSPRoot2DB -f OCSPRoot2DB/dbpasswd -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPRoot.cert
chains.sh: #10467: OCSP: Importing certificate OCSPRoot.cert to OCSPRoot2DB database  - PASSED
chains.sh: Verifying certificate(s)  OCSPEE23.cert OCSPCA2.cert with flags  -g chain -m ocsp -g leaf -m ocsp -d OCSPRoot2DB     -t OCSPRoot
vfychain -d OCSPRoot2DB -pp -vv  -g chain -m ocsp -g leaf -m ocsp     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPEE23.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/security/nss/tests/libpkix/certs/OCSPCA2.cert  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 403173846 (0x1807f1d6)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Tue Apr 03 15:38:45 2012
            Not After : Mon Apr 03 15:38:45 2062
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a3:ba:e2:4a:07:35:35:5b:82:33:f6:c4:a2:55:4d:f2:
                    45:9f:04:79:0d:a1:9a:03:14:7c:16:4f:65:27:ef:f5:
                    54:77:b2:f6:34:2b:a6:2b:81:dc:d1:59:12:99:c8:ab:
                    f1:20:ee:4b:07:da:e7:c5:e4:fe:1a:a9:f8:6c:0f:86:
                    e8:03:59:e6:7c:83:47:eb:97:e2:12:4f:88:29:44:b5:
                    fa:2b:2c:df:2c:ca:c6:06:70:af:8f:94:d3:b7:50:6b:
                    87:1a:dc:83:ac:f3:3c:b8:48:69:3c:10:37:a9:06:8c:
                    18:e4:d6:03:3b:c1:5d:5f:3b:eb:e6:4d:a9:24:89:7d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        21:b9:29:4b:3a:1c:cc:5b:86:87:ca:8f:a0:b8:72:98:
        a3:03:49:fb:dd:2f:36:8f:5f:ee:c9:e4:f8:e6:65:3d:
        aa:89:7d:f0:ac:1b:a4:1f:db:b3:9d:f9:1b:ed:7d:1b:
        3d:ec:d7:eb:76:99:4d:fd:4d:28:d1:12:9b:16:7a:35:
        fd:86:1f:36:1d:bd:5e:df:f7:7f:3c:27:28:a4:a1:00:
        30:60:78:f3:fb:5c:74:c8:1d:68:cf:5c:7f:28:eb:61:
        44:1d:2e:9c:be:8d:b9:82:95:19:55:e8:93:9c:f5:ed:
        8d:29:7d:72:74:bf:c0:b9:a8:da:9d:ed:2b:a1:ec:40
    Fingerprint (MD5):
        B6:F2:BD:B0:9A:5A:44:F8:0A:F4:1B:7E:95:31:F6:4D
    Fingerprint (SHA1):
        35:38:60:77:26:C7:1F:A5:AE:AE:16:E2:A5:C4:DD:26:BD:71:EB:99

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted Client CA
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=OCSPEE23 EE,O=OCSPEE23,C=US"
Certificate 2 Subject: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #10468: OCSP: Verifying certificate(s)  OCSPEE23.cert OCSPCA2.cert with flags  -g chain -m ocsp -g leaf -m ocsp -d OCSPRoot2DB     -t OCSPRoot - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #10469: CRLDP: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -m 1128112965 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #10470: CRLDP: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #10471: CRLDP: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA0DB
certutil -N -d CA0DB -f CA0DB/dbpasswd
chains.sh: #10472: CRLDP: Creating DB CA0DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA0Req.der
certutil -s "CN=CA0 Intermediate, O=CA0, C=US"  -R -2 -d CA0DB -f CA0DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA0Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10473: CRLDP: Creating Intermediate certifiate request CA0Req.der  - PASSED
chains.sh: Creating certficate CA0Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 1128112966   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #10474: CRLDP: Creating certficate CA0Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA0Root.der to CA0DB database
certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der
chains.sh: #10475: CRLDP: Importing certificate CA0Root.der to CA0DB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #10476: CRLDP: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA1Req.der  -4 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y
1
7
http://buildnss02.usersys.redhat.com:8556/buildnss02-10869-CA0-1128112855.crl
-1
-1
-1
n
n

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
Enter the type of the distribution point name:
1 - Full Name
2 - Relative Name
Any other number to finish
Choice:  > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Select one of the following for the reason flags
0 - unused
1 - keyCompromise
2 - caCompromise
3 - affiliationChanged
4 - superseded
5 - cessationOfOperation
6 - certificateHold
Any other number to finishChoice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10477: CRLDP: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10   --extAIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8556/buildnss02-10869-CA0Root-1128112842.der
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #10478: CRLDP: Creating certficate CA1CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate CA1CA0.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der
chains.sh: #10479: CRLDP: Importing certificate CA1CA0.der to CA1DB database  - PASSED
chains.sh: Creating DB EE11DB
certutil -N -d EE11DB -f EE11DB/dbpasswd
chains.sh: #10480: CRLDP: Creating DB EE11DB  - PASSED
chains.sh: Creating EE certifiate request EE11Req.der
certutil -s "CN=EE11 EE, O=EE11, C=US"  -R  -d EE11DB -f EE11DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o EE11Req.der  -4 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8556/buildnss02-10869-CA0-1128112855.crl
-1
-1
-1
n
n

===


Generating key.  This may take a few moments...

Enter the type of the distribution point name:
1 - Full Name
2 - Relative Name
Any other number to finish
Choice:  > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Select one of the following for the reason flags
0 - unused
1 - keyCompromise
2 - caCompromise
3 - affiliationChanged
4 - superseded
5 - cessationOfOperation
6 - certificateHold
Any other number to finishChoice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10481: CRLDP: Creating EE certifiate request EE11Req.der  - PASSED
chains.sh: Creating certficate EE11CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 1128112967   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #10482: CRLDP: Creating certficate EE11CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE11CA1.der to EE11DB database
certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der
chains.sh: #10483: CRLDP: Importing certificate EE11CA1.der to EE11DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #10484: CRLDP: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA2Req.der  -4 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y
1
7
http://buildnss02.usersys.redhat.com:8556/buildnss02-10869-CA0-1128112855.crl
-1
-1
-1
n
n

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
Enter the type of the distribution point name:
1 - Full Name
2 - Relative Name
Any other number to finish
Choice:  > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Select one of the following for the reason flags
0 - unused
1 - keyCompromise
2 - caCompromise
3 - affiliationChanged
4 - superseded
5 - cessationOfOperation
6 - certificateHold
Any other number to finishChoice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10485: CRLDP: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20   --extAIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8556/buildnss02-10869-CA0Root-1128112843.der
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #10486: CRLDP: Creating certficate CA2CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate CA2CA0.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der
chains.sh: #10487: CRLDP: Importing certificate CA2CA0.der to CA2DB database  - PASSED
chains.sh: Creating DB EE21DB
certutil -N -d EE21DB -f EE21DB/dbpasswd
chains.sh: #10488: CRLDP: Creating DB EE21DB  - PASSED
chains.sh: Creating EE certifiate request EE21Req.der
certutil -s "CN=EE21 EE, O=EE21, C=US"  -R  -d EE21DB -f EE21DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o EE21Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #10489: CRLDP: Creating EE certifiate request EE21Req.der  - PASSED
chains.sh: Creating certficate EE21CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 1128112968   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #10490: CRLDP: Creating certficate EE21CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate EE21CA2.der to EE21DB database
certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der
chains.sh: #10491: CRLDP: Importing certificate EE21CA2.der to EE21DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #10492: CRLDP: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o EE1Req.der  -4 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8556/buildnss02-10869-CA0-1128112855.crl
-1
-1
-1
n
n

===


Generating key.  This may take a few moments...

Enter the type of the distribution point name:
1 - Full Name
2 - Relative Name
Any other number to finish
Choice:  > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Select one of the following for the reason flags
0 - unused
1 - keyCompromise
2 - caCompromise
3 - affiliationChanged
4 - superseded
5 - cessationOfOperation
6 - certificateHold
Any other number to finishChoice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10493: CRLDP: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30   --extAIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8556/buildnss02-10869-CA0Root-1128112844.der
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #10494: CRLDP: Creating certficate EE1CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate EE1CA0.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der
chains.sh: #10495: CRLDP: Importing certificate EE1CA0.der to EE1DB database  - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #10496: CRLDP: Creating DB EE2DB  - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US"  -R  -d EE2DB -f EE2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o EE2Req.der  -4 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8556/buildnss02-10869-CA0-1128112855.crl
-1
-1
-1
n
n

===


Generating key.  This may take a few moments...

Enter the type of the distribution point name:
1 - Full Name
2 - Relative Name
Any other number to finish
Choice:  > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Select one of the following for the reason flags
0 - unused
1 - keyCompromise
2 - caCompromise
3 - affiliationChanged
4 - superseded
5 - cessationOfOperation
6 - certificateHold
Any other number to finishChoice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10497: CRLDP: Creating EE certifiate request EE2Req.der  - PASSED
chains.sh: Creating certficate EE2CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40   --extAIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_32_OPT/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8556/buildnss02-10869-CA0Root-1128112845.der
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #10498: CRLDP: Creating certficate EE2CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate EE2CA0.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der
chains.sh: #10499: CRLDP: Importing certificate EE2CA0.der to EE2DB database  - PASSED
chains.sh: Create CRL for RootDB
crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl
=== Crlutil input data ===
update=20121128163516Z
nextupdate=20131128163516Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=Root ROOT CA,O=Root,C=US"
    This Update: Wed Nov 28 16:35:16 2012
    Next Update: Thu Nov 28 16:35:16 2013
    CRL Extensions:
chains.sh: #10500: CRLDP: Create CRL for RootDB  - PASSED
chains.sh: Create CRL for CA0DB
crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl
=== Crlutil input data ===
update=20121128163516Z
nextupdate=20131128163517Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA0 Intermediate,O=CA0,C=US"
    This Update: Wed Nov 28 16:35:16 2012
    Next Update: Thu Nov 28 16:35:17 2013
    CRL Extensions:
chains.sh: #10501: CRLDP: Create CRL for CA0DB  - PASSED
chains.sh: Create CRL for CA1DB
crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl
=== Crlutil input data ===
update=20121128163517Z
nextupdate=20131128163517Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
    This Update: Wed Nov 28 16:35:17 2012
    Next Update: Thu Nov 28 16:35:17 2013
    CRL Extensions:
chains.sh: #10502: CRLDP: Create CRL for CA1DB  - PASSED
chains.sh: Create CRL for CA2DB
crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl
=== Crlutil input data ===
update=20121128163517Z
nextupdate=20131128163517Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA2 Intermediate,O=CA2,C=US"
    This Update: Wed Nov 28 16:35:17 2012
    Next Update: Thu Nov 28 16:35:17 2013
    CRL Extensions:
chains.sh: #10503: CRLDP: Create CRL for CA2DB  - PASSED
chains.sh: Revoking certificate with SN 20 issued by CA0
crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl
=== Crlutil input data ===
update=20121128163518Z
addcert 20 20121128163518Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA0 Intermediate,O=CA0,C=US"
    This Update: Wed Nov 28 16:35:18 2012
    Next Update: Thu Nov 28 16:35:17 2013
    Entry 1 (0x1):
        Serial Number: 20 (0x14)
        Revocation Date: Wed Nov 28 16:35:18 2012
    CRL Extensions:
chains.sh: #10504: CRLDP: Revoking certificate with SN 20 issued by CA0  - PASSED
chains.sh: Revoking certificate with SN 40 issued by CA0
crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl
=== Crlutil input data ===
update=20121128163519Z
addcert 40 20121128163519Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA0 Intermediate,O=CA0,C=US"
    This Update: Wed Nov 28 16:35:19 2012
    Next Update: Thu Nov 28 16:35:17 2013
    Entry 1 (0x1):
        Serial Number: 20 (0x14)
        Revocation Date: Wed Nov 28 16:35:18 2012
    Entry 2 (0x2):
        Serial Number: 40 (0x28)
        Revocation Date: Wed Nov 28 16:35:19 2012
    CRL Extensions:
chains.sh: #10505: CRLDP: Revoking certificate with SN 40 issued by CA0  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #10506: CRLDP: Creating DB AllDB  - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #10507: CRLDP: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing CRL Root.crl to AllDB database
crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl
chains.sh: #10508: CRLDP: Importing CRL Root.crl to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  EE11CA1.der CA1CA0.der with flags  -g chain -h requireFreshInfo -m crl -d AllDB -f    -t Root.der
vfychain -d AllDB -pp -vv  -g chain -h requireFreshInfo -m crl -f    EE11CA1.der CA1CA0.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]:
  ERROR -5961: TCP connection reset by peer
Returned value is 1, expected result is pass
chains.sh: #10509: CRLDP: Verifying certificate(s)  EE11CA1.der CA1CA0.der with flags  -g chain -h requireFreshInfo -m crl -d AllDB -f    -t Root.der - FAILED
chains.sh: Verifying certificate(s)  EE21CA2.der CA2CA0.der with flags  -g chain -h requireFreshInfo -m crl -d AllDB -f    -t Root.der
vfychain -d AllDB -pp -vv  -g chain -h requireFreshInfo -m crl -f    EE21CA2.der CA2CA0.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]:
  ERROR -5961: TCP connection reset by peer
Returned value is 1, expected result is fail
chains.sh: #10510: CRLDP: Verifying certificate(s)  EE21CA2.der CA2CA0.der with flags  -g chain -h requireFreshInfo -m crl -d AllDB -f    -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA0.der with flags  -g leaf -h requireFreshInfo -m crl -d AllDB -f    -t Root.der
vfychain -d AllDB -pp -vv  -g leaf -h requireFreshInfo -m crl -f    EE1CA0.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=EE1 EE,O=EE1,C=US [Certificate Authority]:
  ERROR -5961: TCP connection reset by peer
Returned value is 1, expected result is pass
chains.sh: #10511: CRLDP: Verifying certificate(s)  EE1CA0.der with flags  -g leaf -h requireFreshInfo -m crl -d AllDB -f    -t Root.der - FAILED
chains.sh: Verifying certificate(s)  EE2CA0.der with flags  -g leaf -h requireFreshInfo -m crl -d AllDB -f    -t Root.der
vfychain -d AllDB -pp -vv  -g leaf -h requireFreshInfo -m crl -f    EE2CA0.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=EE2 EE,O=EE2,C=US [Certificate Authority]:
  ERROR -5961: TCP connection reset by peer
Returned value is 1, expected result is fail
chains.sh: #10512: CRLDP: Verifying certificate(s)  EE2CA0.der with flags  -g leaf -h requireFreshInfo -m crl -d AllDB -f    -t Root.der - PASSED
trying to kill httpserv with PID 11365 at Wed Nov 28 11:35:34 EST 2012
kill -USR1 11365
selfserv: normal termination
httpserv -b -p 8556 2>/dev/null;
httpserv with PID 11365 killed at Wed Nov 28 11:35:34 EST 2012
TIMESTAMP chains END: Wed Nov 28 11:35:34 EST 2012

SUMMARY:
========
NSS variables:
--------------
HOST=buildnss02
DOMSUF=usersys.redhat.com
BUILD_OPT=1
USE_64=
NSS_CYCLES=""
NSS_TESTS=""
NSS_SSL_TESTS="crl bypass_normal normal_bypass fips_normal normal_fips iopr"
NSS_SSL_RUN="cov auth stress"
NSS_AIA_PATH=
NSS_AIA_HTTP=
NSS_AIA_OCSP=
IOPR_HOSTADDR_LIST=
PKITS_DATA=/home/tinderbox/pkits/data/

Tests summary:
--------------
Passed:             10500
Failed:             12
Failed with core:   0
Unknown status:     0

END_OF_TEST<BR>
TB [2012-11-28 11:35:34] NSS - tests - 32 bits - OPT FAILED

No More Errors